通信学报 ›› 2019, Vol. 40 ›› Issue (2): 154-163.doi: 10.11959/j.issn.1000-436x.2019035

• 综述 • 上一篇    下一篇

可信云平台技术综述

何欣枫1,2,3,田俊峰1,2,3,刘凡鸣2,3   

  1. 1 河北大学管理学院,河北 保定 071002
    2 河北大学网络空间安全与计算机学院,河北 保定 071002
    3 河北省高可信信息系统重点实验室,河北 保定 071002
  • 修回日期:2019-01-29 出版日期:2019-02-01 发布日期:2019-03-04
  • 作者简介:何欣枫(1976- ),男,天津人,河北大学博士生,主要研究方向为云计算安全、可信计算等。|田俊峰(1965- ),男,河北保定人,博士,河北大学教授、博士生导师,主要研究方向为信息安全、分布式计算等。|刘凡鸣(1990- ),女,河北保定人,河北大学实验师,主要研究方向为大数据处理、云计算安全等。
  • 基金资助:
    河北省自然科学基金资助项目(F2016201064);河北省自然科学基金重点资助项目(F2016201244);河北省高等学校科学技术研究基金资助项目(ZD2015088)

Survey on trusted cloud platform technology

Xinfeng HE1,2,3,Junfeng TIAN1,2,3,Fanming LIU2,3   

  1. 1 School of Management,Hebei University,Baoding 071002,China
    2 School of Cyber Security and Computer,Hebei University,Baoding 071002,China
    3 Key Lab on High Trusted Information System of Hebei Province,Baoding 071002,China
  • Revised:2019-01-29 Online:2019-02-01 Published:2019-03-04
  • Supported by:
    The Natural Science Foundation of Hebei Province(F2016201064);The Natural Science Foundation of Hebei Province - Key Program(F2016201244);The Natural Science Foundation of Hebei Institution(ZD2015088)

摘要:

云计算安全需求使信息安全技术面临更严峻的挑战,云平台自身的可信性是保证云计算安全的基础,提高用户对云平台的信任度是云计算技术向更深层次领域发展、全面普及和应用的关键。可信云计算技术是解决上述问题的一个有效手段。从保障云计算平台可信的角度出发,通过介绍可信虚拟化、可信云平台构建及可信虚拟机等相关技术的研究进展,分析并对比了典型方案的特点、适用范围及其在可信云计算领域的不同效用,讨论已有工作的局限性,进而指出未来发展趋势和后续研究方向。

关键词: 云计算, 可信计算, 可信虚拟化, 可信云平台, 可信虚拟机

Abstract:

Information security technology confronts severe challenges because of the safety demands of cloud computing.The trustworthiness and self-safety of cloud computing platform are the foundation of cloud computing security.The confidence of cloud users is the key issue the deep development and popularization for cloud computing.The trusted cloud computing technology provides a feasible solution.From the standpoint of guaranteeing the trustworthiness of cloud computing platform,related research progresses on trusted virtualization,construction of trusted cloud platform and trusted virtual machine were introduced.Additionally,the characteristics,application scopes and effectiveness of typical schemes were analyzed and compared.Finally,current limitations and possible directions for future research were discussed.

Key words: cloud computing, trusted computing, trusted virtualization, trusted cloud platform, trusted virtual machine

中图分类号: 

No Suggested Reading articles found!