首页 | 官方网站   微博 | 高级检索  
     

云计算中密码应用模式初探
引用本文:李凤海,张佰龙. 云计算中密码应用模式初探[J]. 信息网络安全, 2011, 0(9): 53-55. DOI: 10.3969/j.issn.1671-1122.2011.09.017
作者姓名:李凤海  张佰龙
作者单位:信息保障技术重点实验室,北京,100072
摘    要:文章在分析云计算安全风险的基础上,阐述了云计算中的密码应用模式,包括密码应用模式框架和云计算中用户数据的加密方式,重点针对云计算中动态数据的机密性,从可信计算平台、安全虚拟机、密码协处理器和虚拟桌面技术等四方面,讨论了密码应用的新模式。

关 键 词:云计算  密码应用  数据安全

Discussing on Cryptography Application Schema in Cloud Computing
LI Feng-hai,ZHANG Bai-long. Discussing on Cryptography Application Schema in Cloud Computing[J]. Netinfo Security, 2011, 0(9): 53-55. DOI: 10.3969/j.issn.1671-1122.2011.09.017
Authors:LI Feng-hai  ZHANG Bai-long
Affiliation:2 ( Science and Technology on Information Assurance Laboratory, Beijing 100072, China )
Abstract:After analyzing some security risks in cloud computing, this paper discusses the cryptography application schema, mainly on the framework of cryptography application schema and the methods of user data encryption in cloud computing. Then, suggests a new schema of cryptography application which focuses on confidentiality of dynamic data in cloud computing. The schema improves at four aspects: trusted computing platform, secure virtual machine, cryptography co-processor and virtual desktop technology.
Keywords:cloud computing  cryptography application  data security
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号