期刊文献+

云计算环境下的信息安全问题研究 被引量:5

Information Security based on Cloud Computing
原文传递
导出
摘要 基于云计算的信息安全问题是当前国家安全中的一个重要组成部分,直接影响国家的政治稳定和社会安全。文中首先从技术和运营两个层面对云计算的定义进行了解读,分析了云计算的核心技术,在此基础上明确了云计算安全与传统安全之间的区别。其次,探讨了云计算技术给信息安全带来的4个挑战;最后,重点结合前边的研究给出了云计算安全建设的相关建议。 Information security based on cloud computing, as an important part of the current national security, has direct impacts on the political stability and social security of the eountry. From the two aspects of technology and operation this article makes a brief interpretation on the definition of cloud computing, and analyzes the core technology of eloud eomputing, and based on this, clearly defines the differences between cloud computing and traditional seeurity. Then it diseusses the four challenges brought by cloud computing technology to information security. Finally in combination with the above-mentioned study, this article gives some suggestions in the construction of cloud eomputing security.
出处 《信息安全与通信保密》 2013年第9期68-72,共5页 Information Security and Communications Privacy
关键词 云计算 信息安全 对策 cloud computing information security countermeasures
作者简介 作者简介:张显龙,男,1976年生,博士,主要研究方向:信息安全战略、管理与信息系统。
  • 相关文献

参考文献10

二级参考文献91

  • 1徐雷,张云勇,吴俊,房秉毅.云计算环境下的网络技术研究[J].通信学报,2012,33(S1):216-221. 被引量:35
  • 2马永仁,周津慧,刘东苏.谈网格计算及知识型信息服务[J].情报杂志,2005,24(1):46-47. 被引量:7
  • 3庞丽萍,唐晓辉,羌卫中,章勤.分布式计算模式及其软件开发包[J].华中科技大学学报(自然科学版),2005,33(4):10-12. 被引量:8
  • 4罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 5Sims K. IBM introduces ready-to-use cloud computing collaboration services get clients started with cloud computing. 2007. http://www-03.ibm.com/press/us/en/pressrelease/22613.wss
  • 6Boss G, Malladi P, Quan D, Legregni L, Hall H. Cloud computing. IBM White Paper, 2007. http://download.boulder.ibm.com/ ibmdl/pub/software/dw/wes/hipods/Cloud_computing_wp_final_8Oct.pdf
  • 7Zhang YX, Zhou YZ. 4VP+: A novel meta OS approach for streaming programs in ubiquitous computing. In: Proc. of IEEE the 21st Int'l Conf. on Advanced Information Networking and Applications (AINA 2007). Los Alamitos: IEEE Computer Society, 2007. 394-403.
  • 8Zhang YX, Zhou YZ. Transparent Computing: A new paradigm for pervasive computing. In: Ma JH, Jin H, Yang LT, Tsai JJP, eds. Proc. of the 3rd Int'l Conf. on Ubiquitous Intelligence and Computing (UIC 2006). Berlin, Heidelberg: Springer-Verlag, 2006. 1-11.
  • 9Barroso LA, Dean J, Holzle U. Web search for a planet: The Google cluster architecture. IEEE Micro, 2003,23(2):22-28.
  • 10Brin S, Page L. The anatomy of a large-scale hypertextual Web search engine. Computer Networks, 1998,30(1-7): 107-117.

共引文献2489

同被引文献27

  • 1刘玮,王丽宏.云计算应用及其安全问题研究[J].计算机研究与发展,2012,49(S2):186-191. 被引量:26
  • 2任平.欧洲数字信息长期保存研究及其启示[J].大学图书馆学报,2005,23(4):26-30. 被引量:24
  • 3白岩,周海燕,王桂艳.计算机网络信息技术[J].现代情报,2005,25(10):146-148. 被引量:10
  • 4雷丙超.基于云计算的安全性研究[D].广西民族大学,2011.
  • 5MELL P, GRANCE T. The NIST Definition of Cloud Computing [ R ]. Gaithersburg : NIST Special Publica- tion, 2011 : 1-7.
  • 6ZHANG Q, CHENG L, BOUTABA R. Cloud Compu- ting: State-of-the-art and Research Challenges [J]. Internet Services and Applications, 2010, 1 ( 1 ) :7-18.
  • 7VAQUERO L M, RODERO-MERINO L, CACERES J, et al. A Break in the Clouds: Towards a Cloud Def- inition[J]. ACM SIGCOMM Computer Communication Review, 2009,39( 1 ) :50-55.
  • 8WANG C, WANG Q, REN K, et al. Privacy-Preser- ving Public Auditing for Data Storage Security in Cloud Computing[ C]//IEEE INFOCOM 2010 Proceedings, San Diego, 2010 : 1-9.
  • 9SUBASHINI S,KAVITHA V. A Survey on Security Is- sues in Service Delivery Models of Cloud Computing [J]. Network and Computer Applications, 2010, 34 (1):1-11.
  • 10国家科学图书馆与英国自然出版集团签署数字资源长期保存合作协议[EB/OL].http://www.las.ac.cn/subpage/Information_Content.jsp ?InformationID=5641,2014-03-09.

引证文献5

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部