[1]姜茸[],杨明.云计算安全风险研究[J].计算机技术与发展,2014,24(03):126-129.
 JIANG Rong[],YANG Ming[].Study on Cloud Computing Security Risk[J].,2014,24(03):126-129.
点击复制

云计算安全风险研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
24
期数:
2014年03期
页码:
126-129
栏目:
安全与防范
出版日期:
2014-03-31

文章信息/Info

Title:
Study on Cloud Computing Security Risk
文章编号:
1673-629X(2014)03-0126-04
作者:
姜茸12[3]杨明2
1.云南财经大学 信息学院;2.云南大学 软件学院;3.云南大学 发展研究院
Author(s):
JIANG Rong[1]YANG Ming[2]
关键词:
云计算安全风险研究现状对策
Keywords:
cloud computingsecurity risk research statuscountermeasure
分类号:
TP309;G35
文献标志码:
A
摘要:
阐述云计算的重要性、优势及前景,探讨安全风险对云计算发展的影响,重点分析云计算安全风险理论研究现状,给出降低云计算安全风险的对策。对现有文献资料进行系统梳理、分析和总结。安全风险是云计算发展的重要障碍,现有理论研究存在的主要问题:一是成果不多,国外刚起步,国内更是匮乏;二是几乎全为定性研究,定量研究极为罕见;三是较多文献仅为简单风险探讨,缺乏深入研究。因此安全风险是云计算的一个重要的新研究方向。
Abstract:
Firstly introduce importance,advantage and prospect on cloud computing,then indicate that security risk is a major obstacle for cloud computing development,emphatically analyze security risk research status in cloud computing,and point out the countermeasures of reducing the risk of cloud computing security. Analyze and summarize the existing literature systematically. Security risk is the important obstacle of the development of cloud computing,the existing main problems of theoretical study:one is few achievements,start-up a-broad,domestic is lack. The second is for almost all qualitative research,quantitative research is rare. Three is more document only for simple risk,lack of in-depth study. So the security risk is an important new research direction for cloud computing.

相似文献/References:

[1]王茜,朱志祥,史晨昱,等.应用于数据库安全保护的加解密引擎系统[J].计算机技术与发展,2014,24(01):143.
 WANG Qian[],ZHU Zhi-xiang[],SHI Chen-yu[],et al.Encryption and Decryption Engine System Applying to Database Security and Detection[J].,2014,24(03):143.
[2]陈丹伟 黄秀丽 任勋益.云计算及安全分析[J].计算机技术与发展,2010,(02):99.
 CHEN Dan-wei,HUANG Xiu-li,REN Xun-yi.Analysis of Cloud Computing and Cloud Security[J].,2010,(03):99.
[3]孙放 陈云芳 林杭锋.适用于富客户端的云计算模型[J].计算机技术与发展,2010,(08):96.
 SUN Fang,CHEN Yun-fang,LIN Hang-feng.Cloud Computing Model Applicable to Rich Client Applications[J].,2010,(03):96.
[4]郭苑 张顺颐 孙雁飞.物联网关键技术及有待解决的问题研究[J].计算机技术与发展,2010,(11):180.
 GUO Yuan,ZHANG Shun-yi,SUN Yan-fei.Research of Key Technologies and Unresolved Questions of Internet of Things[J].,2010,(03):180.
[5]李玲娟 张敏.云计算环境下关联规则挖掘算法的研究[J].计算机技术与发展,2011,(02):43.
 LI Ling-juan,ZHANG Min.Research on Algorithms of Mining Association Rule under Cloud Computing Environment[J].,2011,(03):43.
[6]王德政 申山宏 周宁宁.云计算环境下的数据存储[J].计算机技术与发展,2011,(04):81.
 WANG De-zheng,SHEN Shan-hong,ZHOU Ning-ning.Data Storage in Cloud Computing Environment[J].,2011,(03):81.
[7]宋丽华 姜家轩 张建成 田长录 马文征.黄河三角洲云计算平台关键技术的研究[J].计算机技术与发展,2011,(06):40.
 SONG Li-hua,JIANG Jia-xuan,ZHANG Jian-cheng,et al.Research of Key Technologies of Cloud Computing of Yellow River Delta[J].,2011,(03):40.
[8]田宏伟 解福 倪俊敏.云计算环境下基于粒子群算法的资源分配策略[J].计算机技术与发展,2011,(12):22.
 TIAN Hong-wei,XIE Fu,NI Jun-min.Resource Allocation Algorithm Based on Particle Swarm Algorithm in Cloud Computing Environment[J].,2011,(03):22.
[9]张慧 邢培振.云计算环境下信息安全分析[J].计算机技术与发展,2011,(12):164.
 ZHANG Hui,XING Pei-zhen.Information Security Analysis in Cloud Computing Environment[J].,2011,(03):164.
[10]张建成[] 宋丽华[] 鹿全礼[] 郭锐[] 刘永泉[].云计算方案分析研究[J].计算机技术与发展,2012,(01):165.
 ZHANG Jian-cheng,SONG Li-hua,LU Quan-li,et al.Study and Analysis of Cloud Computing Procedure[J].,2012,(03):165.

更新日期/Last Update: 1900-01-01