期刊文献+

个人云计算安全框架的研究 被引量:5

Research on Security Framework for Personal Cloud Computing
下载PDF
导出
摘要 文章对个人云计算的安全进行了研究,分析了云计算所面临的安全威胁,以及目前主要云服务Amazon EC2的安全问题。同时,在归纳出云安全框架的要求基础上,完善了个人云计算安全框架的要求。最后,通过描述具有可扩展、云编排和安全等特性的服务模型构建了一种通用的个人云计算安全框架。 This paper analyzes the security threat what cloud computing facing, as well as security problems of the main cloud service Amazon EC2, through researching personal cloud computing security. We improve the requirements of personal cloud computing security framework, based on summarized cloud security framework requirements for previous researches at the same time. We design a generalized security framework for personal cloud computing by describing a service model with scalability, cloud orchestration and security finally.
出处 《信息网络安全》 2011年第12期72-75,共4页 Netinfo Security
基金 国家自然科学基金[40571128] 国家民委重点科研项目[Mzy02004] 湖北省教育厅科研项目[B20110804]
关键词 个人云计算 云计算服务 云安全框架 personal cloud computing cloud computing services cloud security framework
  • 相关文献

参考文献9

二级参考文献25

  • 1郭乐深 张乃靖 尚晋刚.云计算环境安全框架.博士之窗理论研究,2009,(7):1671-1122. 被引量:7
  • 2Ongtang M,Hurson A R,Yu Jiao.Agent-based infrastructure for data and transaction management in mobile heterogeneous environment[C] //IEEE.WRI International Conference on Communications and Mobile Computing.Kunming:IEEE,2009:314-318. 被引量:1
  • 3Ongtang M,Hurson A R,Yu Jiao,et al.Agent-based transactions management for mobile multidatabase[C] //IEEE.Third IEEE International Conference on Wireless and Mobile Computing,Networking and Communications,White Plains.New York:IEEE,2007:67-74. 被引量:1
  • 4Ulusoy O.Real-time data management for mobile computing[C] //IEEE.Proc of International Workshop on Issues and Applications of Database Technology.Berlin:IEEE,1998:234-240. 被引量:1
  • 5Dunham M H,Helal A,Balakrishnan S.A mobile transaction model that captures both the data and movement behavior[J].Mobile Networks and Applications,1997(2):149-162. 被引量:1
  • 6Xu Lizhen,Jiang Mingfei,Dong Yisheng.Transa-ction management of database in mobile computing environment[J].Journal of Southeast University,2002,32(6):885-888. 被引量:1
  • 7Weikum G,Vossen G.Transaction information systems:theory,algorithms,practice of concurrency control and recovery[M].Beijing:Citic Publishing House,1996:94-96. 被引量:1
  • 8Silberschatz A,Korth H F,Sudarshan S.Database system concepts[M].Beijing:China Machine Press,2008:426-429. 被引量:1
  • 9Quazi E K M,Hidenori N.Timestamp based optimistic concurrency control[C] //IEEE.TENCON 2005-IEEE Region 10.Melbourne:IEEE,2005:1-5. 被引量:1
  • 10Pitoura E,Bhargava B.Maintaining consistency of data in mobile computing environments[C] //IEEE.Proc of the 15th International Conference on Distributed Computing Systems.Vancouver:IEEE,1995:404-413. 被引量:1

共引文献60

同被引文献41

  • 1蒋天发.含空值关系数据库泛关系及其实例的研究[J].武汉大学学报(工学版),2004,37(6):89-92. 被引量:2
  • 2云计算之后,雾计算开始[EB/OL].http://www.cnblogs.com/dreign/p/3873176.html,2014. 被引量:1
  • 3云计算的下一站是雾计算[EB/OL].http://www.50cnnet.com/content-113-71715-1.html,2014. 被引量:1
  • 4Bonomi F,Milito R,Zhu Jiang,et al.Fog Computing and Its Role in the Internet of Things[C].Proceedings of the first edition of the MCC workshop on Mobile cloud computing.New York,USA:ACM,2012. 被引量:1
  • 5F.Bonomi.The internet of things and fog computing[C]The Eighth ACM Inter national Workshop on Vehicular Internet working(VANET 2011).Las Vegas,USA:ACM,2011. 被引量:1
  • 6网络带宽有限让“雾计算”来帮忙[EB/OL].http://www.cfc365.com/it/figures2/2014-05-26/12353.shtml,2014. 被引量:1
  • 7百度百科.家庭云[EB/OL].http://baike.baidu.com/view/7153468.htm,2014. 被引量:1
  • 8值得期待的雾计算[EB/OL].http://news.xinhuanet.com/tech/2014-06/23/c_126657116.htm,2014. 被引量:1
  • 9Fenn J,Raskino M,Gammage B. Gartner's hype cycle special report for 2009.ID Number:GO016974[R].[S.L.1:Gartner,Inc,2009. 被引量:1
  • 10Fenn J. Flype cycle[or emerging technologies,2010.ID Number:G00205757[R].[S.L.].Gart-ner,Inc,2010. 被引量:1

引证文献5

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部