期刊文献+

云计算环境下公安敏感数据防泄漏技术研究 被引量:3

Leakage Protection Technology Research of Public Security Sensitive Data under Cloud Computing Environment
下载PDF
导出
摘要 警务信息公有云计算环境带来的问题是公安机关对数据控制力度的减弱,人们对公有云计算环境中的公安敏感数据安全性和隐私性的忧虑与日俱增。本文以公有云计算环境公安敏感数据为研究对象,旨在研究基于虚拟化技术的信息泄漏安全问题,为公安机关云平台中敏感数据增加一层安全保障,真正为公安云计算环境下敏感数据防泄漏系统中的云资源访问控制、密文检索、信息流监控、动态信息流跟踪审计、身份鉴别技术以及数据安全控制等功能的实现提供一些技术支持。 The problem of police information public cloud computing environment is the reduction to control data in the public security organs, the public security sensitive data security and privacy concerns of public cloud computing environment are growing. The research object of paper is public security sensitive data under public cloud computing environment, aims to research information leakage safety problems based on virtualization technology, and increases a layer of security for the public security organs sensitive data in cloud platform. The paper really provides some technical support for cipher text retrieval, information resources access control monitoring audit tracking, identification technology, dynamic information flow and the realization of the function of data security control of sensitive data leakage protection system in the public cloud computing environment.
作者 田静
出处 《辽宁警察学院学报》 2016年第5期62-66,共5页 Journal of Liaoning Police College
基金 2015年辽宁警察学院科研基金项目(2015lnpckyjjxm015)
关键词 云计算 公安敏感数据 防泄漏技术 cloud computing public security sensitive data leakage protection technology
  • 相关文献

参考文献4

二级参考文献42

  • 1程志.《数据库应用技术—SQL Server》课程教学设计[J].巴音郭楞职业技术学院学报,2013(1):49-50. 被引量:3
  • 2张淼.特色数据库建设中信息发布的研究与实践[J].图书馆学研究,2004(9):4-5. 被引量:4
  • 3Goldberg R P. Architectural Principles for Virtual Computer Systems [ D]. Cambridge:Harvard University, 1972 : 1-5.
  • 4Adams K, Agesen O. A comparison of software and hardware techniques for X86 virtualization[ C]// Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems. New York.. ACM, 2006:2-13.
  • 5Huang Y, Stavrou A, Ghosh A K, et al. Efficiently tracking application interactions using lightweight virtualization[C]// Proceedings of the 1st ACM Workshop on Virtual Machine Security. New York.. ACM, 2008 : 19-28.
  • 6Isolated Execution. [2008-11-21]. http://isolate& exec. sourceforge, net.
  • 7Barham P, Dragovic B, Fraser K, et al. Xen and the art of virtualization[C]//Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles. New York: ACM, 2003:164-177.
  • 8Pratt. Xen 3. 0 and the art of virtualization[C]// Proceedings of the Ottawa Linux Symposium. Ottawa: 2005 Linux Symposium, 2005:65-78.
  • 9Garfinkel T, Pfaff B, Chow J, et al. A virtual machine-based platform for trusted eomputing [C]// Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles. New York: ACM, 2003 : 193-206.
  • 10OpenTC. [2005-11-15]. http://www, opente, net.

共引文献19

同被引文献33

引证文献3

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部