云安全研究进展综述
Review of Cloud Computing Security
查看参考文献111篇
文摘
|
随着云计算在学术界和工业界的兴起,云计算也不可避免的带来了一些安全问题.本文对云计算的安全需求进行了总结,指出云计算不仅在机密性、数据完整性、访问控制和身份认证等传统安全性上存在需求,而且在可信性、配置安全性、虚拟机安全性等方面具有新的安全需求.我们对云计算的两个典型产品Amazon Web Services和Windows Azure的安全状况进行了总结,并阐述了针对云计算的拒绝服务攻击和旁通道攻击.基于云计算的安全需求和面临的攻击,对现有安全机制进行了优缺点分析,系统的总结了现有的安全机制。 |
其他语种文摘
|
With the development of cloud computing in the academia and industry,it is inevitable that many security problems arise.This paper summarizes the security requirements of cloud computing,which not only cover the traditional security requirements like confidentiality,data integrity,access control and identity authentication,but also introduce new security requirements in the credibility,configuration and virtual machinery.We make conclusions about the security situations on two typical cloud computing products:Amazon Web Services and Windows Azure and elaborate two attack mechanisms against cloud computing:Denial of service attack and Side channel attack.Based on the security requirements and attacks against cloud computing,we systematically summarize the current security protection mechanisms and further make a comparison among them. |
来源
|
电子学报
,2013,41(2):371-381 【核心库】
|
DOI
|
10.3969/j.issn.0372-2112.2013.02.026
|
关键词
|
云计算
;
机密性
;
数据完整性
;
访问控制
;
公开认证
;
可信性
;
虚拟机安全性
|
地址
|
中国科学技术大学信息科学与技术学院, 安徽, 合肥, 230027
|
语种
|
中文 |
文献类型
|
综述型 |
ISSN
|
0372-2112 |
学科
|
自动化技术、计算机技术 |
基金
|
国家自然科学基金
;
中国科学院战略性先导科技专项
|
文献收藏号
|
CSCD:4778463
|
参考文献 共
111
共6页
|
1.
Armbrust M. A view of cloud computing.
Commun ACM,2010,53(4):50-58
|
CSCD被引
326
次
|
|
|
|
2.
Hayes B. Cloud computing.
Commun ACM,2008,51(7):9-11
|
CSCD被引
47
次
|
|
|
|
3.
冯登国. 云计算安全研究.
软件学报,2011,22(1):71-83
|
CSCD被引
290
次
|
|
|
|
4.
Popa L. Cloud police:taking access control out of the network.
Hotnets'10.ACM 2010,2010:1-6
|
CSCD被引
1
次
|
|
|
|
5.
Hao F. Secure cloud computing with a virtualized network infrastructure.
The 2nd USENIX Conference on Hot Topics in Cloud Computing,2010:1-7
|
CSCD被引
2
次
|
|
|
|
6.
Oberheide J. Cloudav:N-version antivirus in the network cloud.
Proceedings of the 17th Conference on Security Symposium,2008:91-106
|
CSCD被引
2
次
|
|
|
|
7.
Oberheide J. Virtualized in-cloud security services for mobiledevices.
Proceedings of the First Workshop on Virtualization in Mobile Computing,2008:31-35
|
CSCD被引
1
次
|
|
|
|
8.
Chow R. Authentication in the clouds:a framework and its application to mobile users.
Proceedings of the 2010 ACM Workshop on Cloud computing Security Workshop,2010:1-6
|
CSCD被引
2
次
|
|
|
|
9.
Portokalidis G. Paranoid Android:versatile protection for smartphones.
Proceedings of the 26th Annual Computer Security Applications Conference. ACM,2010:347-356
|
CSCD被引
1
次
|
|
|
|
10.
吴吉义. 一种对等结构的云存储系统研究.
电子学报,2011,38(5):1100-1107
|
CSCD被引
19
次
|
|
|
|
11.
Gilbert P. Vision:Automated security validation of mobile apps at app markets.
The second International Workshop on Mobile Cloud Computing and Services,2011:21-26
|
CSCD被引
1
次
|
|
|
|
12.
Martignoni L. A Framework for behavior-based malware analysis in the cloud.
Fifth International Conference on Information Systems Security,2009:178-192
|
CSCD被引
1
次
|
|
|
|
13.
Wang C K. CS-DRM:A cloud-based SIM DRM scheme for mobile internet.
EURASIP J Wirel Commun Netw,2011,14(1):22-30
|
CSCD被引
1
次
|
|
|
|
14.
Zou P. Phosphor:A cloud based DRM scheme with sim card.
12th International Asia-Pacific,2010:459-463
|
CSCD被引
1
次
|
|
|
|
15.
.
Amazon Web Services,2012
|
CSCD被引
2
次
|
|
|
|
16.
.
Windows Azure,2012
|
CSCD被引
1
次
|
|
|
|
17.
Hudic A. Data Confidentiality using fragmentation in cloud computing.
Int J Communication Networks and Distributed Systems,2012,1(3/4):1-10
|
CSCD被引
1
次
|
|
|
|
18.
Slamanig D. Efficient schemes for anonymous yet authorized and bounded use of cloud resources.
Lecture Notes in Computer Science,2012:73-91
|
CSCD被引
1
次
|
|
|
|
19.
Asghar M R. Securing data provenance in the cloud.
Lecture Notes in Computer Science,2012:145-160
|
CSCD被引
1
次
|
|
|
|
20.
Gentry. Fully Homomorphic Encryption using ideal lattices.
STOC '09,2009:169-178
|
CSCD被引
1
次
|
|
|
|
|