Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Acta Electronica Sinica》 2013-02
Add to Favorite Get Latest Update

Review of Cloud Computing Security

YU Neng-hai,HAO Zhuo,XU Jia-jia,ZHANG Wei-ming,ZHANG Chi(School of Science and Technology,University of Science and Technology of China,Hefei,Anhui 230027,China)  
With the development of cloud computing in the academia and industry,it is inevitable that many security problems arise.This paper summarizes the security requirements of cloud computing,which not only cover the traditional security requirements like confidentiality,data integrity,access control and identity authentication,but also introduce new security requirements in the credibility,configuration and virtual machinery.We make conclusions about the security situations on two typical cloud computing products:Amazon Web Services and Windows Azure and elaborate two attack mechanisms against cloud computing:Denial of service attack and Side channel attack.Based on the security requirements and attacks against cloud computing,we systematically summarize the current security protection mechanisms and further make a comparison among them.
【Fund】: 国家自然基金(No.61170234 No.60803155);; 中国科学院“面向感知中国的新一代信息技术研究”战略性先导科技专项子课题(No.XDA06030601)
【CateGory Index】: TP309
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 3 Hits
1 ZHANG Yao-xue,ZHOU Yue-zhi(Department of Computer Science and Technology,Tsinghua National Laboratory for Information Science and Technology,Tsinghua University,Beijing 100084,China);A New Cloud Operating System:Design and Implementation Based on Transparent Computing[J];Acta Electronica Sinica;2011-05
2 WU Ji-yi1,2,FU Jian-qing1,PING Ling-di1,XIE Qi2,3(1.School of Computer Science and Technology,Zhejiang University,Hangzhou,Zhejiang 310027,China;2.Key Laboratory of E-Business and Information Security,Hangzhou Normal University,Hangzhou,Zhejiang 310036,China;3.School of Computer Science,University of Birmingham,Birmingham B15 2TT,UK);Study on the P2P Cloud Storage System[J];Acta Electronica Sinica;2011-05
3 FENG Deng-Guo,ZHANG Min+,ZHANG Yan,XU Zhen(State Key Laboratory of Information Security,Institute of Software,The Chinese Academy of Sciences,Beijing 100190,China);Study on Cloud Computing Security[J];Journal of Software;2011-01
Chinese Journal Full-text Database 10 Hits
1 Guo Chen(The People's Bank of China Central Subbranch in Dalian Technology Statistics LiaoningDalian 116001);How to Resolve the Potential Risk of Cloud Computing[J];Information Security and Technology;2012-03
2 YANG Zheng-xiao1 YANG Yang2 (1.CHien-shiun Polytechnic,Taicang 215411 2.Nantong University,Nantong 226019,China);The Research and Development of Production and Teaching Platform Based on Cloud Computing[J];Journal of Changzhou Vocational College of Information Technology;2012-01
3 LI Wei (China Mobile Group Design Institute Co.,Ltd.,Beijing 100080,China);Study and exploration on cloud computing security[J];Telecom Engineering Technics and Standardization;2012-04
4 GENG Yan(Inventec(Tianjin) electronic technology limited company,Tianjin 300193);Cloud Database Security Problem Analysis[J];Computer Programming Skills & Maintenance;2012-08
5 HU Heng-wu,ZHANG Jun-lan,LI Min (1.School of Information Engineering,Guangdong Medical College,Dongguan 523808,China 2.Center of Network and Information,University of South China,Hengyang 421000,China);Research on Construction of Platform for Digital Experiment Teaching on Anatomy[J];Computer and Information Technology;2012-03
6 LIU Kai-hua,LI Xiong (Information Occupation Technique Institute of Hunan,Changsha 410001,China);Analyze the Security Model and Policy of Cloud Computing[J];Computer Knowledge and Technology;2011-08
