浏览全部资源
扫码关注微信
1. 上海贝尔股份有限公司战略部 上海 200120
2. 复旦大学信息科学与工程学院 上海 200433
[ "孙群英,女,博士,上海贝尔股份有限公司工程师,主要研究方向为云计算安全。" ]
[ "胡志远,女,博士,上海贝尔股份有限公司教授级高级工程师,移动开放联盟(OMA)安全组副主席、中国移动标准化通信协会(CCSA)无线通信安全组副主席,主要研究方向为信息安全。" ]
网络出版日期:2013-04,
纸质出版日期:2013-04-20
移动端阅览
孙群英, 胡志远. 云计算安全性探究[J]. 电信科学, 2013,29(4):100-105.
Qunying Sun, Zhiyuan Hu. Security of Cloud Computing[J]. Telecommunication science, 2013, 29(4): 100-105.
孙群英, 胡志远. 云计算安全性探究[J]. 电信科学, 2013,29(4):100-105. DOI: 10.3969/j.issn.1000-0801.2013.04.020.
Qunying Sun, Zhiyuan Hu. Security of Cloud Computing[J]. Telecommunication science, 2013, 29(4): 100-105. DOI: 10.3969/j.issn.1000-0801.2013.04.020.
云安全问题从云计算技术发展之初就被普遍认为是制约其发展的核心因素。首先讨论了云计算系统中的不安全因素,同时也对云计算技术带来的安全改善进行了分析,对云安全性进行了深入剖析。指出云计算系统安全取决于现有安全策略的正确部署,只要与云提供商签署适当的安全契约,云计算系统并不比本地环境的安全风险更大。最后对于保证云计算系统安全问题,分别从云提供商以及云用户两个角度给出了相应的安全策略建议。
Cloud security has been widely considered as the key factor restricting its development since the cloud computing technology emerged.The insecure factors of cloud computing system and the secure factors which cloud computing brings were presented and discussed.It was pointed out that cloud security depended on the validate deployment of the security policy.Cloud computing system is not less secure than native environment,as long as the right agreement is signed with cloud provider.Finally,the proposal of security policy was provided from both the cloud provider domain and the cloud user domain to ensure the security of cloud computing system.
房晶 , 吴昊 , 白松林 . 云计算安全研究综述 . 电信科学 , 2011 ( 4 ): 37 ~ 42
冯登国 , 张敏 , 张妍 等 . 云计算安全研究 . 软件学报 , 2011 , 22 ( 1 ): 71 ~ 83
黄瑛 , 石文昌 . 云基础设施安全性研究综述 . 计算机科学 , 2011 , 38 ( 7 ): 24 ~ 30
Subashini S , Kavitha V . A survey on security issues in service delivery models of cloud computing . Journal of Network and Computer Applications , 2011 , 34 ( 1 ): 1 ~ 11
张云勇 , 陈清金 , 潘松柏 等 . 云计算安全关键技术研究 . 电信科学 , 2010 ( 9 ): 64 ~ 69
房晶 , 吴昊 , 白松林 . 云计算的虚拟化安全问题 . 电信科学 , 2012 ( 4 ): 135 ~ 140
Sun Q , Hu Z . Security for networks virtual access of cloud computing:multimedia information networking and security (MINES) . IEEE Fourth International Conference , Nanjing,China , 2 - 4 Nov 2012
van Cleeff A , Pieters W , Wieringa R J . Security implications of virtualization:a literature study . International Conference on Computational Science and Engineering(CSE’09) , Vancouver,Canada , 29 - 31 Aug 2009
Virtual networking management white paper . http://www.dmtf.org/sites/default/files/standards/documents/DSP2025_1.0.0.pdf http://www.dmtf.org/sites/default/files/standards/documents/DSP2025_1.0.0.pdf
王丽娜 . 云计算环境下数据防泄漏关键技术研究 . http://www.emc-china.com/rsaconference/2011/download/presentations/Day2_LiNaWang_Hackers&Threats.pdf http://www.emc-china.com/rsaconference/2011/download/presentations/Day2_LiNaWang_Hackers&Threats.pdf , 2011
Van Dijk M , Gentry C , Halevi S , et al . Fully homomorphic encryption over the integers . Proceedings of EUROCRYPT 2010,French Riviera , 2010 : 24 ~ 43
0
浏览量
1154
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构