共查询到19条相似文献,搜索用时 203 毫秒
1.
云计算的发展与安全问题 总被引:1,自引:0,他引:1
云计算安全问题是用户是否使用云计算服务的核心问题。云计算平台需要解决用户数据的高可用性以及云平台服务和用户业务的连续性、用户数据安全及隐私性等问题,需要在云计算安全领域进行更深入的探索。 相似文献
2.
移动互联网(Mobile Internet)是以移动设备为核心,融合了互联网和移动通信技术的一种计算机技术,是当今信息科技发展的热点之一。而云计算(Cloud Computing)作为一种高效、灵活、节能的计算模式,是当前信息化建设的重要技术手段之一。移动互联网与云计算的结合,可以为用户提供更多、更丰富的服务,提高信息处理的效率和质量。然而,移动互联网中的云计算也面临着安全问题,如何构建安全、可靠的云计算安全架构,成了一个亟待解决的问题。 相似文献
3.
云计算能够为用户提供一种更为安全、快捷的计算机服务。基于这种技术,用户能够通过链接设备的方式在任何地方访问网络应用程序,也可以实现不同地点的资源共享。但是云计算也带来了很多安全方面的问题,如服务受到攻击、数据泄露、账号被盗、服务遭堵等。这些潜在的危险给整个计算机体系带来了极大的麻烦。本文主要研究云计算系统的主要结构以及云计算安全防范体系的主要结构。 相似文献
4.
云计算安全关键技术分析 总被引:21,自引:2,他引:19
云计算以一种新兴的共享基础架构的方法,提供资源池化的由网络、信息和存储等组成的服务、应用、信息和基础设施等的使用。云计算的按需自服务、宽带接入、虚拟化资源池、快速弹性架构、可测量的服务和多租户等特点,直接影响到了云计算环境的安全威胁和相关的安全保护策略。云计算具备了众多的好处,从规模经济到应用可用性,其绝对能给应用环境带来一些积极的因素。如今,在广大云计算提供商和支持者的推崇下,众多企业用户已开始跃跃欲试。然而,云计算也带来了一些新的安全问题,由于众多用户共享IT基础架构,安全的重要性非同小可。本文分析了云计算特定的安全需求和解决方案以及国内外的研究和产品现状。 相似文献
5.
6.
7.
简要阐述了移动互联网的发展状况和特点,并指出其发展瓶颈。介绍了云计算的基本概念和关键技术。从当前移动互联网发展的背景出发,分析了云计算技术和移动互联网二者之间相互促进、相互影响的关系。重点探讨了云计算在移动互联网中的服务提供模式,逐步分析了云计算在移动互联网上的应用,并指出了其发展过程中遇到的问题。云计算技术使得用户可以通过网络方便地使用云中的各种资源,期望可以发挥云计算的优势,助推移动互联网的发展。 相似文献
8.
随着互联网技术发展的突飞猛进,ICT行业内云计算技术与移动互联网相结合的新发展业务模式是目前最炙手可热的,但是这种模式在运行中存在着新的危险点。本文主要通过移动互联网来设计出了一个拥有用户接口统一、多层次、跨平台、多级别以及弹性的云计算通用移动互联网安全技术构架以及体系,这个平台不仅可以让不同差异等级的云计算实现安全服务,还可以让云安全管理的中跨层实现监控整个系统的跨安全级别、跨安全域以及运行安全情况。 相似文献
9.
10.
通过云计算虚拟化安全技术,可以有效提升数据中心基础资源的使用效率,避免由于黑客的入侵而影响到用户个人信息的安全性与稳定性,将云计算服务推升至全新的高度和深度.本文主要针对云计算虚拟化安全技术展开深入的研究,重点阐述云计算虚拟化安全技术架构,以供相关人士的借鉴. 相似文献
11.
