期刊文献+

云计算的应用前景及安全问题

The Application Prospect and the Security Issues of Cloud Computing
下载PDF
导出
摘要 云计算作为一种强大的网络应用模式,具有超大规模、虚拟化、可靠安全等独特功效。旨在通过网络把若干个成本相对低的计算实体整合成一个具有强大计算能力的超级系统进而减少用户终端的处理负担。该文从云计算的概念入手,对云计算的特点、应用前景及面临的安全问题进行了介绍。 Cloud computing is a powerful network application mode, has a very large scale, virtualization, reliable safety unique effect. Through the calculation of several network entities at relatively low cost integrated into a powerful computing capability and reduce the processing burden of the super system of user terminal. Starting from the concept of cloud computing, characteristics of cloud computing, the application prospects and the security problems are introduced.
作者 廖坚
出处 《电脑知识与技术》 2014年第3X期1874-1875,共2页 Computer Knowledge and Technology
关键词 云计算 虚拟化技术 安全性 cloud computing,virtualization technology safety
  • 相关文献

参考文献3

二级参考文献29

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Brodkin. Gartner: seven cloud-computing security risks[DB/OL]. http://www.networkworld.comlnews/2008/070208-cloud. html, 2008-07-02.
  • 3Cao Tian-jie , Zhang Yong-ping, Wang Chu-jiao. Security protocol [ M]. Beijing: Beijing University of Posts and Telecommunications Press, 2009.
  • 4Aaram Yun, Shi Chun-hui, Yongdae Kim. On protecting integrity and confidentiality of cryptographic file system for outsourced storage [ C]. In CCSW'09: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, Chicago, Illinois, USA, 2009: 67- 75.
  • 5Carter J L, Wegman M N. Universal classes of hash functions (extended abstract) [ A]. STOC '77: Proceedings of the Ninth Annual ACM Symposium on Theory of Computing, New York, NY, USA [C]. ACMPress, 1977:106-112.
  • 6Wang Cong , Wang Qian , Ren Kui, et al. Ensuring data storage security in cloud computing [ C]. In IWQoS' 09: Proceedings of 17th International Workshop on Quality of Service, Charleston, SC, USA, 2009:1-9.
  • 7Adi Shamir. Identity-based cryptosystems and signature schemes [ C]. In Proceedings of CRYPTO'84 on Advances in Cryptology, Santa Barbara, California, USA, 1985 :47-53.
  • 8Horwitz J, Lynn B. Toward hierarchical identity-based encryption [C]. In Proceedings of EUROCRYPT 2002, LNCS, Springer, Heidelberg ,2002 ,2332 :466481.
  • 9Li H, Dai Y, Tian L,et al. Identity-based authentication for cloud computing[ C]. In CloudCom'09: Proceedings of the 1 st International Conference on Cloud Computing, Beijing, China, 2009: 157-166.
  • 10Yu S, Wang C, Ren K, et al. Achieving secure, scalable, and fine-grained data access control in cloud computing [ C]. In Proceedings of IEEE INFOCOM, 2010:534-542.

共引文献143

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部