期刊文献+

云计算安全:概念、现状与关键技术 被引量:21

Cloud Computing Security: Concept, Status and Key Technologies
在线阅读 下载PDF
导出
摘要 随着云计算的广泛应用,云计算安全问题逐渐凸显出来。文章首先阐述了云计算安全相关概念,并对云计算的安全问题和云计算安全特征进行分析,然后对云计算安全的现状和典型的云计算安全体系架构进行了介绍,并对云计算安全的关键技术进行分析,最后给出了结论。 With the extensive application of cloud computing, its security issues are increasingly prominent. Firstly the paper explains the relevant concepts of cloud computing security, and cloud computing security issues and cloud computing security features are analyzed. And then, cloud computing security status and the typical cloud computing security architecture are introduced, and the key technologies of computing security are analyzed. Finally it gives the conclusion.
出处 《信息网络安全》 2012年第8期86-89,共4页 Netinfo Security
关键词 云计算 云计算安全 虚拟化安全 cloud computing cloud computing security virtualization security
  • 相关文献

参考文献15

  • 1Mell P, Grance T. The NIST Definition of Cloud Computing[R]. National Institute of Standards and Technology, Information Technology Laboratory, 2009.
  • 2Gartner: Seven cloud-computing security risks[EB/OL]. http:/ /www.networkworld.com/news/2OOS/O70208-cloud.html, 2008-07-02/2012-07-12.
  • 3冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1088
  • 4Cloud Security Alliance. Security Guidance for Critical Areas of Focus in Cloud Computing V3.0[R]. The Cloud Security Appliance,2011.
  • 5Yan Liang, P, ong Chun- ming, Zhao Gan- sen. Strengthen cloud computing security with federal identity management using hierarchical identity- based cryptography[C]. In CloudCom' 09: Proceedings of the 1st International Conference on Cloud Computing, Beijing, China, 2009. 167- 177.
  • 6Elisa Bertino, Federica Paci, P, odolfo Ferrini. Privacy-preserving Digital Identity Management for Cloud Computing[EB/OL]. http://www. uceresource.org/articles/Engineering/2009/BODE-09-vol-32-1-3.pdf, 2012-07-12.
  • 7Ryan K L Ko, Peter Jagadpramana, Miranda Mowbray. et al.Trust Cloud: A Framework for Accountability and Trust in Cloud Computing[EB/OL]. http://www.hpl.hp.com/techreports/2011/ HPL-2011-38.pdf, 2011-06-22/2012-07-12.
  • 8S. Chen and C. Wang, Accountability as a Service for the Cloud: From Concept to Implementation with BPEL[C]. Proc. 6th IEEE World Congress on Services(SERVICES-1),IEEE, 2010. 91-98.
  • 9Centry C. A Fully Homorphic Encryption Scheme[D]. Stanford University, Califomia, September 2009.
  • 10Jensen M, S S, SchwenkJ. Towards an Anonymous Access Control and Accountability Scheme for Cloud Computing[C]. The 3rd International Conference on Cloud Computing. Miami, Florida, USA, 2010. 540-541.

二级参考文献24

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:341
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1087

同被引文献132

引证文献21

二级引证文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部