[1]谭天,袁嵩,肖洁. 云计算安全问题研究[J].计算机技术与发展,2016,26(09):124-128.
 TAN Tian,YUAN Song,XIAO Jie. Research on Security Issues of Cloud Computing[J].,2016,26(09):124-128.
点击复制

 云计算安全问题研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
26
期数:
2016年09期
页码:
124-128
栏目:
安全与防范
出版日期:
2016-09-10

文章信息/Info

Title:
 Research on Security Issues of Cloud Computing
文章编号:
1673-629X(2016)09-0124-05
作者:
 谭天袁嵩肖洁
 武汉科技大学 计算机科学与技术学院
Author(s):
 TAN Tian YUAN SongXIAO Jie
关键词:
 云计算私有云公有云云安全大数据
Keywords:
 cloud computingprivate cloudpublic cloud cloud securitybig data
分类号:
TP309
文献标志码:
A
摘要:
 根据ENISA提出的云计算安全问题,参考目前主要的云计算提供商对于云计算安全问题的解决方法,引入SOA架构理念,将云计算的安全问题细分为物理资源层安全、资源抽象与控制层安全、资源架构层安全、开发平台层安全以及应用服务层安全五个架构层次,并且根据数据资源的私密性将云进行安全评级,分为重要性高、敏感度高的“私有云”与资源较不敏感的“公有云”两个部分。针对不同的架构层次提出了相应的安全保障方法与建议,并根据“公有云”与“私有云”在数据重要性上的差异提出了多种保障方法以满足不同客户对于各种数据的不同需求。最后针对云计算处理大数据过程中的安全问题,分析了在架构层次上解决具体云计算应用问题的可行性并提出了解决思路,以期达到“安全即服务”的目的。
Abstract:
 According to the cloud computing security issues raised by ENISA,referring to the solutions of the current main cloud compu-ting providers,introducing the concept of SOA,the cloud computing security issues are subdivided into five architecture layers which con-sist of physical resource layer security,resource abstraction and control layer security,resource architecture layer security,development platform layer security and application service layer security. According to the privacy of data resources,the clouds are divided into two security levels,more important and high sensitive “private cloud” and less sensitive “public cloud”. Aiming at the different architecture layer,corresponding security methods and suggestions are put forward. According to the differences in data importance between “public clouds” and“private clouds”,many kinds of protection methods are proposed to meet the different needs of different customers for a va-riety of data. Finally,in allusion to the cloud computing security issues in processing big data,the feasibility of solving specific cloud computing application problems at architecture layers is analyzed and the solving idea is put forward,in order to achieve the goal of“se-curity as a service”.

相似文献/References:

