首页 | 官方网站   微博 | 高级检索  
     

云计算安全威胁分析
引用本文:李振汕.云计算安全威胁分析[J].通信技术,2012(9):103-105,108.
作者姓名:李振汕
作者单位:广西政法管理干部学院信息工程系,广西 南宁 530023
摘    要:随着云计算技术应用的进一步深入,云安全也成为业界关注的焦点.云安全不仅是广大用户选择云计算服务的首要考虑因素,也是云计算实现健康可持续发展的基础.为了能更好地了解、掌握云计算环境下的安全问题,详细分析了云环境在基础设施、数据、身份及访问管理、安全管理、隐私、审计与合规等方面面临的安全威胁,认为只有云计算服务提供商以及用户双方协力合作,在提供及监测安全功能方面取得一致认同,并重新调整传统的安全模式,才能处理云计算所面临的威胁.

关 键 词:云计算  云安全  威胁

Analysis on Cloud Computing Security Threat
LI Zhen-shan.Analysis on Cloud Computing Security Threat[J].Communications Technology,2012(9):103-105,108.
Authors:LI Zhen-shan
Affiliation:LI Zhen-shan (Information Technology Department, Guangxi Administrative Cadre Institute of Politics and Law Nanning Guangxi 530023, China)
Abstract:With increasing application of cloud computing technology cloud security becomes the focus of the industry. Cloud security is not only a primary consideration of the user in choosing cloud computing services, but also the foundation for healthy and sustainable development of cloud computing. In order to better understand and master the security issues of cloud computing environment, this paper gives a detailed analysis of the security threats faced by cloud environment, including against infrastructure, data, identity and access management, security management, privacy, audit and compliance, etc.. It is believed that only through the joint effort and cooperation of the cloud computing service provider and user, obtaining consensus in providing and monitoring the security functions, and re-adjusting the traditional security model can the threats on cloud computing be effectively handled.
Keywords:cloud computing: cloud security: threat
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号