电信科学 ›› 2010, Vol. 26 ›› Issue (9): 64-69.doi: 10.3969/j.issn.1000-0801.2010.09.015

• 云计算专栏 • 上一篇    下一篇

云计算安全关键技术分析

张云勇,陈清金,潘松柏,魏进武   

  1. 中国联通研究院 北京100048
  • 出版日期:2010-09-15 发布日期:2010-09-15

Key Security Technologies on Cloud Computing

Yunyong Zhang,Qingjin Chen,Songbai Pan,Jinwu Wei   

  1. China Unicom Research Institute,Beijing 100048,China
  • Online:2010-09-15 Published:2010-09-15

摘要:

云计算以一种新兴的共享基础架构的方法,提供“资源池”化的由网络、信息和存储等组成的服务、应用、信息和基础设施等的使用。云计算的按需自服务、宽带接入、虚拟化资源池、快速弹性架构、可测量的服务和多租户等特点,直接影响到了云计算环境的安全威胁和相关的安全保护策略。云计算具备了众多的好处,从规模经济到应用可用性,其绝对能给应用环境带来一些积极的因素。如今,在广大云计算提供商和支持者的推崇下,众多企业用户已开始跃跃欲试。然而,云计算也带来了一些新的安全问题,由于众多用户共享IT基础架构,安全的重要性非同小可。本文分析了云计算特定的安全需求和解决方案以及国内外的研究和产品现状。

关键词: 云计算, 虚拟化, 安全, 可信

Abstract:

Cloud computing is a new method sharing infrastructure which provides the usage of service,application,information and infrastructure composed of “resource pool”computing,network,information and storage.The features of cloud computing directly impact the security threats of its environment and relative security policies,which include the self-service on demand,broadband access,visualization resource pool,quick elastic architecture,measurable services and multi-tenant.Cloud computing could definitely introduce positive effect because it has multiple benefits from scale economy to application availability.Nowadays,more and more enterprise users are ready to be involved in the cloud circle with the support of cloud computing providers and advocates.However,cloud computing also brings some new security issues.The security problem is very important since a large number of users share the IT infrastructure.In this paper,the specific cloud computing security requirement and solution are analyzed.The current status of international and domestic research and products are presented.

Key words: cloud computing, visualization, security, credibility

No Suggested Reading articles found!