7 LI Song-tao,HU Heng-wu(Guangdong Medical College,Zhanjiang 524023,China);Application of Intrusion tolerance PKI in Cloud Database[J];Computer Knowledge and Technology;2011-17
8 HUANG Hua(Qingyuan Polytechnic,Qingyuan 511500,China);Cloud Computing Security Key Technologies[J];Computer Knowledge and Technology;2011-23
9 HAN Zhi-hong,ZENG Qing-yan,DU Yan-tao,WANG Zi-hu,ZHANG Huan-le(Cloud Computing Institute,Yuzhou Academy of technology,Xinyu 338029,China);Economic Analysis on the Cloud Computing Terminal Architecture Model of E-reading Room and its Practice[J];Computer Knowledge and Technology;2012-03
10 LIU Chao1,2,SUN Fu-quan2,CHENG Xu2(1.School of Information Science and Technology,Dalian Maritime University,Dalian 116026,China;2.Neusoft Institute of Information,Dalian 116023,China);Security Research On Cloud-based Logistics Service Platform[J];Computer Knowledge and Technology;2012-09
China Proceedings of conference Full-text Database 4 Hits
1 ;Security Integration Scheme of Cloud Computing Infrastructure Based on Trust Computing Technology[A];[C];2012
2 ZHANG Da-jun~1,LI Yun-fa~2,ZHENG Zhou (1.Ningbo Public Security Bureau,Ningbo Zhejiang 315000,China; 2.School of Computer Science and Technology,Hangzhou Dianzi University,Hangzhou Zhejiang 310018,China);A Secure Sharing Mechanism for Data Resources in Cloud Computing[A];[C];2012
3 DUAN Yi-zhen~(1,2),WANG Xiao-cheng~1,LIU Zhong~2 (1.Institute 706 of Second Academy of China Aerospace Science and Industry Corporation,Beijing 100854,China; 2.Chengdu Institute of Computer Application Chinese Academy of Sciences,Chengdu Sichuan 610041,China);Cloud Computing Security:Concept,Status and Key Technologies[A];[C];2012
4 ZHONG Rui-ming~(1,2),LIU Chuan-yi~(2,3),FANG Bin-xing~(1,2),XIANG Fei~(1,2) (1.School of Computer Science,Beijing University of Posts and Telecommunications,Beijing,100876,China: 2.Key Laboratory ofTrustworthy Distributed Computing and Service of the Ministry of Education of China,Beijing University of Posts and Telecommunications,Beijing,100876,China; 3.School of Software Engineering,Beijing University of Posts and Telecommunications,Beijing,100876,China);A Cost-aware Data Reliability Provision Algorithm for the Cloud Providers[A];[C];2012
【Secondary Citations】
Chinese Journal Full-text Database 5 Hits
1 Wu Jiyi1,2,Ping Lingdi1,Pan Xuezeng1,Li Zhuo1(1.School of Computer Science and Technology,Zhejiang University,Hangzhou 310027,China;2.Key Lab of E-Business and Information Security,Hangzhou 310036,China);Cloud Computing:Concept and Platform[J];Telecommunications Science;2009-12
2 ZHANG Yao-xue (Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China);Transparence Computing:Concept,Architecture and Example[J];Acta Electronica Sinica;2004-S1
3 ZHANG Wei1,2,MA Jian-feng1,WANG Liang-min1,GUO Yuan-bo2 (1.Key Laboratory of Computer Network and Information Security under Ministry of Education,Xidian University,Xi′an,Shaanxi 710071,China;2.Engineering Institute of the Armed Police,Xi′an,Shaanxi 710086,China; 3.The School of Electronic Techonology,Information Engineering University of PLA,Zhengzhou,Henan 450004,China);Threshold Byzantine Quorum System and Distributed Storage[J];Acta Electronica Sinica;2008-02
4 LI Yong-Jun DAI Ya-Fei(Department of Computer Science and Technology,Peking University,Beijing 100871);Research on Trust Mechanism for Peer-to-Peer Network[J];Chinese Journal of Computers;2010-03
5 CHEN Kang1,2,ZHENG Wei-Min1,2 1(Tsinghua National Laboratory for Information Science and Technology,Tsinghua University,Beijing 100084,China) 2(Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China);Cloud Computing:System Instances and Current Research[J];Journal of Software;2009-05
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved