期刊文献+

云计算安全关键技术分析 被引量:5

Analysis of the Key Technology of Cloud Computing Security
下载PDF
导出
摘要 云计算真正实现了按需服务的商业模式,随着云计算技术的快速发展,云计算的安全问题已经成为云计算发展的瓶颈。本文对云计算安全的概念进行说明,分析现有云计算安全特征,分析云计算安全现状,在此基础之上,提出一个比较全面的云计算安全模型,并对其中的关键技术进行研究,为解决云计算安全提供技术支持。 Cloud computing really realizes the business model of on-demand service; along with the rapid development of cloud computing,its security issue has become the bottleneck for the development of cloud computing. This paper describes the concept of cloud computing security,analyzes the safety characteristics and current situation of existing cloud computing,on the basis of this,puts forward a rather comprehensive cloud computing security model,and studies the key technologies,so as to provide technical support to solve the cloud computing security.
作者 徐波
出处 《吉林工程技术师范学院学报》 2014年第5期93-94,共2页 Journal of Jilin Engineering Normal University
关键词 云计算安全 加密技术 虚拟化安全 数据安全 cloud computing security encryption techniques virtual security data security
  • 相关文献

参考文献1

二级参考文献11

  • 1ENISA. Benefits, Risks and Recommendations for Information Security [ EB/OL]. [2010-05-10]. http://www. enisa, europa, eu/act/rm/files/deliverables/cloud-computing-risk-assessment? scarchterm = cloud + computing.
  • 2MATHER T, KUMARASWAMY S, LATIF S. Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance[ M]. [ s. l. ] :O'Reilly Media, Inc., 2009.
  • 3MELL P, GRANCE T. The NIST Definition of Cloud Computing [ EB/OL ]. [ 2010-05-10 ]. http ://csrc. nist. gov/groups/SNS/cloud-computing/.
  • 4CSA. Security Guidance for Critical Areas of Focus in Cloud Computing V2.1 [ EB/OL]. [ 2010-05-10]. http: //www. cloudsecurityalliance, org/guidance/.
  • 5赵粮 裘晓峰.云计算环境的安全威胁和保护.中国计算机学会通讯,2010,6(5):47-50.
  • 6FORUM J. Cloud cube model: selecting cloud formations for secure collaboration [ EB/OL]. [ 2010-05-10 ]. http: //www. opengroup, org/jericho/cloud_cube_model_v1. 0. pdf.
  • 7GARTNER. Assessing the Security Risks of Cloud Computing[ EB/OL]. [ 2010-05-10 ]. http: //www. gartner. com/DisplayDocument? id = 685308.
  • 8WEI Jin-peng, ZHANG Xiao-lan. Managing Security of Virtual Machine Images in a Cloud Environment [ C ] //Proceedings of the 2009 ACM workshop on Cloud computing security. Chicago : [ s. n. ] ,2009:91-96.
  • 9KANDUKURI B R, PATURI V R, RAKSHIT A. Cloud Security Issues [ C ] //IEEE International Conference on Services Computing ( SCC '09 ), Bangalore : [ s. n. ], 2009 : 517-520.
  • 10ISACA. Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives [ EB/OL]. [2010-05-10 ] . http: //www. isaca, org/Template, cfm? Section = Nederlands&Template =/Search/SearchDisplay. cfm.

共引文献12

同被引文献13

引证文献5

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部