首页 | 本学科首页   官方微博 | 高级检索  
     

云计算环境安全综述
引用本文:张玉清,王晓菲,刘雪峰,刘玲.云计算环境安全综述[J].软件学报,2016,27(6):1328-1348.
作者姓名:张玉清  王晓菲  刘雪峰  刘玲
作者单位:中国科学院大学 国家计算机网络入侵防范中心,北京 101408,中国科学院大学 国家计算机网络入侵防范中心,北京 101408,西安电子科技大学 综合业务网理论及关键技术国家重点实验室,西安 710073,西安电子科技大学 综合业务网理论及关键技术国家重点实验室,西安 710074
基金项目:国家自然科学基金(61272481, 61402352, 61572460)
摘    要:伴随云计算技术的飞速发展,其所面临的安全问题日益凸显,在工业界和学术界引起了广泛的关注.传统的云基础架构中存在较高安全风险,攻击者对虚拟机的非法入侵破坏了云服务或资源的可用性,不可信的云存储环境增大了用户共享、检索私有数据的难度,各类外包计算和云应用需求带来了隐私泄露的风险.该文从云计算环境下安全与隐私保护技术的角度出发,通过介绍云虚拟化安全、云数据安全以及云应用安全的相关研究进展,分析并对比典型方案的特点、适用范围及其在安全防御和隐私保护方面的不同效用,讨论已有工作的局限性,进而指出未来发展趋势和后续研究方向.

关 键 词:云计算  云安全  虚拟化安全  数据安全  应用安全
收稿时间:2015/8/15 0:00:00
修稿时间:2015/10/9 0:00:00

Survey on Cloud Computing Security
ZHANG Yu-Qing,WANG Xiao-Fei,LIU Xue-Feng and LIU Ling.Survey on Cloud Computing Security[J].Journal of Software,2016,27(6):1328-1348.
Authors:ZHANG Yu-Qing  WANG Xiao-Fei  LIU Xue-Feng and LIU Ling
Affiliation:National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing 101408, China,National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences, Beijing 101408, China,National Key Laboratory of Integrated Services Networks (Xidian University), Xi''an 710071, China and National Key Laboratory of Integrated Services Networks (Xidian University), Xi''an 710071, China
Abstract:With the rapid development of cloud computing technology, its security issues have become more and more obvious and received much attention in both industry and academia. High security risk is widespread in traditional cloud architecture. Hacking into a virtual machine destroys the availability of cloud services or resources. Un-Trusted cloud storage makes it more difficult to share or search users'' private data. The risk of privacy leakage is caused by various outsourcing computation and application requirements. From the perspective of security and privacy preserving technologies in cloud computing, this paper first introduces related research progress of cloud virtualization security, cloud data security and cloud application security. In addition, it analyzes the characteristics and application scopes of typical schemes, and compares their different effectiveness on the security defense and privacy preserving. Finally, the paper discusses current limitations and possible directions for future research.
Keywords:cloud computing  cloud security  virtualization security  data security  application security
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号