期刊文献+

基于SDN技术的多区域安全云计算架构 被引量:4

Multi-Zone Secure Cloud Computing Fabrics Based on SDN Technology
下载PDF
导出
摘要 提出了一种在云计算环境中实施云安全防护的方案.方案在原有的业务云之外,用云技术建设安全云,在业务云中部署安全代理,通过软件定义的网络技术连接业务云、安全云和安全代理,并且通过安全代理把业务云动态划分为逻辑隔离的多个业务区域。不同业务的数据在业务子云之间隔离,提升了安全性,而各业务子云仍可通过安全的途径共享整个业务云的资源,享受云计算的优势.方案不依赖于业务云的实现方式,除近乎初始零配置的安全代理外,不改变业务云的软硬件结构,具有易部署、易维护、安全性更高等特点. This paper presents an implementation o f cloud security solutions in the cloud computing environment. Program in addition to the original business cloud, cloud security cloud technology to bui ld, deploy in the cloud security service agents, through SDN technology to connect business cloud security cloud and security agents, and by security agents of the business cloud Live in to logical isolation multiple business areas. The program does not rely on business cloud implementations. It does not change the hardware and software structure in addition to almost zero initial configuration of security agents. It is easy to deploy, maintain, and more safe.
作者 王刚
出处 《信息安全研究》 2015年第1期86-91,共6页 Journal of Information Security Research
关键词 云计算 云安全 安全代理 安全云 软件定义的网络 安全即服务 cloud computing cloud secur ity security agent secure cloud SDN security as a service
  • 相关文献

参考文献2

二级参考文献31

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1100

同被引文献25

引证文献4

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部