期刊文献+

云计算应用及其安全策略研究 被引量:1

Study of cloud computing applications and their security strategies
下载PDF
导出
摘要 云计算能够在极短的时间内完成对庞大数据信息的处理,在现代社会中发挥着越来越重要的作用。相比于一般的模式,云计算具有虚拟化技术、按需定制以及动态可延伸性等特征。目前,云计算在应用过程中存在3个方面问题,包括虚假信息存在较大隐患、云计算服务商技术实力不强以及终端用户信息安全防卫不到位。为此,需要对云计算数据进行加密处理、加强云计算数据库的安全性以及提高安全审计技术在云计算中的运用,确保云计算系统的安全、稳定运行。文章对此展开了分析。 Cloud computing can complete the processing of huge data information in extreme time.It plays an increasingly important role in modern society.Compared to general models,cloud computing has the characteristics of virtualization technology,on-demand customization and dynamic extensibility.At present,there are three major problems in the application of cloud computing:false information exists,the technical strength of cloud computing service providers is not strong,and end-user information security is not in place.Therefore,it is necessary to encrypt cloud computing data,strengthen the security of cloud computing database and improve the application of security audit technology in cloud computing,so as to ensure the secure and stable operation of cloud computing systems.This paper analyzes it.
作者 魏蓉 Wei Rong(School of Information and Engineering,Wuhan International Trade University,Wuhan 430205,China)
出处 《无线互联科技》 2020年第4期139-140,共2页 Wireless Internet Technology
关键词 云计算 安全 策略 cloud computing safety strategy
  • 相关文献

参考文献7

二级参考文献34

  • 1赵永利,张杰.OMNET++与网络仿真[M].北京:人民邮电出版社,2012. 被引量:10
  • 2KEROMYTIS A D, MISRA V, RUBENSTEIN D. SOS: an architec- ture for mitigating DDoS attacks[J]. IEEE Journal on Selected Areas in Communications, 2004, 22(1): 176-187. 被引量:1
  • 3STAVROU A, KEROMYTIS A D. Countering DoS attacks with state- less multipath overlays[A]. Proceedings of the 12th ACM Conference on Computer and Communications Security CCS '05[C]. Alexandria, V'trginia, USA, 2005. 249-259. 被引量:1
  • 4XUAN D, CHELLAPPAN S, WANG X, et al. Analyzing the secure overlay services architecture under intelligent DDoS attacks[A]. Pro- ceedings of the 24th International Conference on Distributed Comput- ing Systems[C]. Tokyo Japan, 2004.408-417. 被引量:1
  • 5WANG X, CHELLAPPAN S, BOYER P, et al. On the effectiveness of secure overlay forwarding systems under intelligent distributed DoS attacks[J]. IEEE Transactions on Parallel and Distributed Systems,2006,17(7):619-632. 被引量:1
  • 6IN C H, HONG C S, WEI J, et al. An enhanced SOS architecture for DDoS attack defense using active network technology[A]. Proceed- ings of Advanced Industrial Conference on Telecommunications/Ser- vice Assurance with Partial and Intermittent Resources Conference/ ELearning on Telecommunications Workshop[C]. Lisbon, Portugal, 2005.90-95. 被引量:1
  • 7KAUR R, SANGA A L, KUMAR K. Secure overlay services (SOS): a critical analysis[A]. 2012 2rid IEEE International Conference on Par- allel, Distributed and Grid Computing[C]. Ottawa, Canada, 2012. 457-462. 被引量:1
  • 8DINGS L, ZHAO X H. Analysis and improvement on Chord protocol for structured P2P[A]. IEEE 3rd International Conference on Commu- nication Software and Networks[C]. Xi'an, China, 2011.214-218. 被引量:1
  • 9THIRUVATHUKAL G K, HINSEN K, LALrFER K, et al. V'trtualiza- tion for computational scientists[J]. Computing in, Science & Engi- neering, 2010,12(4):52-60. 被引量:1
  • 10ZHU H, CHEN H P. Adaptive failure detection VIA heartbeat under hadoop[A]. 2011 IEEE Asia-Pacific Services Computing Confer- ence[C]. Jeju, Korea, 2011. 231-238. 被引量:1

共引文献207

同被引文献4

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部