[1]朱圣才.基于Azure的云安全研究[J].计算机技术与发展,2013,(12):143-146.
 ZHU Sheng-cai.Research on Cloud Computing Security Based on Windows Azure[J].,2013,(12):143-146.
点击复制

基于Azure的云安全研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2013年12期
页码:
143-146
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
Research on Cloud Computing Security Based on Windows Azure
文章编号:
1673-629X(2013)12-0143-04
作者:
朱圣才
上海市信息安全测评认证中心
Author(s):
ZHU Sheng-cai
关键词:
云计算云安全WindowsAzureAzure安全
Keywords:
cloud computingcloud securityWindows AzureAzure security
文献标志码:
A
摘要:
随着云计算的进一步推进和发展,云计算面临的安全问题变得越来越突出,特别是在云计算带来的诸多利益下,如何满足用户在云计算环境下对用户数据的机密性、完整性等相关性能的需求,已成为云计算安全的首要难题。文中以微软Azure平台为基础,从云安全分析入手,针对Windows Azure云安全进行分析研究。在Azure架构下,探讨Azure云安全解决方案,分别从IaaS、PaaS、SaaS三个角度对微软Azure云平台安全方案给出应对措施,为进一步对微软Azure云平台进行更深层次的测评分析提供技术支持
Abstract:
With further promotion and development of cloud computing,the security problems faced by cloud computing are becoming more and more prominent,in particular,under the benefits of cloud computing,how to satisfy user requirement about the confidentiality and integrality of user data,and correlative capability in the cloud computing environment has become the primary security problem of cloud computing. Based on the Microsoft Azure platform,starting from the cloud security,research the security of the Windows Azure cloud. In the Azure architecture,to explore Azure cloud security solutions,respectively from three angles of IaaS,PaaS,SaaS on Microsoft Azure cloud platform security solution give the response measures,providing technical support for Microsoft's Azure cloud platform for a deeper evaluation analysis

相似文献/References:

[1]王茜,朱志祥,史晨昱,等.应用于数据库安全保护的加解密引擎系统[J].计算机技术与发展,2014,24(01):143.
 WANG Qian[],ZHU Zhi-xiang[],SHI Chen-yu[],et al.Encryption and Decryption Engine System Applying to Database Security and Detection[J].,2014,24(12):143.
[2]陈丹伟 黄秀丽 任勋益.云计算及安全分析[J].计算机技术与发展,2010,(02):99.
 CHEN Dan-wei,HUANG Xiu-li,REN Xun-yi.Analysis of Cloud Computing and Cloud Security[J].,2010,(12):99.
[3]孙放 陈云芳 林杭锋.适用于富客户端的云计算模型[J].计算机技术与发展,2010,(08):96.
 SUN Fang,CHEN Yun-fang,LIN Hang-feng.Cloud Computing Model Applicable to Rich Client Applications[J].,2010,(12):96.
[4]郭苑 张顺颐 孙雁飞.物联网关键技术及有待解决的问题研究[J].计算机技术与发展,2010,(11):180.
 GUO Yuan,ZHANG Shun-yi,SUN Yan-fei.Research of Key Technologies and Unresolved Questions of Internet of Things[J].,2010,(12):180.
[5]李玲娟 张敏.云计算环境下关联规则挖掘算法的研究[J].计算机技术与发展,2011,(02):43.
 LI Ling-juan,ZHANG Min.Research on Algorithms of Mining Association Rule under Cloud Computing Environment[J].,2011,(12):43.
[6]王德政 申山宏 周宁宁.云计算环境下的数据存储[J].计算机技术与发展,2011,(04):81.
 WANG De-zheng,SHEN Shan-hong,ZHOU Ning-ning.Data Storage in Cloud Computing Environment[J].,2011,(12):81.
[7]宋丽华 姜家轩 张建成 田长录 马文征.黄河三角洲云计算平台关键技术的研究[J].计算机技术与发展,2011,(06):40.
 SONG Li-hua,JIANG Jia-xuan,ZHANG Jian-cheng,et al.Research of Key Technologies of Cloud Computing of Yellow River Delta[J].,2011,(12):40.
[8]田宏伟 解福 倪俊敏.云计算环境下基于粒子群算法的资源分配策略[J].计算机技术与发展,2011,(12):22.
 TIAN Hong-wei,XIE Fu,NI Jun-min.Resource Allocation Algorithm Based on Particle Swarm Algorithm in Cloud Computing Environment[J].,2011,(12):22.
[9]张慧 邢培振.云计算环境下信息安全分析[J].计算机技术与发展,2011,(12):164.
 ZHANG Hui,XING Pei-zhen.Information Security Analysis in Cloud Computing Environment[J].,2011,(12):164.
[10]张建成[] 宋丽华[] 鹿全礼[] 郭锐[] 刘永泉[].云计算方案分析研究[J].计算机技术与发展,2012,(01):165.
 ZHANG Jian-cheng,SONG Li-hua,LU Quan-li,et al.Study and Analysis of Cloud Computing Procedure[J].,2012,(12):165.
[11]黄秀丽.解读云立方体模型[J].计算机技术与发展,2012,(03):245.
 HUANG Xiu-li.Analysis of Cloud Cube Model[J].,2012,(12):245.
[12]王茜,朱志祥,葛新,等.应用于云计算中心的虚拟主机安全防护系统[J].计算机技术与发展,2014,24(03):134.
 WANG Qian[],ZHU Zhi-xiang[],GE Xin[],et al.A Virtual Host Protection System Applying to Cloud Computing Center[J].,2014,24(12):134.
[13]谭天,袁嵩,肖洁. 云计算安全问题研究[J].计算机技术与发展,2016,26(09):124.
 TAN Tian,YUAN Song,XIAO Jie. Research on Security Issues of Cloud Computing[J].,2016,26(12):124.
[14]邵应昭,丁跃利,张建华,等.面向应用的天基嵌入式云服务安全技术研究[J].计算机技术与发展,2020,30(08):109.[doi:10. 3969 / j. issn. 1673-629X. 2020. 08. 018]
 SHAO Ying-zhao,DING Yue-li,ZHANG Jian-hua,et al.Study on Cloud Service Security Technology of Space-based Embedded System Application[J].,2020,30(12):109.[doi:10. 3969 / j. issn. 1673-629X. 2020. 08. 018]

更新日期/Last Update: 1900-01-01