On data and virtualization security risks and solutions of cloud computing

被引:2
作者
Luo, Xiangyang [1 ,2 ,3 ]
Yang, Lin [1 ]
Hao, Dai [1 ]
Liu, Fenlin [2 ]
Wang, Daoshun [4 ]
机构
[1] China Institute of Electronic Equipment System Engineering
[2] Zhengzhou Information Science and Technology Institute
[3] State Key Laboratory of Information Security, Institute of Information Engineering Chinese Academy of Sciences
[4] Department of Computer Science and Technology, Tsinghua University, Beijing
基金
中国国家自然科学基金;
关键词
Cloud computing; Countermeasure suggestions; Data security; Virtualization security;
D O I
10.4304/jnw.9.3.571-581
中图分类号
学科分类号
摘要
Data security and virtualization security issues are two key bottlenecks restricting the application of cloud computing promoting and applications, especially for the Cloud-based media computing system. In this paper, states of the art of the techniques on cloud computing data security issues, such as data encryption, access control, integrity authentication and other issues is surveyed, on this basis, the key technical issues of the cloud computing data security should concern about and focus on are indicated, and some corresponding countermeasures and suggestions are presented. For the virtualization security problem introduced by private cloud computing, the security risks induced by virtualization are analyzed and classified, and then based on the divide-conquer idea, for each kind of security risk, some corresponding solutions are presented. © 2014 ACADEMY PUBLISHER.
引用
收藏
页码:571 / 581
页数:10
相关论文
共 42 条
[1]  
Feng D., Zhang M., Zhang Y., Xu Z., Cloud Computing Security Research, Chinese Journal of Software, 22, 1, pp. 71-83, (2011)
[2]  
Above the Clouds: A Berkeley View of Cloud Computing
[3]  
Yao J., The Future Needs Cloud Computing, Development and Application of High Performance Computing, 26, 1, pp. 7-9, (2009)
[4]  
Sumter L., Cloud Computing: Security Risk, Proceedings of ACM Southeast Conference, pp. 1-4, (2010)
[5]  
Wang W., Li Z., Owens R., Bhargava B., Secure and Efficient Access to Outsourced Data, Proceedings of ACM Cloud Computing Security Workshop, pp. 55-65, (2009)
[6]  
Zeng W., Zhao Y., Ou K., Song W., Research on Cloud Storage Architecture and Key Technologies, Proceedings of ACM International Conference on Information System, pp. 1044-1048, (2009)
[7]  
Takabi H., James B.D., Gail-Joon A., Security and Privacy Challenges in Cloud Computing Environments, IEEE Security & Privacy, 10, 6, pp. 24-31, (2010)
[8]  
Pearson S., Benameur A., Privacy, Security and Trust Issues Arising from Cloud Computing, Proceedings of IEEE International Conference on Cloud Computing Technology and Science, pp. 693-702, (2010)
[9]  
Liu Q., Weng C., Li M., Luo Y., An In-VM Measuring Framework for Increasing Virtual Machine Security in Clouds, IEEE Security & Privacy, 10, 6, pp. 56-62, (2010)
[10]  
IBM Research