首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 593 毫秒
1.
云计算是一种新型的资源高效利用模式,它的高效率和高资源利用率使得云计算逐步成为信息时代的主流,然而随着云计算的横空出世,可信云计算、云计算安全的问题也纷至沓来。可信云计算技术与安全云计算技术两者既可以组合使用,也可以独立使用。它们共同构成了云计算网络安全技术。云计算网络安全技术的技术支撑是可信访问控制,密文检索与处理,数据存在与可使用性证明,数据隐私保护,虚拟安全技术,云资源访问控制等。可信云安全计算技术及其特征支撑着整个可信安全云系统,包括可信云服务数据中心、可信云用户端以及可信云管理平台。可以构建可信云安全技术的各应用系统,包括可信政务云系统、可信家务云系统、可信企业云系统、可信商务云系统。  相似文献   

2.
云计算作为一种全新的服务模式,其特点决定了它面临着比传统网络和信息安全更多的安全风险问题,且该问题已成为制约云计算发展的重要因素.介绍了云计算体系结构及特征,分析了云计算安全风险研究现状,重点剖析了云计算技术和管理的安全风险因素,并给出应对策略,可供云服务商、云用户和云监管机构参考或借鉴,对云计算的进一步发展具有一定的指导意义.  相似文献   

3.
陈臣  崔治总 《现代情报》2012,32(7):8-11
"云"计算是一种新兴的共享基础架构方法。"云"计算虽然给用户带来经济与高效的应用,但用户信息资源安全与隐私保护也受到极大的挑战。本文分析了数字图书馆IaaS云计算平台的安全问题,然后根据IaaS云计算平台特点,提出了数字图书馆IaaS云计算平台安全结构与安全策略。  相似文献   

4.
众所周知,云计算具有许多潜在的优势,许多企业应用程序和数据正在迁移到公共云或混合云。但是对于一些业务关键型应用程序,组织,尤其是大型企业,仍然不会将它们转移到云。云计算共享的市场规模仍然远远低于预期。从消费者的角度来看,云计算安全问题,尤其是数据安全和隐私保护问题,仍然是采用云计算服务的主要障碍。本文简要而全面地分析了数据生命周期的各个阶段与云计算相关的数据安全和隐私保护问题。  相似文献   

5.
王璐璐 《现代情报》2013,33(3):115-118
云计算的深入发展和应用,推动了云数据中心的构建和推广。通过对企业内部云数据中心的观察分析,总结企业内部云数据中心相对传统数据中心的优势,以及存在的安全、标准和成本问题。探讨当前企业私有云数据中心发展的重点,包括制定科学有效的云计算相关标准和推广混合云计算服务。  相似文献   

6.
云平台信息安全保护是云计算时代不得不面对的问题。本文从数据安全为题、虚拟化技术存在的隐患、云平台系统可靠性等云平台面临的安全问题入手,详细阐述了云平台的信息安全保护策略,包括云平台的搭建、数据加密和数据隔离的数据保护策略以及加强网络数据过滤和传送机制的网络安全策略,从而确保云平台的数据信息的安全。  相似文献   

7.
电子政务云安全风险分析   总被引:1,自引:0,他引:1  
姜茸  张秋瑾  李彤  马自飞 《现代情报》2014,34(12):12-16
云计算作为IT界的一次新浪潮,为电子政务提供了新运行模式,它能弥补传统电子政务的不足,实现电子政务服务集约化、开放化的需求。鉴于安全风险问题已成为阻碍电子政务云发展和应用的主要原因,且相关理论研究较为匮乏。本文首先介绍了电子政务云建设现状,以及云环境下电子政务集约化的发展模式;接着在梳理前人研究的云计算的安全风险的基础上,重点分析了电子政务云面临的安全风险因素;最后提出电子政务云安全风险应对策略。  相似文献   

8.
随着互联网技术的不断发展,云计算得到了快速的发展和广泛的应用。本文从云计算的概念入手,分析了云计算系统的体系结构和实现云计算的相关技术,并阐述了云技术安全问题及解决思路,为进一步地研究云计算提供了参考。  相似文献   

9.
文章对云计算的概念进行了解释,阐述了云计算在图书馆中的应用。分析并探讨了面对未来云计算可能遇到的安全、技术以及管理问题等,云提供商和图书馆该采取哪些措施去应对和解决。  相似文献   

10.
云计算安全管理平台是一个针对目前云计算的发展,以为用户建立安全可信云环境,保障用户信息资产的安全为目标的平台。本项目创新性地提出安全即服务设计架构,该平台包含两部分内容,一是整体环境安全保护,二是安全管理中心的统一管理。整体环境安全保护分为计算环境安全保护和云计算物理环境安全保护。云计算安全管理平台的研究,对促进云计算健康有序的发展,保障个人及企业云用户的重要信息安全,具有重要意义。  相似文献   

11.
随着云计算的深入人心,云计算安全性问题逐渐成为引人关注的焦点之一,实际上这已经成为制约云计算发展的瓶颈。从不同参与者的角度分析了云计算安全需求,并深入剖析了云计算安全问题及面临的挑战。同时,在此基础上提出了一种云计算安全模型,并对相关安全技术进行了具体分析。  相似文献   

