期刊文献+

电信云虚拟基础设施安全风险分析与安全策略研究

Telecom Cloud Virtual Infrastructure:Security Risk Analysis and Security Strategy Research
在线阅读 下载PDF
导出
摘要 电信云作为资源池,可分配不同的资源给用户使用。目前,提供防止外部攻击的技术措施保护资源和数据的安全,提供合适的数据保护策略防止用户数据泄露,这些都是电信云平台需要解决的网络信息安全挑战。本文分析了电信云虚拟基础设施业务面及管理面信息网络的安全风险,并从虚拟化网络、虚拟化存储、虚拟化计算、Guest OS、Host OS等维度全方位提出了电信云基础设施系统化信息安全的解决方案,从而为构建动态、主动、全网协同与智能运维的电信云平台纵深安全防护体系提供了技术支撑。 Telecom cloud,serving as a resource pool,allocates different resources to users.Providing technical measures to prevent external attacks to protect the security of resources and data and providing appropriate data protection strategies to prevent user data leakage,these are all network information security challenges that the telecom cloud platform needs to solve.This paper analyzes the telecom cloud virtual infrastructure business and management information network security risk,from the virtualization network,virtualization storage,virtualization computing,Guest OS,Host OS dimension put forward the telecom cloud infrastructure systematic information security solutions.This approach supports the construction of a dynamic,active,network-wide collaborative,and intelligently operated telecom cloud platform with an in-depth security protection system.
出处 《自动化博览》 2023年第12期50-53,共4页 Automation Panorama1
关键词 电信云 Guest OS Cloud OS Host OS 安全风险 安全策略 Telecom Cloud Guest OS Cloud OS Host OS Security Risks Security Strategy
  • 相关文献

参考文献7

二级参考文献44

  • 1孙坦,黄国彬.基于云服务的图书馆建设与服务策略[J].图书馆建设,2009(9):1-6. 被引量:155
  • 2Mell P, Grance T. The NIST Definition of Cloud Compu- ting. National Institute of Standards and Technology, [C]Information Technology Laboratory, 2009.
  • 3Cloud Security Alliance. Security Guidance for Critical Areas of Focus in Cloud Computing V3.0. [C]The Cloud Security Appliance, 2011.
  • 4FORUM J. Cloud cube model: selecting cloud formations for secure collaboration[EB/OL], http://www.opengroup.org/jericho/cloud_cube_model_vl .0.pdf2012,1,11.
  • 5Elangop S, Dusseauaetal A. Deploying virtual machines as sandboxes for the grid. USENIX Association Proceed- ings of the 2nd Workshop on Real, [C]Large Distributed Systems. San Francisco, USA, 2005: 7-12.
  • 6Raj H, Nathuji R, Singh A, England P. Resource man agement for isolation enhanced cloud services. Proceed] ings of the 2009 ACM Workshop on Cloud Computin Security. New York, USA, 2009: 77-84. |.
  • 7Gong L, Qian XL. Computational issues in secure inte- roperation. [J]IEEE Transactions on Software and Engi- neering, 1996, 22(1): 43-52.
  • 8Bonatti P, Vimercati SC, Samarati P. An algebra for composing access control policies. [J]ACM Transactions on Information and System Security, 2002, 5(1): 1-35.
  • 9Wijesekera D, Jajodia S. A propositional policy algebra for access control. [J]ACM Transactions on Informationand System Security, 2003,6(2):286-325.
  • 10Agarwal S, Sprick B. Access control for semantic Web services. [C]Proceedings of the IEEE International Con- ference on Web Services. San Diego, USA, 2004: 770-773.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部