期刊文献+

云环境下基于ECC的数字认证技术的研究 被引量:2

Technology of Digital Certificate Based on ECC under Cloud Environment
下载PDF
导出
摘要 云计算技术的发展正在使得计算机世界发生着巨大的变革,随之而来是人们对云计算安全问题的热议,其中云计算的虚拟化安全和用户隐私数据保护问题已成为目前广大研究者关注的焦点,文章阐述了虚拟化对云计算带来的好处及其安全问题对云计算安全的影响,针对目前虚拟的云环境下所面临的用户隐私数据安全保护问题及应对策略进行分析,为了保护用户隐私数据在虚拟的云环境下不被泄露或窃取,文章提出了利用基于ECC算法的数字认证技术在虚拟机与云计算用户之间建立一种单线排他的认证连接,来实现在虚拟的云环境下用户隐私数据的安全保护与绝对隔离,使云计算能够更加安全地为人们提供服务。 The development of the technology of cloud computing is promoting the tremendous change of the world of computing,followed by a hot discussion about the security of cloud computing.And more and more researchers have been focused on the virtualization security of cloud computing and the protection to the users'private data.This paper describes the benefits and the implication that the technology of virtualization brings to the cloud computing,and analyzes the current issues and strategies about data security under the virtual cloud environment,to protect users'private date from being betrayed.This paper proposes to build a single-wire connection between the virtual machine and the users of cloud computing using the digital certificate technology,so that people can achieve the protection and isolation of user's privacy data under the cloud environment and the cloud computing technology can service people with much higher security.
作者 郭雪雪 解福
出处 《计算机与数字工程》 2015年第3期473-476,526,共5页 Computer & Digital Engineering
关键词 云计算 云计算安全 虚拟化 椭圆曲线算法 数字证书 隐私数据保护 cloud computing cloud computing security virtualization ECC algorithm digital certificate protection to the private data
  • 相关文献

参考文献7

二级参考文献118

  • 1LU Xicheng,WANG Huaimin,WANG Ji.Internet-based virtual computing environment(iVCE):Concepts and architecture[J].Science in China(Series F),2006,49(6):681-701. 被引量:33
  • 2HUAI Jinpeng HU Chunming LI Jianxin SUN Hailong WO Tianyu.CROWN:A service grid middleware with trust management mechanism[J].Science in China(Series F),2006,49(6):731-758. 被引量:8
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4IBM虚拟化与云计算小组.虚拟化与云计算[M].北京:电子工业出版社,2009.10.
  • 5赵粮 裘晓峰.云计算环境的安全威胁和保护.中国计算机学会通讯,2010,6(5):47-50.
  • 6MillerM.云计算[M].姜进磊,孙瑞志,向勇,等译.北京:机械工业出版社,2009.
  • 7Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 8Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 9Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 10Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.

共引文献1953

同被引文献17

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部