[1]张慧 邢培振.云计算环境下信息安全分析[J].计算机技术与发展,2011,(12):164-166.
 ZHANG Hui,XING Pei-zhen.Information Security Analysis in Cloud Computing Environment[J].,2011,(12):164-166.
点击复制

云计算环境下信息安全分析()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2011年12期
页码:
164-166
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Information Security Analysis in Cloud Computing Environment
文章编号:
1673-629X(2011)12-0164-03
作者:
张慧1 邢培振2
[1]中州大学[2]华北水利水电学院水利职业学院
Author(s):
ZHANG Hui XING Pei-zhen
[1]Zhongzhou University[2]Water Conservancy Vocational College, North China Institute of Water Conservancy and Hydropower Institute
关键词:
云计算信息安全模型
Keywords:
cloud computing information security model
分类号:
TP309
文献标志码:
A
摘要:
基于互联网的云计算被认为是当今互联网发展的方向,近年来引起人们的广泛关注,如何构建安全的云计算环境成为当前计算机学科研究的热点问题之一。文中从云计算的发展现状入手,介绍了NIST推出的云计算规范、五个本质特征和云计算服务模型,分析了CSA云计算安全参考模型和JerichoForum的云立方体模型,并从安全边界、数据安全、应用安全三个方面讨论了当前云计算环境下存在的信息安全问题,最后给出了云计算环境下保证信息安全的解决方案
Abstract:
Intemet-basod cloud computing is considered to be the direction of development of the Interact today, has attracted much attention, how to build secure computer cloud computing environments become one of hot research subjects. In this paper,from the status quo of the development of cloud computing, first introduced the launch of the cloud NIST standard, the five essential characteristics and cloud computing services model, and then analyzed the CSA cloud computing model and the Jericho Forum security reference cube model of the cloud, and from the security boundary , data security, application security discussed the information security problem of the current cloud computing environment, given the security solutions in cloud computing environment to ensure information

相似文献/References:

[1]黄松 夏洪亚 谈利群.基于模糊综合的信息安全风险评估[J].计算机技术与发展,2010,(01):185.
 HUANG Song,XIA Hong-ya,TAN Li-qun.Fuzzy Comprehensive Evaluation for Information Security[J].,2010,(12):185.
[2]王茜,朱志祥,史晨昱,等.应用于数据库安全保护的加解密引擎系统[J].计算机技术与发展,2014,24(01):143.
 WANG Qian[],ZHU Zhi-xiang[],SHI Chen-yu[],et al.Encryption and Decryption Engine System Applying to Database Security and Detection[J].,2014,24(12):143.
[3]陈丹伟 黄秀丽 任勋益.云计算及安全分析[J].计算机技术与发展,2010,(02):99.
 CHEN Dan-wei,HUANG Xiu-li,REN Xun-yi.Analysis of Cloud Computing and Cloud Security[J].,2010,(12):99.
[4]郑江云 江巨浪.基于信噪比的自适应双彩色图像水印算法[J].计算机技术与发展,2010,(02):160.
 ZHENG Jiang-yun,JIANG Ju-lang.An Algorithm of Adaptive Double Color Digital Image Watermarking Based on SNR[J].,2010,(12):160.
[5]任参 刘少君 黄道平.一种改进的并行签密方案[J].计算机技术与发展,2010,(04):151.
 REN Shen,LIU Shao-jun,HUANG Dao-ping.An Improved Parallel Signcryption Scheme[J].,2010,(12):151.
[6]孟祥宏.信息安全攻防博弈研究[J].计算机技术与发展,2010,(04):159.
 MENG Xiang-hong.Study on Offence and Defense of Information Security Based on Game Theory[J].,2010,(12):159.
[7]赵锋 曹文杰.医院信息系统访问控制策略设计分析[J].计算机技术与发展,2010,(06):144.
 ZHAO Feng,CAO Wen-jie.Design and Analysis of Access Control Strategy for Hospital Information System[J].,2010,(12):144.
[8]杨蕴石 王颖 孙福玉 吕科 赵亚伟.商业银行安全保障体系设计[J].计算机技术与发展,2008,(03):177.
 YANG Yun-shi,WANG Ying,SUN Fu-yu,et al.Design on Information Security System for Commercial Bank[J].,2008,(12):177.
[9]刘华春.基于PKI的网上证券交易系统的构建[J].计算机技术与发展,2009,(07):173.
 LIU Hua-chun.Implementing a System of On - line Securities Trading Based on PKI Technology[J].,2009,(12):173.
[10]罗佳 杨世平.基于熵权系数法的信息安全模糊风险评估[J].计算机技术与发展,2009,(10):177.
 LUO Jia,YANG Shi-ping.Fuzzy Risk Assessment for Information Security Based on Method of Entropy - Weight Coefficient[J].,2009,(12):177.
[11]严霄凤,张德馨.大数据研究[J].计算机技术与发展,2013,(04):168.
 YAN Xiao-feng,ZHANG De-xin.Big Data Research[J].,2013,(12):168.

备注/Memo

备注/Memo:
2010年郑州市科技计划(10PTGG345-5)张慧(1977-),女,河南郑州人,硕士,讲师,主要从事多媒体、信息安全研究
更新日期/Last Update: 1900-01-01