浏览全部资源
扫码关注微信
1. 华北理工大学理学院,河北 唐山 063000
2. 华北理工大学冶金与能源学院,河北 唐山 063000
3. 华北理工大学信息工程学院,河北 唐山 063000
[ "杨爱民(1978-),男,河北保定人,博士,华北理工大学副教授,主要研究方向为工程计算与应用、并行计算与数据处理、智能算法设计等。" ]
[ "高放(1996-),男,河北保定人,主要研究方向为数学建模与计算机。" ]
[ "边敏华(1996-),女,陕西咸阳人,主要研究方向为高性能计算与计算机。" ]
[ "杨曙磊(1995-),男,河北保定人,主要研究方向为数学建模与计算机。" ]
网络出版日期:2016-10,
纸质出版日期:2016-10-25
移动端阅览
杨爱民, 高放, 边敏华, 等. 基于层次分析—模糊评价的云计算安全评估与对策[J]. 通信学报, 2016,37(Z1):104-110.
杨爱民, 高放, 边敏华, 等. 基于层次分析—模糊评价的云计算安全评估与对策[J]. 通信学报, 2016,37(Z1):104-110. DOI: 10.11959/j.issn.1000-436x.2016255.
随着信息技术的飞速发展,云计算已然成为热门话题。越来越多的企业和个人将计算需求和存储需求交给云端,同时云计算的安全问题也日益凸显。基于此,首先对云计算环境中虚拟化安全、应用安全以及数据安全下的多租户、节点通信、远程存储以及虚拟化这4项关键技术的安全需求进行分析,阐述了云计算安全建设的必然性。然后,依据云计算安全需求和国家基本要求建立基于层次分析法的模糊综合评价模型,对某云服务平台进行安全性评估,得出该服务平台安全级别为“好”。最后,综合云计算环境的安全需求以及模型评价结果,针对云计算环境下的虚拟化安全、应用安全和数据安全这3个方面提出了一定建议,为加强云计算环境安全提供一些参考。
With the rapid development of information technology
cloud computing has become a hot topic.More and more companies and individuals will be their computing needs and storage needs to be delivered to the cloud
so the security problem of cloud computing can not be ignored.First
the security requirements of the four key technologies
such as multi tenant
node communication
remote storage and virtualization in the cloud computing environment were analyzed
the necessity of the construction of cloud computing security was expounded.Then
according to the security requirements of cloud computing
fuzzy comprehensive evaluation model based on ana-lytic hierarchy process was established
and taking a cloud service platform as an example to evaluate its security
get the security level of the service platform is "good".Finally
according to the security requirements of cloud computing environment and the results of model evaluation
some suggestions in in virtualization security
applica-tion security and data security was put forward
in order to strengthen the cloud computing security
some direction was provided.
WANG W , GAO N , JIANG L N . Security demands analysis of cloud computing[C]//The 27th National Conference on Computer Security . 2012 : 75 - 78 .
HE B H , LI J . Present situation and prospect of the development of China's cloud computing [J ] . Telecommunications Technology , 2012 ( 1 ): 22 - 24 .
ZHANG H , LU K . Building security check and risk assessment index system on cloud computing environment [J ] . Netinfo security , 2014 ( 9 ): 115 - 119 .
WANG X Z , MA Y . nformation security risk assessment of cloud computing [J ] . Computer Security , 2014 ( 9 ): 37 - 40 .
罗东俊 . 基于可信计算的云计算安全若干关键问题研究 [D ] . 广州 : 华南理工大学 , 2014 .
LUO D J . Research on key issues in cloud computing security based on trusted computing [D ] . Guangzhou : South China University of Technology , 2014 .
ZHOU W J . Research on demand analysis of cloud computing security in high speed charging [J ] . Transpo World , 2015 ( 24 ): 132 - 133 .
WEI W , YANG X L , SHEN P Y , et al . Holes detection in anisotropic sensornets:topological methods [J ] . International Journal of Distrib-uted Sensor Networks , 2012 , 2012 .
HU W , LONG Q H , QIAN M , et al . Determnation of evaluation index system weight for enterprises wasterwater treatment based on AHP [J ] . Environmental Pollution & Control , 2014 , 36 ( 2 ): 88 - 95 .
CHEN X H , YANG Z H . The study credit evaluation system based on improved fuzzy evaluation method [J ] . Chinese Journal of Manage-ment Science , 2015 , 23 ( 1 ): 146 - 153 .
YANG J , WANG Z Q . Post-benefit evaluation of land consolidation project implementation based on ahp and fuzzy comprehensive evalua-tion [J ] . Resources and Environment in the Yangtze Basin , 2013 , 22 ( 8 ): 1036 - 1042 .
WEI W , XU Q , WANG L , et al . GI/Geom/1 queue based on commu-nication model for mesh networks [J ] . International Journal of Com-munication Systems , 2014 , 27 ( 11 ): 3013 - 3029 .
WEI W , QI Y . Information potential fields navigation in wireless ad-hoc sensor networks [J ] . Sensors , 2011 , 11 ( 5 ): 4794 - 4807 .
JIANG X , HE X X . The Third research institute of ministry of public security [J ] . Microcomputer Applications , 2014 , 30 ( 2 ): 30 - 34 .
0
浏览量
953
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构