[1]王茜,朱志祥,葛新,等.应用于云计算中心的虚拟主机安全防护系统[J].计算机技术与发展,2014,24(03):134-137.
 WANG Qian[],ZHU Zhi-xiang[],GE Xin[],et al.A Virtual Host Protection System Applying to Cloud Computing Center[J].,2014,24(03):134-137.
点击复制

应用于云计算中心的虚拟主机安全防护系统()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
24
期数:
2014年03期
页码:
134-137
栏目:
安全与防范
出版日期:
2014-03-31

文章信息/Info

Title:
A Virtual Host Protection System Applying to Cloud Computing Center
文章编号:
1673-629X(2014)03-0134-04
作者:
王茜1朱志祥2葛新1杜迟1
1.西安未来国际信息股份有限公司;2.西安邮电大学
Author(s):
WANG Qian[1]ZHU Zhi-xiang[2]GE Xin[1]DU Chi[1]
关键词:
云计算虚拟主机防护云安全安全域
Keywords:
cloud computingvirtual host protectioncloud securitysecurity domain
分类号:
TP302.1
文献标志码:
A
摘要:
针对云计算环境下的安全防护问题,文中提出了一种云计算中心虚拟主机安全防护系统。系统以“安全即服务冶为出发点,以虚拟机为核心,针对虚拟化计算无边界的特点,以虚拟机群为单位,提供统一的安全防护。为云平台下的不同应用、租户、虚拟主机提供定制化的安全服务,以安全防护模板的形式对不同的安全性需求进行量身定制,将安全防护措施软件化、安全功能组件化、部署方式动态化、配置管理自动化,使安全处置手段不断更新,从而建立起了集各种安全措施为一体的自适应云平台安全防护体系。
Abstract:
A virtual host protection system applying to cloud computing center is constructed in this paper to guarantee the security of cloud computing. Virtualization calculation has the characteristics of being no boundary. According to this,the virtual host protection sys-tem provides a unified security for cloud computing by taking security-as-a-service as a starting point,the virtual machine as the core, and the virtual cluster as a unit. Customized security services are provided for different applications,multi-tenancy,and virtual hosts on the cloud computing platform. The security template is tailored to satisfy the different security needs. The security protection measures are realized by software,the security function is achieved by components,the deployment method becomes dynamic,the configuration man-agement becomes automatic,and the security disposal means are updated constantly. Then the adaptive security protection system integra-ting with a variety of security measures for cloud computing platform is built.

相似文献/References:

[1]王茜,朱志祥,史晨昱,等.应用于数据库安全保护的加解密引擎系统[J].计算机技术与发展,2014,24(01):143.
 WANG Qian[],ZHU Zhi-xiang[],SHI Chen-yu[],et al.Encryption and Decryption Engine System Applying to Database Security and Detection[J].,2014,24(03):143.
[2]陈丹伟 黄秀丽 任勋益.云计算及安全分析[J].计算机技术与发展,2010,(02):99.
 CHEN Dan-wei,HUANG Xiu-li,REN Xun-yi.Analysis of Cloud Computing and Cloud Security[J].,2010,(03):99.
[3]孙放 陈云芳 林杭锋.适用于富客户端的云计算模型[J].计算机技术与发展,2010,(08):96.
 SUN Fang,CHEN Yun-fang,LIN Hang-feng.Cloud Computing Model Applicable to Rich Client Applications[J].,2010,(03):96.
[4]郭苑 张顺颐 孙雁飞.物联网关键技术及有待解决的问题研究[J].计算机技术与发展,2010,(11):180.
 GUO Yuan,ZHANG Shun-yi,SUN Yan-fei.Research of Key Technologies and Unresolved Questions of Internet of Things[J].,2010,(03):180.
[5]李玲娟 张敏.云计算环境下关联规则挖掘算法的研究[J].计算机技术与发展,2011,(02):43.
 LI Ling-juan,ZHANG Min.Research on Algorithms of Mining Association Rule under Cloud Computing Environment[J].,2011,(03):43.
[6]王德政 申山宏 周宁宁.云计算环境下的数据存储[J].计算机技术与发展,2011,(04):81.
 WANG De-zheng,SHEN Shan-hong,ZHOU Ning-ning.Data Storage in Cloud Computing Environment[J].,2011,(03):81.
[7]宋丽华 姜家轩 张建成 田长录 马文征.黄河三角洲云计算平台关键技术的研究[J].计算机技术与发展,2011,(06):40.
 SONG Li-hua,JIANG Jia-xuan,ZHANG Jian-cheng,et al.Research of Key Technologies of Cloud Computing of Yellow River Delta[J].,2011,(03):40.
[8]田宏伟 解福 倪俊敏.云计算环境下基于粒子群算法的资源分配策略[J].计算机技术与发展,2011,(12):22.
 TIAN Hong-wei,XIE Fu,NI Jun-min.Resource Allocation Algorithm Based on Particle Swarm Algorithm in Cloud Computing Environment[J].,2011,(03):22.
[9]张慧 邢培振.云计算环境下信息安全分析[J].计算机技术与发展,2011,(12):164.
 ZHANG Hui,XING Pei-zhen.Information Security Analysis in Cloud Computing Environment[J].,2011,(03):164.
[10]张建成[] 宋丽华[] 鹿全礼[] 郭锐[] 刘永泉[].云计算方案分析研究[J].计算机技术与发展,2012,(01):165.
 ZHANG Jian-cheng,SONG Li-hua,LU Quan-li,et al.Study and Analysis of Cloud Computing Procedure[J].,2012,(03):165.

更新日期/Last Update: 1900-01-01