期刊文献+

云存储技术与标准化 被引量:1

Cloud Storage Technology and Its Standardization
在线阅读 下载PDF
导出
摘要 通过研究分析云存储技术整体架构的五个层次:基础设备层、平台软件层、应用接口层、业务应用层以及用户访问层,提出从云存储技术基础、云存储设备、云存储软件和云存储安全等四个方面开展云存储技术标准化工作的建议。 Through the research of five layers of overall cloud storage architecture: fundamental device layer, platform software layer, application interface layer, business application layer and user access layer, we proposed that cloud storage technology standardization work can be carried out from cloud storage technology foundation, cloud storage device, cloud storage software and cloud storage security.
机构地区 华中科技大学
出处 《信息技术与标准化》 2013年第5期36-38,49,共4页 Information Technology & Standardization
基金 国家科技支撑计划课题"高技术服务业关键技术标准研究及应用示范"的子任务"云存储数据管理关键技术与接口标准研制" 项目编号:2012BAH35F03-03
关键词 云存储 技术架构 标准化 cloud storage technical architecture standardization
  • 相关文献

参考文献9

  • 1Amazon. Amazon Simple Storage Service [EB/OL]. [2013-05-08]. http://aws.amazon.com/cn/s3/.
  • 2Microsoft. Microsoft Windows Azure [EB/OL]. [2013- 05-08]. http://www.windowsazure.com/en-us/.
  • 3Google. Google Cloud Storage [EB/OL]. [2013-05-08]. http://en.wikipedia.org/wiki/Google_Storage.
  • 4SNIA. Cloud Data Management Interface Version 1.0.2[EB/ OL]. [2013-05-08]. http://wvv.snia.org/cdmi.
  • 5韩峰,闫振兴,王洁萍,李海波,宋杰.基于Key-Value的云数据管理应用接口标准化研究[J].信息技术与标准化,2011(12):27-31. 被引量:1
  • 6傅颖勋,罗圣美,舒继武.安全云存储系统与关键技术综述[J].计算机研究与发展,2013,50(1):136-145. 被引量:176
  • 7Microsoft. BitLocker [EB/OL]. [2013-05-08]. http:// en.wikipedia.org/wiki/BitLocker.
  • 8EMC. EMC Products & Solutions [EB/OL]. [2013-05- 08]. http://www.emc.com/products-solutions/index. html.
  • 9刘建毅,王枞,薛向东.云存储安全分析[J].中兴通讯技术,2012,18(6):30-33. 被引量:5

二级参考文献15

  • 1王庆波,金涬,何乐.等虚拟化与云计算[M].北京:电子工业出版社.2009.
  • 2金海.吴松,廖小飞,等云计算的发展与挑战[M].中国计算机学会学术工作委员会2009中国计算机科学技术发展报告.北京:清华大学出版社,2009.
  • 3SNIA Cloud [EB/OL]. [2011-10-15]. http:// www.snia,org/cloud. 2011.
  • 4SNIA. Cloud Data Management Interface (Version 1.0)[EB/OL]. [2011-10-15]. http:// cdmi.sniacloud.com. 2011.
  • 5BOWERS K D, JUELS A, OPREA A. HAIL: A high availability and integrity layer for cloud storage [C].Proceedings of the 16th ACM Conference on Computer and Communications Security(CCS' 09), Nov 9-13, 2009, Chicago, IL, USA. New York, NY USA: ACM. 2009: 489-501.
  • 6CACHIN C, KEIDAR I, SHRAER A. Trusting the cloud [J]. ACM SIGACT News, 2009, 40 (2):455-461.
  • 7ALl T, NAUMAN M, HADI F E, et al. On usage control of multimedia content in andthrough cloud computing paradigm [C]. Proceedings of the 5th International Conference on Future Information Technology (FutureTech ' 10), May 21-23, 2010, Busan, Republic of Korea. Los Alamitos, CA, USA: IEEE Computer Society, 2010:5p.
  • 8LOU X, HkA/ANG K. Co(lusive piracy prevention in P2P content delivery networks [J].IEEE Transactions on Computers, 2009, 58(7): 970-983.
  • 9HWANG K, LID Y. Trusted cloud computing with secure resources and data coloring [J]. IEEE Internet Computing, 2010, 14(5): 14-22.
  • 10THARAUD J, WOHLGEMUTH S, ECHIZEN I et al. Privacy by data provenance with digita watermarking [C].Proceedings of the 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIH-MSP' 10), Oct 15-17, 2010, Darmstadt. Germany, Piscataway. NJ USA: IEEE. 2010:510-513.

共引文献179

同被引文献1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部