A Survey of Mobile Cloud Computing 总被引:1,自引:0,他引:1
Mobile Cloud Computing (MCC) is emerging as one of the most important branches of cloud computing. In this paper, MCC is defined as cloud computing extended by mobility, and a new ad-hoc infrastructure based on mobile devices. It provides mobile users with data storage and processing services on a cloud computing platform. Because mobile cloud computing is still in its infancy, we aim to clarify confusion that has arisen from different views. Existing works are reviewed, and an overview of recent advances in mobile cloud computing is provided. We investigate representative infrastructures of mobile cloud computing and analyze key components. Moreover, emerging MCC models and services are discussed, and challenging issues are identified that will need to be addressed in future work. 相似文献
12.
Hoang T. Dinh Chonho Lee Dusit Niyato Ping Wang 《Wireless Communications and Mobile Computing》2013,13(18):1587-1611
Together with an explosive growth of the mobile applications and emerging of cloud computing concept, mobile cloud computing (MCC) has been introduced to be a potential technology for mobile services. MCC integrates the cloud computing into the mobile environment and overcomes obstacles related to the performance (e.g., battery life, storage, and bandwidth), environment (e.g., heterogeneity, scalability, and availability), and security (e.g., reliability and privacy) discussed in mobile computing. This paper gives a survey of MCC, which helps general readers have an overview of the MCC including the definition, architecture, and applications. The issues, existing solutions, and approaches are presented. In addition, the future research directions of MCC are discussed. Copyright © 2011 John Wiley & Sons, Ltd. 相似文献
13.
Analysis of Hot Topics in Cloud Computing 总被引:1,自引:0,他引:1
In the field of cloud computing, topics such as computing resource virtualization, differences between grid and cloud computing, relationship between high-performance computers and cloud computing centers, and cloud security and standards have attracted much research interest. This paper analyzes these topics and highlights that resource virtualization allows information services to be scalable, intensive, and specialized; grid computing involves using many computers for large-scale computing tasks, while cloud computing uses one platform for multiple services; high-performance computers may not be suitable for a cloud computing; security in cloud computing focuses on trust management between service suppliers and users; and based on the existing standards,standardization of cloud computing should focus on interoperability between services. 相似文献
14.
15.
云计算的应用将数据存储、网络服务由用户桌面推向了Web,实现了高校各项事务的快速高效运行,也降低了硬件资源成本.但同时,随着云计算的拓展,其安全问题越来越受到关注.如用户信息在云端更易受到黑客攻击、蓄意窃取等非法利用.为此,基于云计算安全现状,探讨高校云计算安全性分析及参考模型,并从相关技术来提出解决云计算安全的对策和思路. 相似文献
16.
17.
The rapid growth of cloud computing and mobile Internet services has triggered the emergence of mobile cloud services. Among many challenges, QoS management is one of the crucial issues for mobile cloud services. However, existing works on QoS management for cloud computing can hardly fit well to the mobile environment. This paper presents a QoS management architecture and an adaptive management process that can predict, assess and ensure QoS of mobile cloud services. Furthermore, we propose an adaptive QoS management model based on Fuzzy Cognitive Maps (FCM), which suitably represents the causal relationships among QoS related properties and cloud service modes. We evaluate the proposed solution and demonstrate its effectiveness and benefits based on simulation work. 相似文献
18.
19.
The booming development of the mobile internet and cloud computing leads to the emerging of many mobile cloud platforms based services.However,since mobile users store lots of data and privacy information in the cloud when they are using the mobile cloud services,they are facing multiple increasingly serious security threats such as data leaks and privacy exposures.The data security and privacy protection was investigated in mobile cloud computing,aiming at the internal bad mouthing attacks and mobile attacks.A dynamic game and reliable recommendation based transferring reputation mechanism was proposed.First,a dynamic game based recommendation incentive mechanism was proposed.Secondly,a reliable recommendation reputation evaluation model was established based on the incentive mechanism.Last,a novel transferring reputation mechanism was proposed that combined the above mentioned incentive mechanism and reputation evaluation model.Simulation results demonstrate the proposed transferring reputation mechanism can defend against the internal bad mouthing attacks and mobile attacks effectively,enhance the credibility of mobile terminals and improve the data security and privacy protection of mobile cloud services. 相似文献