A Survey on Cloud Security  

A Survey on Cloud Security

在线阅读下载全文

作  者:WU Chunming LIU Qianjun LI Yuwei CHENG Qiumei ZHOU Haifeng 

机构地区:[1]College of Computer Science and Technology,Zhejiang University, Hangzhou 310058, China

出  处:《ZTE Communications》2017年第2期42-47,共6页中兴通讯技术(英文版)

基  金:supported by the National Key Research and Development Program of China under Grant 2016YFB0800102;the National High Technology Research Program of China under Grant 2015AA016103;the Fundamental Research Funds for the Central Universities;the ZTE Industry-Academia-Research Cooperation Funds

摘  要:Cloud computing system packages infrastructures,applications and other resources as services,and delivers the services to market in an elastic and fast way.The significant advantages of cloud computing,e.g.,scalability,elasticity,and pay-per-use,bring it considerable commercial values.Nevertheless,owing to the new application scenario,e.g.,multi-tenant,cloud computing is encountering potential security risks.This paper reviews the state-of-art research in cloud security.According to the attack levels,it analyzes four kinds of attacks in the cloud,i.e.,network-based attacks,VM-based attacks,storage-based attacks,and application-based attacks.The countermeasures and corresponding techniques are then introduced.Furthermore,this paper also discusses an innovative and promising solution for cloud security by dynamically changing system configuration.Cloud computing system packages infrastructures,applications and other resources as services,and delivers the services to market in an elastic and fast way.The significant advantages of cloud computing,e.g.,scalability,elasticity,and pay-per-use,bring it considerable commercial values.Nevertheless,owing to the new application scenario,e.g.,multi-tenant,cloud computing is encountering potential security risks.This paper reviews the state-of-art research in cloud security.According to the attack levels,it analyzes four kinds of attacks in the cloud,i.e.,network-based attacks,VM-based attacks,storage-based attacks,and application-based attacks.The countermeasures and corresponding techniques are then introduced.Furthermore,this paper also discusses an innovative and promising solution for cloud security by dynamically changing system configuration.

关 键 词:CLOUD COMPUTING SECURITY VIRTUALIZATION STORAGE 

分 类 号:TP309[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象