检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:涂山山[1,2,3] 胡俊[1,2,3] 宁振虎[1,2,3] 王晓[1,2,3] 刘国杰[1,2,3]
机构地区:[1]北京工业大学信息学部,北京100124 [2]可信计算北京市重点实验室(北京工业大学),北京100124 [3]信息安全等级保护关键技术国家工程实验室(北京工业大学),北京100124
出 处:《信息安全研究》2017年第5期440-450,共11页Journal of Information Security Research
基 金:国家自然科学基金项目(61671030);国家"八六三"高技术研究发展计划基金项目(2015AA016002)
摘 要:在云环境中,由于资源的高度集中、共享,信任问题显得尤为重要,与此同时可信计算作为一种新兴的安全机制,可以保障用户的数据安全,为用户提供可信任的计算环境,因此将可信计算与云计算技术相结合是云安全研究的一种新思路.传统可信计算需要从物理的可信根出发,并且在系统中构造完整的可信链,而在云计算中,用户应用是在虚拟的计算环境中运行,因此虚拟可信根的构造以及可信链的传递等都是云环境中可信计算面临的新挑战.针对以上问题,首先从分析现有云虚拟化安全机制出发,指出了云服务不可信带来的数据安全风险及其相应的对策;然后,从虚拟可信根建立、信任链传递、主动监控、可信隔离与安全接入等技术对可信云核心机理进行研究,提出了基于可信计算的云安全框架;最后,总结指出必须从顶层设计出发,提供具备能协同作战、主动免疫、自主可控的可信云架构是未来研究的趋势.In the cloud,trust issue is particularly important due to the high concentration and sharing of resources. Meanwhile trusted computing as a new type of security mechanism, can protect the u se r 's data security,and provide users with a trusted computing environment. Therefore, the combination of the trusted computing and cloud computing technology is the novel idea for the study of cloud security. The traditional trusted computing needs to proceed from the physical trusted root and construct a complete trusted chain in the system, however the user application is running in a virtual computing environment for cloud computing, so the construction of trusted roots and the transmission of trusted chains are the challenges of trusted computing in cloud environments. In view of the above challenges, firstly, by analyzing existing mechanisms of cloud virtualization security, this paper point out the data security risks from untrusted cloud services and corresponding countermeasures. Then propose cloud security framework based on trusted computing from the research of construction of virtual trusted roots , the trust chain transmission,active monitoring,reliable isolation,and secure access for trusted cloud mechanism. At last, it is pointed out that it is necessary to start from the top to design a trusted cloud architecture that must possess the characteristics of cooperative engagement? active immunity and autonomy control for future research.
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.112