期刊文献+

云计算安全技术最新研究进展 被引量:7

Latest Research Progress on Security Technology of Cloud Computing
下载PDF
导出
摘要 随着云计算的快速发展,安全威胁也日益成为云计算面临的严重问题,各种面向云计算的攻击技术与防御方案也被不断提出。首先,对云计算中非常重要的几种攻击技术:服务窃取攻击、拒绝服务攻击、恶意软件注入攻击、跨VM侧信道攻击、目标共享存储器攻击、VM回滚攻击及最新防御方案的基本原理、特点与不足进行了深入剖析与研究。其次,对云计算的数据安全与隐私问题进行了进一步阐述与分析。最后,对云计算安全技术进行了总结与展望。 With the rapid development of cloud computing, the security problem of cloud computing be- comes increasingly serious. Various attack technologies and defense schemes aiming at cloud computing are unceasingly proposed. Firstly, the principles, characteristics and defects of the important attack technolo- gies are described, including theft-of-service attacks, denial-of-service-attacks, malware injection at- tacks, cross VM side-channel attacks, targeted-shared memory attacks, VM-rollback attacks and the cor- responding defense schemes also deeply discussed and analyzed. Then, the security and privacy of data in cloud computing are expounded and analyzed in detail. Finally, the security technology of cloud computing are summarized and forecasted.
作者 马飞 李娟
出处 《通信技术》 2016年第5期509-518,共10页 Communications Technology
基金 宁夏回族自治区'计算机应用技术'重点学科项目~~
关键词 云计算 安全 隐私 攻击技术 防御技术 全同态加密 cloud computing security privacy attack technology defense technology fully homomorphicencryption
  • 相关文献

参考文献54

  • 1Schahram Dustdar, TU Wen. Cloud Computing[ J]. IEEE Computer, 2016, 49 (2) :12-13.
  • 2ZHOU M, ZHANG R, XIE W, et al. Security and Priva- cy in Cloud Computing: A Survey [ C ] //Semantics Knowledge and Grid, 2010 6th International Conference on. IEEE,2010 : 105-112.
  • 3Hashizume K, Rosado D G, Fernendez-Medina E, et al. An Analysis of Security Issues for Cloud Computing [ J ]. Journal of Internet Services and Applications, 2014, 14 (1) :1-13.
  • 4Kumara S, Singhb S P, Singhc A K, et al. Virtuiza- tion,Great Thing and Issues in Cloud Computing[ J]. In- ternational Journal of Current Engineering and Technolo- gy ,2014,3 ( 3 ) : 125-140.
  • 5徐远泽,张文科,尹一桦,罗影.APT攻击及其防御研究[J].通信技术,2015,48(6):740-745. 被引量:12
  • 6Nirmala V, Sivanandhan R K, Lakshmi R S. Data Confi- dentiality and Integrity Verification Using User Authenti- cator Scheme in Cloud [ C ]//Green High Performance Computing (ICGHPC), 2013 IEEE International Confer- ence on. IEEE, 2014 : 1-5.
  • 7Challa Jensen M, Schwenk J, et al. On Technical Securi- ty Issues in Cloud Computing [ C ]//Cloud Computing, 2009. IEEE International Conference on. IEEE, 2009: 109-116.
  • 8Chhikara, Takabi H, Joshi J B D, Ahn G J. Security and Privacy Challenges in Cloud Computing Environments [J]. IEEE Security & Privacy, 2010, 8(6) : 24-31.
  • 9Park B. Modi C, Patel D, Borisaniya B, et al. A Survey on Security Issues and Solutions at Different Layers of Cloud Computing [ J ]. The Journal of Supercomputing, 2014, 63(2): 561-592.
  • 10Lombardi F, Di Pietro R. Secure Virtualization for Cloud Computing[J]. Journal of Network and Computer Applications, 2011, 34(4): 1113-1122.

二级参考文献14

共引文献11

同被引文献34

引证文献7

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部