期刊文献+

云计算安全问题研究综述 被引量:92

Survey on Some Security Issues of Cloud Computing
下载PDF
导出
摘要 随着云计算的蓬勃发展,越来越多的企业和个人将他们的存储和计算需求付诸于云端.然而云计算的安全仍不容忽视,是当前的一个研究热点.对近年来云计算安全相关的研究成果进行总结,主要集中于数据安全,身份认证以及访问控制策略方面.也介绍了与可信计算技术相结合的云计算安全的相关研究框架和项目.根据这些研究成果,认为将可信计算与云计算思想相结合,建立"可信云计算"是未来云计算安全研究的一个重要方向.并且在最后提出了"可信云计算"发展的几个可能的研究主题. More and more organizations and individuals outsource their storage and computing needs into a new economic and computing model,which is commonly referred to as cloud computing.As one of the hottest research issues,cloud computing security is also concerned by many scholars.This paper survey the recent advances in some security issues of cloud computing,which mainly focuses on the topics of data security,identity authentication and access control policy in cloud computing environment.It also introduces some enhancement frameworks and projects about the cloud security integrated with the Trusted Computing.According to these surveys,this paper believes that the combination between trusted computing and cloud computing will be a promising direction of the future cloud security researches,and proposes some interesting research issues in the end.
出处 《小型微型计算机系统》 CSCD 北大核心 2012年第3期472-479,共8页 Journal of Chinese Computer Systems
基金 上海市科委科技支撑计划项目(072712036)资助
关键词 云计算 数据完整性 身份认证 访问控制策略 可信云计算 cloud computing data integrity identity authentication access control policy trusted cloud computing
  • 相关文献

参考文献24

  • 1Li J, Wang Q, Wang C, et al. Fuzzy keyword search over encrypted data in cloud computing[ C]. In Proc. of IEEE INFOCOM/lO Mini-Conference, San Diego, CA, USA, 2010.
  • 2Robert Biddle PC, van Oorschot, Andrew S Patrick. Browser interfaces and extended validation SSL certificates: an empirical study[C]. Proceedings of the 2009 ACM Workshop on Cloud Computing Security, Chicago, Illinois, USA, 2009: 19-30.
  • 3Horwitz J, Lynn B. Toward hierarchical identity-based encryption [C]. In Proceedings of EUROCRYPT 2002, LNCS, Springer, Heidelberg ,2002 ,2332 :466481.
  • 4Brodkin. Gartner: seven cloud-computing security risks[DB/OL]. http://www.networkworld.comlnews/2008/070208-cloud. html, 2008-07-02.
  • 5Matthews J, Garfinkel T, Hoff C, et al. Virtual machine contracts for datacenter and cloud computing environments [ C]. In Workshop on Automated Control for Datacenters and Clouds (ACDC) , ACM,2009:25-30.
  • 6Li H, Dai Y, Tian L,et al. Identity-based authentication for cloud computing[ C]. In CloudCom'09: Proceedings of the 1 st International Conference on Cloud Computing, Beijing, China, 2009: 157-166.
  • 7Carter J L, Wegman M N. Universal classes of hash functions (extended abstract) [ A]. STOC '77: Proceedings of the Ninth Annual ACM Symposium on Theory of Computing, New York, NY, USA [C]. ACMPress, 1977:106-112.
  • 8Murray D G, Milos G, Hand S. Improving xen security through disaggregation[ C]. In Proceedings of VEE/08, New York, NY, USA,2008:151-160.
  • 9Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography[ C]. In Proc. of EUROCRYPT '98, 1998.
  • 10Adi Shamir. Identity-based cryptosystems and signature schemes [ C]. In Proceedings of CRYPTO'84 on Advances in Cryptology, Santa Barbara, California, USA, 1985 :47-53.

共引文献372

同被引文献632

引证文献92

二级引证文献376

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部