期刊文献+

云计算时代等级保护面临的挑战 被引量:4

CLOUD COMPUTING BRINGS CHALLENGES TO CLASSIFIED PROTECTION POLICY
下载PDF
导出
摘要 云计算具有数据高度集中、高度虚拟化、可伸缩性、多租户等特点,在提供高效率、低成本的服务的同时,也引入了更多的信息安全风险。等级保护制度是我国提高信息安全保障能力和水平、维护国家安全、社会稳定和公共利益的一项基本制度。分析云计算面临的安全问题,结合等级保护工作,探究等级保护制度在云计算环境中面临的挑战,并提出健全法律法规、完善技术及管理标准、科学合理定级、发展云安全技术、自主研发云平台共五项建议。 Cloud computing system is famous for highly concentrated data, high virtualisation, rapid elasticity and multi-tenancy. While providing us with high efficiency and lower cost services, it also introduces more security risks. Classified protection system is a fundamental policy in our country that improves the capability and level in supporting the information security, maintaining the state security, social stability and public interests of China. In this paper we analyse the security issues encountered by the cloud computing, investigate the challenges faced by the classified protection policy in cloud computing environment, and put forward five suggestions in this regard, they are:to strengthen the laws and regulations, to perfect the criteria of" technology and management, to grade the classifications scientifically and reasonably, to develop cloud security technique and to independently research and develop cloud platform.
作者 江雪 何晓霞
出处 《计算机应用与软件》 CSCD 北大核心 2014年第3期292-294,共3页 Computer Applications and Software
基金 上海市科学技术委员会资助项目(12dz1506200)
关键词 云计算 等级保护 信息安全 Cloud computing Classified protection system Information security
  • 相关文献

参考文献8

  • 1IBM. IBM Cloud Computing[ EB/OL]. [2012 -O1 -15 ]. http ://www -31. ibm. com/ibm/cn/cloud/about/index, shtml.
  • 2Mell P,Grance T. A NIST Definition of Cloud Computing[ EB/OL]. [ 2012-01-15 ]. http://csrc, nist. gov/publications/PubsSPs, html/ SPSO0 - 145. pdf.
  • 3ENISA. Benefits,Risks and Recommendations for Information Security [EB/OL]. [ 2012 -01 - 15 ]. http://www, enisa, europa, eu/act/ nn/files/deliverables/cloud - computing - risk - assessment/Cloud Computing Security Risk Assessment. pdf.
  • 4GARTNER. Assessing the Security Risks of Cloud Computing [ EB/ OL]. [ 2012-01-10]. http://www, gartner, eom/DisplayDoeument? id = 685308.
  • 5CSA. Security Guidance for Critical Areas of Focus in Cloud Computing V3.0 [ EB/OL ]. [ 2012-01-10 ]. https ://www. eloudsecurityalliance. org/guidance/.
  • 6赵粮 裘晓峰.云计算环境的安全威胁和保护.中国计算机学会通讯,2010,6(5):47-50.
  • 7Forum J. Cloud cube model:' selecting cloud formations for secure col- laboration [ EB/OL ]. ( 2010-01-15 ). [ 2012-01-10 ]. http://www. opengroup, org/jericho/cloud cube_model_vl. 0. pdf.
  • 8张云勇,陈清金,潘松柏,魏进武.云计算安全关键技术分析[J].电信科学,2010,26(9):64-69. 被引量:139

二级参考文献15

  • 1Sanjay Ghemawat, Howard Gobioff, Shun-Tak Leung. The google file system, http://labs.google.condpapers/gfs-sosp2003.pdf.
  • 2Mike Burrows. The chubby lock service for loosely-coupled distributed systems, http://labs.google.com/papers/chubby-osdi06.pdf.
  • 3Michael Armbrust, Armando Fox, Rean Griffith, et al. Above the clouds: a berkeley wiew of cloud computing.Communication Magazine, 2009.
  • 4IBM虚拟化与云计算小组.虚拟化与云计算.北京:电子工业出版社.2009.
  • 5Michael Miller著.姜进磊,孙瑞志,向勇等译.云计算.北京:机械工业出版社.2009.
  • 6刘黎明.云计算一第三次IT产业变革.http://labs.chinamobile.com/mblog/74856_1794.
  • 7尼古拉斯·卡尔.IT不再重要.北京:中信出版社,2008.
  • 8范承工.抢云市场先机,迎产业洗牌,http://storage.it168.com/a2009/0526/577/000000577295.shtml,2009.
  • 9电信运营商将主导企业云计算市场,http://labs.chinamobile.com/mblog/57950_11090.
  • 10中电信抢滩云计算在上海开建“信息银行”.http://www.ezcom.cn/Article/16813.

共引文献143

同被引文献75

  • 1牛德华,马建峰,马卓,李辰楠,王蕾.基于属性的安全增强云存储访问控制方案[J].通信学报,2013,34(S1):276-284. 被引量:12
  • 2林宁,吴志刚.我国信息安全标准化概况[J].信息技术与标准化,2006(8):6-8. 被引量:8
  • 3林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966. 被引量:67
  • 4国家计算机网络应急技术处理协调中心著:(2014年我国互联网网络安全态势报告》,http://www.cert.org.cn/publish/main/12/2015/20150430151528629942561/201504351528629942561一html,最后访问日期:2016年7月13日.
  • 5国家互联网应急中心:(2015年我国互联网网络安全态势报告》,http://www.eert.org.cn/publish/main/12/2016/20160422085056915532001/20160422085056915532001一html,最后访问日期:2016年7月17日.
  • 6Council on Foreign Relations, "The Top Five Cyber Policy Developments of 2014: A Year of Corporate Cyberattacks", Dec 30, 2014, http://blogs, cfr. rg/cyber/24/2/3/the-tp-ve-cyber-picy-devepments-f-24-a-year-f-cr- porate-cyberattacks/.
  • 7Ponemon Institute and IBM, "2016 Ponemon Cost of Data Breach Study", http://www-03, ibm. corn/security/data- breach/.
  • 8“网络安全法(草案)全文”,http://www.npc.gov.cn/“pc/xinwen/lfgz/nca/2015-07/06/content一1940614.htm,最后访问日期:2016年6月1日.
  • 9"网络安全法(草案二次审议稿)全文",http://www.npc.gov.cn/npc/nca.qyj/2016-07/05/content一1993343.htm,最后访问日期:2016年7月13日.
  • 10一审稿立法说明,http://www.npe.gov.cn/npc/xinwen/lfgz/flca/2015-07/06/content一1940614.htm,最后访问日期:2016年7月18日.

引证文献4

二级引证文献68

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部