12.
云计算安全问题是限制云计算发展的主要问题,一直是IT 界研究的热点。介绍了云计算的特点和服务模式,总结了云计算的安全问题,最后根据云计算的层次架构探讨了解决各层次安全问题的安全策略,并在此基础上提出了一种云计算安全框架。  相似文献   

13.
For many companies the remaining barriers to adopting cloud computing services are related to security. One of these significant security issues is the lack of auditability for various aspects of security in the cloud computing environment. In this paper we look at the issue of cloud computing security auditing from three perspectives: user auditing requirements, technical approaches for (data) security auditing and current cloud service provider capabilities for meeting audit requirements. We also divide specific auditing issues into two categories: infrastructure security auditing and data security auditing. We find ultimately that despite a number of techniques available to address user auditing concerns in the data auditing area, cloud providers have thus far only focused on infrastructure security auditing concerns.  相似文献   

14.
本文首先从服务端讨论了云计算可能给网络管理的安全性、可靠性和可用性、虚拟化、大规模超大规模、灾难恢复等方面带来的影响;接着,讨论了云计算对客户端的连接的可靠性和安全性、数据同步、离线应用、内部系统管理等方面带来的可能影响;最后,笔者提出了一些建议,以便相关从业人员可以更好地为云计算时代的到来做好技术准备。  相似文献   

15.
通过阐述云计算的经典案例,结合各主流厂商比如Google、Amazon以及微软关于云计算的理念,得出云计算的基本原理和相关特征,并且指出云计算所面临的安全、标准、适用范围、可用性等方面的挑战。  相似文献   

16.
This paper presents a systematic approach to develop a resilient software system which can be developed as emerging services and analytics for resiliency. While using the resiliency as a good example for enterprise cloud security, all resilient characteristics should be blended together to produce greater impacts. A framework, cloud computing adoption framework (CCAF), is presented in details. CCAF has four major types of emerging services and each one has been explained in details with regard to the individual function and how each one can be integrated. CCAF is an architectural framework that blends software resilience, service components and guidelines together and provides real case studies to produce greater impacts to the organizations adopting cloud computing and security. CCAF provides business alignments and provides agility, efficiency and integration for business competitive edge. In order to validate user requirements and system designs, a large scale survey has been conducted with detailed analysis provided for each major question. We present our discussion and conclude that the use of CCAF framework can illustrate software resilience and security improvement for enterprise security. CCAF framework itself is validated as an emerging service for enterprise cloud computing with analytics showing survey analysis.  相似文献   

17.
Today’s data is sensitive that requires privacy and security both from the cloud service providers (CSP) as well as from users in its all the form of data states: data at rest, while transferring data, enquiring data, and processing the data. Cloud computing has been applied in the health sector, national security services, banking and other business and companies that store confidential data into the cloud as we have seen in recent years. Therefore, information and data security is a crucial issue that needs to be addressed thoroughly in the cloud computing business. This research deals with the performance analysis of recent cloud data security models. This paper proposes cloud data security models based on Business Process Modeling Notations (BPMN) and simulation results can reveal performances issues related to data security as part of any organizations initiative on Business process management (BPM).  相似文献   

18.
Cloud computing is a current trend that reveals the next-generation application architecture and it is estimated that by 2013 the cloud market will have reached $8.1bn. While cloud services such as webmail, Flickr and YouTube have been widely used by individuals for some time, it not until relatively recently that organisations have began to use cloud services as a tool for meeting their IT needs. This study aims to investigate how cloud computing is understood by IT professionals and the concerns that IT professionals have in regard to the adoption of cloud services. The study was carried out in Taiwan and used a survey by interview approach to understand IT professionals’ understandings and concerns about cloud computing. The findings of the study suggest that while the benefits of cloud computing such as its computational power and ability to help companies save costs are often mentioned in the literature, the primary concerns that IT managers and software engineers have are compatibility of the cloud with companies’ policy, IS development environment, and business needs; and relative advantages of adopting cloud solutions. The findings also suggest that most IT companies in Taiwan will not adopt cloud computing until the uncertainties associated with cloud computing, e.g. security and standardisation are reduced and successful business models have emerged.  相似文献   

19.
This article focuses on the role of accountability within information management, particularly in cloud computing contexts. Key to this notion is that an accountable Cloud Provider must demonstrate both willingness and capacity for being a responsible steward of other people's data. More generally, the notion of accountability is defined as it applies to the cloud, and a conceptual model is presented related to the provision of accountability of cloud services. This allows a consideration of accountability at various different levels of abstraction, including the operationalisation of accountability. It is underpinned by fundamental requirements for strong accountability, which in particular are aimed at avoiding risks in the provision and verification of accounts (that include different types of accountability evidence and notifications, that may need to be provided to other cloud actors including data subjects, cloud customers and regulators). In addition, the article sketches what kind of tools, mechanisms and guidelines support this in practice, and discusses these in the light of the upcoming European Data Protection Regulation.  相似文献   

20.
云计算使图书馆在云网互联的虚拟空间里日益构筑起联邦式的图书馆云盟,众多的图书馆利用云计算平台架构起信息共享空间,共同分享由大量计算系统连接在一起而形成的软硬件基础设施、存储资源及各项基础性和知识性服务。但图书馆云联邦在发展过程中,还存在着云计算平台建设水平与云安全等两个重要瓶颈。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号