期刊文献+

基于云计算的安全数据存储分析 被引量:1

Secure Data Storage Analysis Based on Cloud Computing
下载PDF
导出
摘要 针对当前科学技术的不断进步,云计算在各个领域得到了广泛的应用。而在云计算技术应用的过程中,是否保证其存储数据的安全性成为各个企业所研究的重要课题,也是各个企业最为关注的焦点。论文首先对云计算做了简要概述,其次对云计算存储数据的安全性进行分析,并对云计算安全数据的存储设计进行深一层的探究。 In view ofthe currentprogressof science andtechnology, cloudcomputinghasbeen widelyused in variousfieldss In the process of cloud computing technology application, whether to ensure the security of its storage data has become an important research topic of each enterprise, but also the focus of attention of each enterprise. This paper first gives a brief overview of cloud computing. Secondly, the security of cloud computing storage data is analyzed, and the storage design of cloud computing security data is explored deeply.
作者 刘臣
机构地区 重庆工程学院
出处 《网络空间安全》 2017年第1期78-80,共3页 Cyberspace Security
关键词 云计算 安全 数据存储 cloudcomputing securery datastorage
  • 相关文献

参考文献3

二级参考文献60

  • 1Kaufman L M. Data security in the world of cloud computing [ J]. IEEE Security and Privacy ,2009(7 ) :61-64.
  • 2Vaquero L M, Rodero-Merino L. A break in the clouds:to- wards a cloud definition[ J ]. ACM SIGCOMM Computer Com- munication Review ,2009,39( 1 ) :50-55.
  • 3Cloud Computing [ EB/OL ]. 2010. http ://en. wikipedia, org/ wiki/Cloud_computing.
  • 4European Network and Information Security Agency. Cloud computing:benefits, risks and recommendations for information security[ R]. 2009.
  • 5Amazon elastic compute cloud (Amazon EC2 ) [ EB/OL ]. 2008. http ://aws. amazon, corrr/ec2.
  • 6Amazon simple storage service ( Amazon S3 ) [ EB/OL ]. 2009. http :Haws. amazon, corn/s3/.
  • 7SCHELL R R.Security--A big question for big data[R].California:University of Southern California,2013:1-24.
  • 8SENGUPTA S,KAULGUD V,SHARMA V S.Cloud computing security-trends and research directions[C]//IEEE World Congress on Digital.2011:524-531.
  • 9YU S,WANG C,REN K,et al.Achieving secure,scalable,and finegrained data access control in cloud computing[C]// IEEE INFOCOM.2010:1-9.
  • 10DI VIMERCATI S D C,FORESTI S,JAJODIA S,et al.A data outsourcing architecture combining cryptography and access control[C]//Proc of the ACM Workshop on Computer Security Architecture(CSAW).2007:63-69.

共引文献171

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部