检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:WU Chunming LIU Qianjun LI Yuwei CHENG Qiumei ZHOU Haifeng
机构地区:[1]College of Computer Science and Technology,Zhejiang University, Hangzhou 310058, China
出 处:《ZTE Communications》2017年第2期42-47,共6页中兴通讯技术(英文版)
基 金:supported by the National Key Research and Development Program of China under Grant 2016YFB0800102;the National High Technology Research Program of China under Grant 2015AA016103;the Fundamental Research Funds for the Central Universities;the ZTE Industry-Academia-Research Cooperation Funds
摘 要:Cloud computing system packages infrastructures,applications and other resources as services,and delivers the services to market in an elastic and fast way.The significant advantages of cloud computing,e.g.,scalability,elasticity,and pay-per-use,bring it considerable commercial values.Nevertheless,owing to the new application scenario,e.g.,multi-tenant,cloud computing is encountering potential security risks.This paper reviews the state-of-art research in cloud security.According to the attack levels,it analyzes four kinds of attacks in the cloud,i.e.,network-based attacks,VM-based attacks,storage-based attacks,and application-based attacks.The countermeasures and corresponding techniques are then introduced.Furthermore,this paper also discusses an innovative and promising solution for cloud security by dynamically changing system configuration.Cloud computing system packages infrastructures,applications and other resources as services,and delivers the services to market in an elastic and fast way.The significant advantages of cloud computing,e.g.,scalability,elasticity,and pay-per-use,bring it considerable commercial values.Nevertheless,owing to the new application scenario,e.g.,multi-tenant,cloud computing is encountering potential security risks.This paper reviews the state-of-art research in cloud security.According to the attack levels,it analyzes four kinds of attacks in the cloud,i.e.,network-based attacks,VM-based attacks,storage-based attacks,and application-based attacks.The countermeasures and corresponding techniques are then introduced.Furthermore,this paper also discusses an innovative and promising solution for cloud security by dynamically changing system configuration.
关 键 词:CLOUD COMPUTING SECURITY VIRTUALIZATION STORAGE
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:13.59.144.10