期刊文献+

云计算虚拟化平台安全问题研究 被引量:16

Research on the Security Problem of Cloud Computing Virtualization Platform
下载PDF
导出
摘要 随着云计算技术的快速发展,云安全事件呈现线性增加的趋势,已经成为云计算领域亟需解决的重要问题。而虚拟化技术是云计算的关键技术,只有不断地提高虚拟化平台的安全性,才能有效促进云计算技术的发展与应用。针对虚拟化平台,传统的安全解决方案无法满足现有的安全需求。文章介绍了虚拟化技术与主流虚拟化平台,梳理了当前虚拟化平台所面临的各种安全问题及其防范方法。然后从安全漏洞数量与类型以及研究热度等方面对传统环境与虚拟化平台进行了对比分析研究,提出了虚拟化平台的安全现状和安全威胁发展趋势。最后文章总结分析了目前虚拟化平台主要存在的不足,并提出了相关应对措施。 With the rapid development of cloud computing technology, the event of cloud security has an increasing trend in linear, which has become a serious issue to be solved in the cloud computing. Virtualization technology is the key of cloud computing. It can effectively promote the development and application of cloud computing to enhance the security of the virtualization platform.In the virtualization platform, the traditional security solutions cannot keep it safe. At first, this paper introduced the virtualization technology and the major virtualization platforms, and analyzed the various security issues faced by the current virtualization platform and its preventive methods. Then through the comparative analysis of the number and types of security vulnerability in traditional environment, virtualization platform, the research concern and other aspects, the paper proposed the current security situation and development trend of security threat of the virtualization platform. Finally, this paper summarized the main problems of the virtualization platform and provided countermeasures.
出处 《信息网络安全》 2016年第9期163-168,共6页 Netinfo Security
基金 国家重点研发计划[2016YFB0800805] 天津市科技服务业科技重大专项[16ZXFWGX00140] 中国民航大学信息安全测评中心开放基金课题[CAAC-ISECCA-201501]
关键词 云计算 云安全 虚拟化技术 安全漏洞 虚拟化平台 cloud computing cloud security virtualization technology security vulnerability virtualization platform
  • 相关文献

参考文献9

二级参考文献65

  • 1Sailer R,Zhang X,Jaeger T, et al. Design and Implementation of a TCG-based Integrity Measurement Architecture [C]. The 13th USENIX Security Symposium, San Diego, USA, 2004.
  • 2Jaeger T, Sailer R, Shankar U. PRIMA: Policy- Reduced Integrity Measurement Architecture [C]. The 11th ACM Symposium on Access Control Models and Technologies, California, USA, 2006.
  • 3Loscocco P A, Wilson P W, Pendergrass J A, et al. Linux Kernel Integrity Measurement Using Contextual Inspection [C]. The 2007 ACM Workshop on Scalable Trusted Computing, Virginia, USA, 2007.
  • 4Nibaldi G H. Specification of a Trusted Computing Base[C]. M79-228, MITRE Corporation, Bedford, MA, USA, 1979.
  • 5Guttman J, Herzog A, Millen J, et al. Attestation: Evidence and Trust [ R ]. Technical Report, MTR080072, MITRE Corporation, USA, 2008.
  • 6England P, Lampson B, Manferdelli J, et al. A Trusted Open Platform[J].IEEE Computer, 2003,36(7) :55-62.
  • 7王鹏,黄华峰,曹珂.云计算:中国未来的IT战略.北京:人民邮电出版社,2010.
  • 8Jasti A,Shah P,Nagaraj R,et al.Security in multi-tenancycloud.Proceedings of 2010 IEEE International CarnahanConference on Security Technology(ICCST),San Jose,CA,2010:35~41.
  • 9Hanqian Wu,Yi Ding,Winer Chuck,et al.Network securityfor virtual machine in cloud computing.Proceedings of 5thInternational Conference on Computer,Sciences andConvergence Information Technology(ICCIT),Seoul,Korea,2010:18~21.
  • 10Tim Mather,Subra Kumaraswamy,Shahed Latif.Cloud Securityand Privacy.O'Reilly Media,2009.

共引文献142

同被引文献97

引证文献16

二级引证文献44

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部