期刊文献+

云监控服务下监控数据面临的安全风险与对策分析

Data Security Risks and Countermeasures for The Monitoring Service of Cloud Computing
下载PDF
导出
摘要 目前,云计算技术已被广泛部署于国民生产领域,国内云平台不断涌现,云监控技术是云平台日常重要的维护管理手段,然而在云监控服务过程中,大量用户的资产运营数据、个人数据、企业IDC运营数据等均有可能被第三方云监控平台持有,其涉及更严重的数据安全问题。文章对云监控服务下监控数据可能面临的各类安全威胁与安全挑战进行了分析,并给出相应的解决方案。 Recently cloud computing technology has been widely deployed in the national production fields, and domestic cloud platforms are constantly emerging. Cloud monitoring technology is an important daily maintenance and management tool for cloud platforms, but in the cloud monitoring service process, a large number of users’ asset operation data, personal data, enterprise IDC operation data, etc. may be held by a third-party cloud monitoring platform, which involves more serious data security issues. This paper analyzes various security threats and security challenges that may be faced by monitoring data under cloud monitoring services, and provides corresponding solutions.
作者 刘伟 徐雷 陶冶 Liu Wei;Xu Lei;Tao Ye(China Unicom Research Institute,Beijing 100176,China)
机构地区 中国联通研究院
出处 《信息通信技术》 2018年第6期18-24,共7页 Information and communications Technologies
关键词 安全威胁 安全挑战 云监控 数据安全 Security Threats Security Challenges Cloud Monitoring Data Security
  • 相关文献

参考文献5

二级参考文献53

  • 1Ashraf A.Deploying database appliances in the cloud[J].IEEE Data Engineering Bulletin,2009,32(1):13-20.
  • 2Rogers J, Papaemmanouil O, Cetintemel U.A generic auto-provisioning framework for cloud databases[C]//Proceedings of the 5th International Workshop on Self-Managing Database Systems, March 2010.
  • 3Soror A, Minhas U F, Aboulnaga A, et al.Automatic virtual machine configuration for database workloads[J].ACM Trans Data- base Syst,2010,35( 1 ) :7.
  • 4Rogers J, Olga P, Cetintemel U.A generic auto-provisioning framework for cloud databases[C]//Proc of the 26th Int'l Conf on Data Engineering(ICDE 2010).Washington:IEEE Computer Society,2010:63-68.
  • 5Chong F,Carraro G.Multi-tenant data arehitecture[EB/OL].(2006). http://msdn.microsoft.eom/en-us/ library/aa479086.aspx.
  • 6Menon S.Allocating fragments in distributed databases[J].IEEE Trans Parallel Distrib Syst,2005,16(7) :577-585.
  • 7Helal A, Yuan D,EI-Rewini H.Dynamic data reallocation for skew management in shared-nothing parallel databases[J].Distributed and Parallel Databases,1997,5(3) :271-288.
  • 8Menon S.Allocating fragments in distributed databases[J].IEEE Trans Parallel Distrib Syst,2005,16(7) : 577-585.
  • 9Chandra A, Gong W, Shenoy EDynamic resource allocation for shared data centers using online measurements[C]//Proc of the Int'l Conf on Measurements and Modeling of Computer Systems, SIGMETRICS 2003.New York: ACM Press, 2003 : 300-301.
  • 10Chandola V,Banerjee A,Kumar V.Anomaly detection:A survey[J].ACM Computing Surveys (CSUR),2009,41(3):15.

共引文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部