通信学报 ›› 2016, Vol. 37 ›› Issue (Z1): 104-110.doi: 10.11959/j.issn.1000-436x.2016255

• 学术论文 • 上一篇    下一篇

基于层次分析—模糊评价的云计算安全评估与对策

杨爱民1,高放2,边敏华3,杨曙磊2   

  1. 1 华北理工大学理学院,河北 唐山 063000
    2 华北理工大学冶金与能源学院,河北 唐山 063000
    3 华北理工大学信息工程学院,河北 唐山 063000
  • 出版日期:2016-10-25 发布日期:2017-01-17
  • 基金资助:
    国家重点研发计划基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目;河北省教育厅科学计划基金资助项目

Ai-min YANG1,Fang GAO2,Min-hua BIAN3,Shu-lei YANG2   

  1. 1 College of Science,North China University of Science and Technology,Tangshan 063000,China
    2 College of Metallurgy and Energy,North China University of Science and Technology,Tangshan 063000,China
    3 College of Information Engineering,North China University of Science and Technology,Tangshan 063000,China
  • Online:2016-10-25 Published:2017-01-17
  • Supported by:
    The National Key Research and Development Program;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Natural Science Foundation of Hebei Education Department

摘要:

随着信息技术的飞速发展,云计算已然成为热门话题。越来越多的企业和个人将计算需求和存储需求交给云端,同时云计算的安全问题也日益凸显。基于此,首先对云计算环境中虚拟化安全、应用安全以及数据安全下的多租户、节点通信、远程存储以及虚拟化这4项关键技术的安全需求进行分析,阐述了云计算安全建设的必然性。然后,依据云计算安全需求和国家基本要求建立基于层次分析法的模糊综合评价模型,对某云服务平台进行安全性评估,得出该服务平台安全级别为“好”。最后,综合云计算环境的安全需求以及模型评价结果,针对云计算环境下的虚拟化安全、应用安全和数据安全这3个方面提出了一定建议,为加强云计算环境安全提供一些参考。

关键词: 安全需求, 层次分析, 模糊综合评价

Abstract:

With the rapid development of information technology,cloud computing has become a hot topic.More and more companies and individuals will be their computing needs and storage needs to be delivered to the cloud,so the security problem of cloud computing can not be ignored.First,the security requirements of the four key technologies,such as multi tenant,node communication,remote storage and virtualization in the cloud computing environment were analyzed,the necessity of the construction of cloud computing security was expounded.Then,according to the security requirements of cloud computing,fuzzy comprehensive evaluation model based on ana-lytic hierarchy process was established,and taking a cloud service platform as an example to evaluate its security,get the security level of the service platform is "good".Finally,according to the security requirements of cloud computing environment and the results of model evaluation,some suggestions in in virtualization security,applica-tion security and data security was put forward,in order to strengthen the cloud computing security,some direction was provided.

Key words: security requirements, analytic hierarchy process, fuzzy comprehensive evaluation

No Suggested Reading articles found!