Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Acta Electronica Sinica》 2013-02
Add to Favorite Get Latest Update

Review of Cloud Computing Security

YU Neng-hai,HAO Zhuo,XU Jia-jia,ZHANG Wei-ming,ZHANG Chi(School of Science and Technology,University of Science and Technology of China,Hefei,Anhui 230027,China)  
With the development of cloud computing in the academia and industry,it is inevitable that many security problems arise.This paper summarizes the security requirements of cloud computing,which not only cover the traditional security requirements like confidentiality,data integrity,access control and identity authentication,but also introduce new security requirements in the credibility,configuration and virtual machinery.We make conclusions about the security situations on two typical cloud computing products:Amazon Web Services and Windows Azure and elaborate two attack mechanisms against cloud computing:Denial of service attack and Side channel attack.Based on the security requirements and attacks against cloud computing,we systematically summarize the current security protection mechanisms and further make a comparison among them.
【Key Words】: cloud computing confidentiality data integrity access control public verifiability credibility security of virtual machine
【Fund】: 国家自然基金(No.61170234 No.60803155);; 中国科学院“面向感知中国的新一代信息技术研究”战略性先导科技专项子课题(No.XDA06030601)
【CateGory Index】: TP309
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 1 Hits
1 LIU Ming,LIU Chang-wen,TONG Hui (Beijing Police College,Beijing 102202,China);Research on Information Security of SOA[J];Netinfo Security;2013-06
【Citations】
Chinese Journal Full-text Database 1 Hits
1 FENG Deng-Guo,ZHANG Min+,ZHANG Yan,XU Zhen(State Key Laboratory of Information Security,Institute of Software,The Chinese Academy of Sciences,Beijing 100190,China);Study on Cloud Computing Security[J];Journal of Software;2011-01
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 XIE Qi1,2,WU JiYi2,4,WANG GuiLin3,LIU WenHao1,CHEN DeRen4&YU XiuYuan1 1 School of Information Science and Engineering&Institute of Cryptology and Its Applications,Hangzhou Nor- mal University,Hangzhou 310036,China; 2 Key Lab of E-Business and Information Security,Hangzhou Normal University,Hangzhou 310036,China; 3 University of Wollongong,School of Computer Science&Software Engineering,Wollongong NSW 2522,Aus- tralia; 4 College of Computer Science,Zhejiang University,Hangzhou 310027,China;Provably secure authentication protocol based on convertible proxy signcryption in cloud computing[J];Scientia Sinica(Informationis);2012-03
2 MA Qiang1,FU Yan-ru2 (1.Dept.of Information,Zhejiang Officers Vocational College,Hangzhou 310018,China; 2.Dept.of Basic Science,Zhejiang Officers Vocational College,Hangzhou 310018,China);Study on cloud computing aided instruction-CCAI and teaching resources organizing[J];Journal of Qiqihar University(Natural Science Edition);2011-05
3 LIN Zi-Yu1,LAI Yong-Xuan2,LIN Chen1,XIE Yi1,ZOU Quan1 1(Department of Computer Science,Xiamen University,Xiamen 361005,China) 2(School of Software,Xiamen University,Xiamen 361005,China);Research on Cloud Databases[J];Journal of Software;2012-05
4 HE Han-yang(Shantou Polytechnic,Shantou 515078,Guangdong,China);Investigation of a Feasible Security Software Architecture of Cloud Computing on Campus[J];Journal of Shantou University(Natural Science Edition);2012-02
5 LUO Jun-zhou,JIN Jia-hui,SONG Ai-bo,DONG Fang(School of Computer Science and Engineering,Southeast University,Nanjing 211189,China);Cloud computing:architecture and key technologies[J];Journal on Communications;2011-07
6 HU Chun-hua1,2,LIU Ji-bo1,LIU Jian-xun3(1.School of Computer and Electronic Engineering,Hunan University of Commerce,Changsha 410205,China; 2.School of Business,Central South University,Changsha 410083,China; 3.School of Computer Science and Engineering,Hunan University of Science and Technology,Xiangtan 412201,China);Services selection based on trust evolution and union for cloud computing[J];Journal on Communications;2011-07
