浏览全部资源
扫码关注微信
[ "许剑(1983- ),男,北京中电飞华通信有限公司分公司总经理、高级工程师,主要研究方向为系统信息化安全、电力需求侧管理等" ]
[ "靳莉(1981- ),女,现就职于北京中电飞华通信有限公司,主要研究方向为智能用电、智慧小区等" ]
网络出版日期:2020-07,
纸质出版日期:2020-07-20
移动端阅览
许剑, 靳莉. 一种可量化的云计算平台安全评估模型[J]. 电信科学, 2020,36(7):163-167.
Jian XU, Li JIN. A quantifiable cloud computing platform security evaluation model[J]. Telecommunications science, 2020, 36(7): 163-167.
许剑, 靳莉. 一种可量化的云计算平台安全评估模型[J]. 电信科学, 2020,36(7):163-167. DOI: 10.11959/j.issn.1000-0801.2020185.
Jian XU, Li JIN. A quantifiable cloud computing platform security evaluation model[J]. Telecommunications science, 2020, 36(7): 163-167. DOI: 10.11959/j.issn.1000-0801.2020185.
提出一种基于一致的API访问不同云的可量化安全评估模型。评估系统包括安全扫描引擎模块、安全恢复引擎模块、安全量化评估模块、可视化显示模块等。介绍了安全评估过程及修复过程,并基于G-Cloud平台进行了仿真验证。结果显示,所提模型可以通过可视化图形显示一个或多个云的动态安全扫描评分,能够引导用电用户修改配置、改进操作、修复漏洞,提高云用电资源的安全性。
A quantifiable security assessment model for accessing different clouds based on a consistent API was proposed.The evaluation system includes a security scan engine module
a security recovery engine module
a security quantitative evaluation module
and a visual display module.The progress of safety assessment and remediation was proposed
and simulation verification was carried out based on the G-Cloud platform.The results show that the proposed model can display the dynamic security scan scores of one or more clouds through visual graphics
which can guide electricity users to modify configurations
improve operations
repair vulnerabilities
and improve the security of cloud electricity resources.
李鸿 . 云计算环境下计算机信息安全与保密技术 [J ] . 信息与电脑(理论版) , 2018 ( 17 ): 163 - 164 .
LI H . Computer information security and confidential technology in cloud computing environment [J ] . Information and Computer (Theoretical Edition) , 2018 ( 17 ): 163 - 164 .
刘恩军 . 大数据云计算环境下的数据安全分析 [J ] . 网络安全技术与应用 , 2019 ( 5 ): 56 - 58 .
LIU E J . Data security analysis under big data cloud computing environment [J ] . Network Security Technology and Application , 2019 ( 5 ): 56 - 58 .
NISHII K , TANIGAWA Y , TODE H . A search method of large-scale resources for providing efficient computing on a participating fine-granular cloud computing platform [C ] // Proceedings of 2018 IEEE 7th International Conference on Cloud Networking (CloudNet) . Piscataway:IEEE Press , 2018 .
刘邵星 , 杨尚跃 , 杨树国 . 基于云计算层次架构的安全框架研究 [J ] . 软件导刊 , 2014 ( 5 ): 162 - 164 .
LIU S X , YANG S Y , YANG S G . Research on security framework based on cloud computing hierarchy [J ] . Software Guide , 2014 ( 5 ): 162 - 164 .
IKRAM M A , ALSHEHRI M D , HUSSAIN F K . Architecture of an IoT-based system for football supervision (IoT Football) [C ] // Proceedings of 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT) . Piscataway:IEEE Press , 2015 .
葛思江 , 王利明 , 李兆璨 , 等 . 云计算网络中基于隔离边界的安全审计体系研究 [J ] . 智能计算机与应用 , 2019 , 9 ( 3 ): 16 - 22 .
GE S J , WANG L M , LI Z C , et al . Research on security audit system based on isolation boundary in cloud computing network [J ] . Intelligent Computer and Application , 2019 , 9 ( 3 ): 16 - 22 .
SINGH M , SINGH A , KIM S . Blockchain:a game changer for securing IoT data [C ] // Proceedings of 2018 IEEE 4th World Forum on Internet of Things (WF-IoT) . Piscataway:IEEE Press , 2018 .
吴宝江 . 云计算安全威胁及防护思路分析 [J ] . 通信技术 , 2018 , 51 ( 8 ): 1961 - 1964 .
WU B J . Analysis of cloud computing security threats and protection ideas [J ] . Communication Technology , 2018 , 51 ( 8 ): 1961 - 1964 .
0
浏览量
362
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构