期刊文献+

云计算安全浅析 被引量:3

Analysis on the Security of Cloud Computing
下载PDF
导出
摘要 云计算环境基础设施的抽象化、虚拟化,导致传统的传输安全控制手段无法进行同等的防护和检测。为此,从云计算安全的现状需求、面临的挑战以及解决方案等方面人手,针对虚拟机网络的特点,基于虚拟蜜网技术体系,提出了一种云计算安全管理解决方案,补充传统入侵检测手段的不足,达到对整个云计算平台进行更细粒度的网格化监控效果,为云入侵行为的早期发现、主动防御、追溯分析提供帮助。 Cloud computing environment is unable to carry on the same protection and detection because of the abstraction and virtualization of the infrastructure. The status of cloud computing security needs, challenges and solutions were introduced. Based on the characteristics of virtual machine network, a security management solution, which was based on the virtual honey net technology, was proposed. This solution can complement the shortcomings of traditional intrusion detection methods, achieve a more fine-grained grid monitoring results for the entire cloud computing platform, and provide help for the early detection, active defense and tracing analysis of the cloud invasion.
作者 李振东
出处 《电信科学》 北大核心 2015年第12期125-129,共5页 Telecommunications Science
关键词 云计算 安全管理架构 虚拟蜜网 cloud computing, security management architecture, virtual honeyuet
  • 相关文献

参考文献5

二级参考文献57

  • 1STEELC,NAGAPPANR,LAIR.安全模式[M].陈秋萍,罗邓,袁国忠,译.北京:机械工业出版社,2006.
  • 2Foster I,Zhao Yong. Cloud Computing and Grid Computing 360 - Degree Compared[M]//2008 Grid Computing Environments Workshop, IEEE. Austin, Texas: [s. n. ] ,2008.
  • 3Aymerich F M, Fenu G, Sureis S. An Approach to a Cloud Computing Network[ C]//2008 First International Conference on Applications of Digital Information and Web Technologies, IEEE. Czech Republic: Technical University of Ostrava, 2008: 113-118.
  • 4Youseff L,Butrico M,Silva D D. Toward a Unified Ontology of Cloud Computing [ M ]//2008 Grid Computing Environments Workshop, IEEK. Austin, Texas: [ s. n. ] ,2008.
  • 5Johnston W, Metzger J,O'Connor M,et al. Network Communication as a Service- Oriented Capability[ M]//High Performance Computing and Grids in Action. [ s. l. ] : IOS Press, 2008:1 - 35.
  • 6Hanemann A,Boote J W,Boyd E L,et al. Perfsonar: A service - oriented architecture for multi - domain network monitoring [M]//ICSOC, ser. Lecture Notes in Computer Science, B. B. et al. [s. l. ]:Springer, 2005:241-254.
  • 7Hofstader J. Communications as a Service[ EB/OL]. 2007 - 11. http://msdn. microsoft. com/en - us/library/bb896003. aspx.
  • 8Koh Y,Knauerhase R C,Brett P,et al. An analysis of performance interference effects in virtual environments [ C]//ISPASS. [s.l. ] : IEEE Computer Society, 2007:200 - 209.
  • 9Buyya R, Yeo C S, Venugopal S. Market - Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities[C]//Proc. of 10th IEEE Conference on HIKe' 08, IEEE. Dalian, China: [s. n. ] ,2008:5 - 13.
  • 10IBM, Microsoft. Security in a Web Services World: A Proposed Architecture and Roadmap[ EB/OL]. 2002 - 04 - 07. http://msdn2. microsoft.com/en - us/library/ms977312. aspx.

共引文献288

同被引文献14

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部