期刊文献+

云计算安全架构及防护机制研究 被引量:5

Cloud Computing Security Architecture and Protection Mechanism
下载PDF
导出
摘要 资源弹性伸缩、数据动态迁移以及平台租户共享等云计算技术,在最大限度发挥IT资源集约化管理效益的同时,也为云上应用引入了潜在的安全风险。云平台系统特权、软件缺陷和数据泄漏等引发的安全问题,已成为云租户敏感应用上网入云的最大障碍。围绕如何构建安全可信的云租户应用环境,系统研究了云计算安全架构,基于分域防护安全策略和安全服务链防护思想,提出了“域安全+流防护”云安全架构,并着重研究了相关安全防护机制。 Cloud computing technologies such as resource resiliency, data dynamic migration, and platform tenant sharing, while maximizing the benefits of IT resource intensive management, also introduce potential security risks for cloud applications. The security issues caused by cloud platform system privileges, software defects and data leakage have now become the biggest obstacle for cloud tenants to migrate security-sensitive applications onto the cloud. The cloud computing security architecture is systematically explored around how to build a secure and trusted cloud tenant application environment. Based on the security policy of domain protection and the protection of security service chain, the cloud security architecture of "domain security + stream protection" is proposed, and the related security protection mechanism is emphasized.
作者 廖飞 陈捷 肖云峰 LIAO Fei;CHEN Jie;XIAO Yun-feng(No.30 Institute of CETC, Chengdu Sichuan 610041, China;Unit 92682 of PLA, Zhanjiang Guangdong 524000, China)
出处 《通信技术》 2019年第10期2472-2482,共11页 Communications Technology
关键词 云计算 安全防护 安全架构 安全机制 租户安全 cloud computing security protection security architecture security mechanism tenant security
  • 相关文献

参考文献4

二级参考文献122

  • 1林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 2樊亚军,刘久文.TPM安全芯片设计与实现[J].信息安全与通信保密,2007,29(6):136-137. 被引量:5
  • 3张旻晋 桂文明 苏递生 等.从终端到网络的可信计算技术.信息技术快报,2006,4(2):21-34.
  • 4Garg V K.Elements of Distributed Computing.Wiley-IEEE Press,2002.
  • 5Foster I,Kesselman C,Tuecke S.The anatomy of the grid:Enabling scalable virtual organizations.International Journal of High Performance Computing Applications,2001,15(3):200-222.
  • 6Schoder D,Fischbach K.Peer-to-peer prospects.Communications of the ACM,2003,46(2):27-29.
  • 7Mell P,Grance T.The NIST definition of cloud computing (draft).NIST Special Publication,2011,800:145.
  • 8Almorsy M,Grundy J,Müller I.An analysis of the cloud computing security problem//Proceedings of the 2010 Asia Pacific Cloud Workshop,Collocated with APSEC2010.Sydney,Australia,2010:1-10.
  • 9Chen Y,Paxson V,Katz R H.What' s new about cloud computing security? University of California,Berkeley Report No.UCB/EECS 2010-5,January,2010.
  • 10Ristenpart T,Tromer E,Shacham H,et al.Hey,you,get off of my cloud:exploring information leakage in third-party compute clouds//Proceedings of the 16th ACM Conference on Computer and Communications Security.Chicago,USA,2009:199-212.

共引文献331

同被引文献15

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部