Journal on CommunicationsVol. 37, Issue Z1, Pages: 104-110(2016)
作者机构:
1. 华北理工大学理学院,河北 唐山 063000
2. 华北理工大学冶金与能源学院,河北 唐山 063000
3. 华北理工大学信息工程学院,河北 唐山 063000
作者简介:
基金信息:
The National Key Research and Development Program(2016YFB0601403);The National Natural Science Foundation of China(51504080);The National Natural Science Foundation of China(51674121);The Natural Science Foundation of Hebei Education Department(QN2016088)
With the rapid development of information technology
cloud computing has become a hot topic.More and more companies and individuals will be their computing needs and storage needs to be delivered to the cloud
so the security problem of cloud computing can not be ignored.First
the security requirements of the four key technologies
such as multi tenant
node communication
remote storage and virtualization in the cloud computing environment were analyzed
the necessity of the construction of cloud computing security was expounded.Then
according to the security requirements of cloud computing
fuzzy comprehensive evaluation model based on ana-lytic hierarchy process was established
and taking a cloud service platform as an example to evaluate its security
get the security level of the service platform is "good".Finally
according to the security requirements of cloud computing environment and the results of model evaluation
some suggestions in in virtualization security
applica-tion security and data security was put forward
in order to strengthen the cloud computing security
some direction was provided.
关键词
Keywords
references
WANG W , GAO N , JIANG L N . Security demands analysis of cloud computing[C]//The 27th National Conference on Computer Security . 2012 : 75 - 78 .
HE B H , LI J . Present situation and prospect of the development of China's cloud computing [J ] . Telecommunications Technology , 2012 ( 1 ): 22 - 24 .
ZHANG H , LU K . Building security check and risk assessment index system on cloud computing environment [J ] . Netinfo security , 2014 ( 9 ): 115 - 119 .
WANG X Z , MA Y . nformation security risk assessment of cloud computing [J ] . Computer Security , 2014 ( 9 ): 37 - 40 .
LUO D J . Research on key issues in cloud computing security based on trusted computing [D ] . Guangzhou : South China University of Technology , 2014 .
ZHOU W J . Research on demand analysis of cloud computing security in high speed charging [J ] . Transpo World , 2015 ( 24 ): 132 - 133 .
WEI W , YANG X L , SHEN P Y , et al . Holes detection in anisotropic sensornets:topological methods [J ] . International Journal of Distrib-uted Sensor Networks , 2012 , 2012 .
HU W , LONG Q H , QIAN M , et al . Determnation of evaluation index system weight for enterprises wasterwater treatment based on AHP [J ] . Environmental Pollution & Control , 2014 , 36 ( 2 ): 88 - 95 .
CHEN X H , YANG Z H . The study credit evaluation system based on improved fuzzy evaluation method [J ] . Chinese Journal of Manage-ment Science , 2015 , 23 ( 1 ): 146 - 153 .
YANG J , WANG Z Q . Post-benefit evaluation of land consolidation project implementation based on ahp and fuzzy comprehensive evalua-tion [J ] . Resources and Environment in the Yangtze Basin , 2013 , 22 ( 8 ): 1036 - 1042 .
WEI W , XU Q , WANG L , et al . GI/Geom/1 queue based on commu-nication model for mesh networks [J ] . International Journal of Com-munication Systems , 2014 , 27 ( 11 ): 3013 - 3029 .
WEI W , QI Y . Information potential fields navigation in wireless ad-hoc sensor networks [J ] . Sensors , 2011 , 11 ( 5 ): 4794 - 4807 .
JIANG X , HE X X . The Third research institute of ministry of public security [J ] . Microcomputer Applications , 2014 , 30 ( 2 ): 30 - 34 .