计算机科学 ›› 2014, Vol. 41 ›› Issue (Z11): 284-287.

• 信息安全 • 上一篇    下一篇

云计算的按需防护安全框架

丁鲜花,赵卫栋,俱莹,李建平,王晓明,刘国英   

  1. 国家无线电监测中心陕西监测站 西安710200;国家无线电监测中心陕西监测站 西安710200;国家无线电监测中心陕西监测站 西安710200;国家无线电监测中心陕西监测站 西安710200;国家无线电监测中心陕西监测站 西安710200;国家无线电监测中心陕西监测站 西安710200
  • 出版日期:2018-11-14 发布日期:2018-11-14

On Demand Security Framework for Cloud Computing

DING Xian-hua,ZHAO Wei-dong,JU Ying,LI Jian-ping,WANG Xiao-ming and LIU Guo-ying   

  • Online:2018-11-14 Published:2018-11-14

摘要: 安全问题已成为制约云计算发展的重要因素。分析了服务持续可用性、服务真实性、数据完整性、信息保密性、可用性、不可抵赖性6方面的云安全目标,将云计算中6个层次的安全风险归纳为7类:物理安全风险、计算安全风险、可信计算安全风险、网络安全风险、管理安全风险、存储安全风险和应用安全风险等,并分别阐述了各类风险的安全对策。越安全的服务,在安全防护方面消耗的计算能力、存储、网络带宽就越多,指出应根据用户使用的服务类型、用户指定的安全要求以及接入网络特点等使用不同的安全保护措施,提出了按需防护的安全框架。分析了按需防护的安全框架的优点。最后给出了框架实际使用的方法。

关键词: 云计算,云模型,云安全,云安全框架,云安全目标,访问控制

Abstract: Security has become an important factor restricting the development of cloud computing.This paper analyzed the cloud security objectives from 6 aspects:service constancy,service authenticity,data integrity,data confidentiality,data availability and non repudiation.It summed up the cloud computing risk in seven categories:physical security risk,computing security risk,trusted computing security risk,network security risk,management security risk,storage securi-ty risk and application security risk,and elaborated the corresponding security strategies for every security risk.The stronger the securityis,the greater the consumption of computing,memory,and bandwidth resourcesis.This paper provided on-demand security framework for cloud computing which uses different safety protection measurement according to service type,security level and access network risk.The advantage of the framework was analyzed and the application method was provided.

Key words: Cloud computing,Cloud model,Cloud security,Cloud security framework,Cloud security objective,Access control

[1] 俞能海,郝卓,徐甲甲,等.云安全研究进展综述[J].电子学报,2013,41(5):371-381
[2] Chen Z G,Liu L P,Liu A F.Trust-sensitive Web service composition strategy based on black and white board[J].Journal on Communications,2010,31(6):25-35
[3] 邓谦.基于Hadoop的云计算安全机制研究[D].南京:南京邮电大学,2013
[4] 杨凯.银联数据异地灾难备份架构设计探讨[J].中国金融电脑,2005,9(9):51-54
[5] Damiani E,Vimercati D C,Paraboschi S.A reputation based approach for choosing reliable resources in peer-to-peer net-works[C]∥Proceedings of the 9th ACM Conference on Computer and Communications Security.2002:18-22
[6] Jurca R,Faltingsi B.Eliciting truthful feed-back for binary reputation mechanisms [C]∥Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence.2004:214-220
[7] 陈志刚,刘莉平,刘安丰.基于黑白板的信任敏感服务组合策略[J].通信学报,2010,31(6):25-35
[8] 潘静,徐锋,吕建.面向可信服务选取的基于声誉的推荐者发现方法[J].软件学报,2010,21(2):388-400
[9] 胡春华,刘济波,刘建勋.云计算环境下基于信任深化及集合的服务选择[J].通信学报,2011,32(7):71-79
[10] 于洋洋,虞慧群,范贵生.一种云存储数据完整性验证方法[J].华东理工大学学报,2013,39(4):211-216
[11] 顔湘涛,李益发.基于消息认证函数的云端数据完整性检测方案[J].电子与信息学报,2013,35(2):310-313
[12] 安玉,蒋天发,吴有林.一种基于量子保密通信及信息隐藏协议方案[J].武汉大学学报,2012,45(3):394-398
[13] 李顺东,王道顺.基于同态加密的高效多方保密计算[J].电子学报,2013,41(4):798-803
[14] Pan J,Xu F,Lv J.Reputation-based recommender discovery ap-proach for service selection[J].Chinese Journal of Software,2010,21(2):388-400
[15] Ryan M D.Cloud computing security:The scientific challenge,and a survey of solutions[J].The Journal of Systems and Software,2013,86(5):2263-2268
[16] Van-Hau P,Dacier M.Honeypot Trace Forensics:The Observation Viewpoint Matters[J].Future Generation Computer System,2011,27(5):539-546
[17] Shpantzer G.Implementing Hardware Roots of Trust:TheTrusted Platform Module Comes of Age[J].SANS Analyst Program,2013,40(6):1-15
[18] Liu H.A new form of DOS attack in a cloud and its avoidance mechanism[C]∥Proceedings of the 2010 ACM Work-shop on Cloud Computing Security Workshop.New York,USA:ACM Press,2010
[19] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83
[20] CSA.Security guidance for critical areas of focus in cloud computing v3.0.https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf
[21] Thomas C.OW2 and the Open Cloud Industry Ecosystem.www.ciecloud.org/2013

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!