期刊文献+

云安全的体系结构及关键技术研究 被引量:4

Research on the architecture and key technologies of cloud security
下载PDF
导出
摘要 云服务模式给云计算环境下的信息安全带来了一系列新的安全问题,对云安全的体系结构及关键技术进行了研究。从云计算实施要点及管理平台的主要功能入手,全面分析云计算面临的安全威胁,设计了云安全参考框架,并对云安全关键技术进行了分析和研究,预测了云安全的发展趋势,期望对国内安全云的服务平台建设提供一些参考。 The cloud service model brings a series of new security problems in cloud computing environment. Cloud security architecture and key technologies are studied. From cloud computing implementation and the main function of management platform, the security threats to cloud computing were analyzed comprehensively. The cloud security framework was designed, and the cloud security key technologies were analyzed and researched on, the cloud security trends were predicted. It can provide some reference to the domestic construction of the secure cloud services platform.
作者 唐国纯
出处 《信息技术》 2015年第7期28-31,共4页 Information Technology
基金 海南省自然科学基金资助(614247) 海南省自然科学基金资助(114013)
关键词 云安全 云计算 云安全框架 云安全技术 cloud security cloud computing cloud security framework cloud security technology
  • 相关文献

参考文献8

二级参考文献56

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1330

同被引文献23

引证文献4

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部