[1]王茜,朱志祥,史晨昱,等.应用于数据库安全保护的加解密引擎系统[J].计算机技术与发展,2014,24(01):143.
 WANG Qian[],ZHU Zhi-xiang[],SHI Chen-yu[],et al.Encryption and Decryption Engine System Applying to Database Security and Detection[J].,2014,24(09):143.
[2]陈丹伟 黄秀丽 任勋益.云计算及安全分析[J].计算机技术与发展,2010,(02):99.
 CHEN Dan-wei,HUANG Xiu-li,REN Xun-yi.Analysis of Cloud Computing and Cloud Security[J].,2010,(09):99.
[3]孙放 陈云芳 林杭锋.适用于富客户端的云计算模型[J].计算机技术与发展,2010,(08):96.
 SUN Fang,CHEN Yun-fang,LIN Hang-feng.Cloud Computing Model Applicable to Rich Client Applications[J].,2010,(09):96.
[4]郭苑 张顺颐 孙雁飞.物联网关键技术及有待解决的问题研究[J].计算机技术与发展,2010,(11):180.
 GUO Yuan,ZHANG Shun-yi,SUN Yan-fei.Research of Key Technologies and Unresolved Questions of Internet of Things[J].,2010,(09):180.
[5]李玲娟 张敏.云计算环境下关联规则挖掘算法的研究[J].计算机技术与发展,2011,(02):43.
 LI Ling-juan,ZHANG Min.Research on Algorithms of Mining Association Rule under Cloud Computing Environment[J].,2011,(09):43.
[6]王德政 申山宏 周宁宁.云计算环境下的数据存储[J].计算机技术与发展,2011,(04):81.
 WANG De-zheng,SHEN Shan-hong,ZHOU Ning-ning.Data Storage in Cloud Computing Environment[J].,2011,(09):81.
[7]宋丽华 姜家轩 张建成 田长录 马文征.黄河三角洲云计算平台关键技术的研究[J].计算机技术与发展,2011,(06):40.
 SONG Li-hua,JIANG Jia-xuan,ZHANG Jian-cheng,et al.Research of Key Technologies of Cloud Computing of Yellow River Delta[J].,2011,(09):40.
[8]田宏伟 解福 倪俊敏.云计算环境下基于粒子群算法的资源分配策略[J].计算机技术与发展,2011,(12):22.
 TIAN Hong-wei,XIE Fu,NI Jun-min.Resource Allocation Algorithm Based on Particle Swarm Algorithm in Cloud Computing Environment[J].,2011,(09):22.
[9]张慧 邢培振.云计算环境下信息安全分析[J].计算机技术与发展,2011,(12):164.
 ZHANG Hui,XING Pei-zhen.Information Security Analysis in Cloud Computing Environment[J].,2011,(09):164.
[10]张建成[] 宋丽华[] 鹿全礼[] 郭锐[] 刘永泉[].云计算方案分析研究[J].计算机技术与发展,2012,(01):165.
 ZHANG Jian-cheng,SONG Li-hua,LU Quan-li,et al.Study and Analysis of Cloud Computing Procedure[J].,2012,(09):165.
[11]王雷,陈彦先,袁哲,等. 面向预拌混凝土行业的云计算[J].计算机技术与发展,2014,24(08):14.
 WANG Lei,CHEN Yan-xian,YUAN Zhe JI Xu. Research on Cloud Computing for Ready-mixed Concrete Industry[J].,2014,24(09):14.
[12]殷小龙,李君,万明祥. 云环境下基于改进NSGA II的虚拟机调度算法[J].计算机技术与发展,2014,24(08):71.
 YIN Xiao-long,LI Jun,WAN Ming-xiang. Virtual Machines Scheduling Algorithm Based on Improved NSGA II in Cloud Environment[J].,2014,24(09):71.
[13]张也弛,周文钦,石润华. 一种面向云的大数据完整性检测协议[J].计算机技术与发展,2014,24(09):68.
 ZHANG Ye-chi,ZHOU Wen-qin,SHI Run-hua. A Big Data Integrity Checking Protocol for Cloud[J].,2014,24(09):68.
[14]徐源吾[][],王珣[][]. 基于Hadoop的智能家居信息处理平台[J].计算机技术与发展,2014,24(09):183.
 XU Yuan-wu[] [],WANG Xun[][]. nformation Processing Platform of Smart Home Based on Hadoop[J].,2014,24(09):183.
[15]谢福伟,梁昌勇,马银超. 基于云计算的景区数据仓库应用研究[J].计算机技术与发展,2014,24(09):198.
 XIE Fu-wei,LIANG Chang-yong,MA Yin-chao. Research on Data Warehouse Application of Tourist Areas Data Based on Cloud Computing[J].,2014,24(09):198.
[16]孙滔,王杉,邢军. 文献共享系统和数据共享系统的云计算平台建设[J].计算机技术与发展,2014,24(09):206.
 SUN Tao,WANG Shan,XING Jun. Construction of Cloud Computing Platform of Sci-tech Literature Sharing System and Data Sharing System[J].,2014,24(09):206.
[17]周文琼[],王乐球[],郑述招[]. 云环境下的数据库扩展策略的设计[J].计算机技术与发展,2014,24(09):213.
 ZHOU Wen-qiong[],WANG Le-qiu[],ZHENG Shu-zhao[]. Design of Database Expansion Strategy under Cloud Computing[J].,2014,24(09):213.
[18]申侃,梁昌勇,赵树平. 基于云的MIS开放式体系结构[J].计算机技术与发展,2014,24(10):21.
 SHEN Kan,LIANG Chang-yong,ZHAO Shu-ping. Open Architecture of MIS Based on Cloud[J].,2014,24(09):21.
[19]王霞俊. 云环境下一种基于能耗感知的虚拟机部署算法[J].计算机技术与发展,2014,24(10):88.
 WANG Xia-jun. A Virtual Machine Allocation Algorithm Based on Power-aware in Cloud Computing[J].,2014,24(09):88.
[20]孟蒙,茅苏. 基于云计算的可反馈负载均衡策略的研究[J].计算机技术与发展,2014,24(10):135.
 MENG Meng,MAO Su. Study on Feedback Load Balancing Strategy Based on Cloud Computing[J].,2014,24(09):135.

更新日期/Last Update: 2016-10-26