7 XU Jian1,2,ZHOU Fu-cai1,CHEN Xu1,ZHU Zhi-liang2(1.Software College,Northeastern University,Shenyang 110004,China; 2.College of Information Science and Engineering,Northeastern University,Shenyang 110004,China);Data outsourcing authentication model based on authenticated data structures for cloud computing[J];Journal on Communications;2011-07
8 HU Chun-hua1,2,LUO Xin-xing2,WANG Si-chun1,LIU Yao1(1.School of Computer and Information Engineering,Hunan University of Commerce,Changsha 410205,China; 2.School of Business,Central South University,Changsha 410083,China);Approach of service evaluation based on trust reasoning for cloud computing[J];Journal on Communications;2011-12
9 LIN Guo-yuan1,2,3,HE Shan1,HUANG Hao2,WU Ji-yi3,CHEN Wei1(1.School of Computer,China University of Mining and Technology,Xuzhou 221116,China; 2.Department of Computer,Nanjing University,Nanjing 210093,China; 3.Hangzhou Normal University,Key Lab of E-Business and Information Security,Hangzhou 310036,China);Access control security model based on behavior in cloud computing environment[J];Journal on Communications;2012-03
10 YANG Shao-yu,WANG Shi-qing,DU Shi-qiong(College of Information Engineering,Zhengzhou University,Zhengzhou 450000,China);Research of automated trusted negotiation in cloud computing[J];Computer Engineering and Design;2012-09
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 ;Classified Research on Information Shared in the Supply Chain[J];Journal of Intelligence;2010-11
2 LIU Xue-lin (Xiangfan University,Xiangyang,Hubei 441053,China);Analysis of the main obstacles in supply chain information sharing[J];Technological Development of Enterprise;2011-15
3 CHEN Kang1,2,ZHENG Wei-Min1,2 1(Tsinghua National Laboratory for Information Science and Technology,Tsinghua University,Beijing 100084,China) 2(Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China);Cloud Computing:System Instances and Current Research[J];Journal of Software;2009-05
4 FENG Deng-Guo,ZHANG Min+,ZHANG Yan,XU Zhen(State Key Laboratory of Information Security,Institute of Software,The Chinese Academy of Sciences,Beijing 100190,China);Study on Cloud Computing Security[J];Journal of Software;2011-01
5 SUI Xin1,2,ZHU Yun-long1,NAN Lin1,YAN Xiao-hui1,2(1.Key Laboratory of Industrial Informatics,Shenyang Institute of Automation,Chinese Academy of Sciences, Shenyang 110016,China;2.Graduate University,Chinese Academy of Sciences,Beijing 100049,China);Design and implementation of SOA based supply chain management platform[J];Computer Engineering and Design;2012-01
6 XU Xiao-long,CHENG Chun-ling,XIONG Jing-yi (College of Computer,Nanjing University of Posts and Telecommunications,Nanjing 210003,China);Conjunct model of cloud & client computing based on multi-agent[J];Journal on Communications;2010-10
7 YANG Liu,TANG Zhuo,LI Ren-fa,ZHANG Zong-li(Embedded Systems and Networking Laboratory,Hunan University,Changsha 410082,China);Roles query algorithm in cloud computing environment based on user require[J];Journal on Communications;2011-07
8 WANG Ting,HUANG Guo-bin (School of Management,Beijing Normal University,Beijing 100875,China);Research Progress of Cloud Security From 2008 to 2011 in China[J];Information Science;2013-01
9 WANG Ming-yi (School of Economics,Nankai University,Tianjin 300071,China);Supply Chain Information Sharing:Content,Pattern and Incentive[J];Logistics Technology;2010-17
10 HUANG Ruwei~(1,3),GUI Xiaolin~1,YU Si~1,ZHANG Jin~2,QING Duzheng~2 (1.Department of Electronics and Information Engineering,Xi'an Jiaotong University,Xi'an 710049,China; 2.Science and Technology on Special System Simulation Laboratory,Beijing 100854,Chinas 3.School of Computer.Electronics and Information,Guangxi University,Nanning 530004,China);Design of Cloud Storage Framework with Privacy-Preserving[J];Journal of Xi'an Jiaotong University;2011-10
【Secondary Citations】
Chinese Journal Full-text Database 1 Hits
1 CHEN Kang1,2,ZHENG Wei-Min1,2 1(Tsinghua National Laboratory for Information Science and Technology,Tsinghua University,Beijing 100084,China) 2(Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China);Cloud Computing:System Instances and Current Research[J];Journal of Software;2009-05
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved