期刊文献+

电信云安全风险分析与安全策略研究

Telecom cloud security risk analysis and security strategy research
在线阅读 下载PDF
导出
摘要 电信云是基于网络功能虚拟化(network functions virtualization,NFV)和软件定义网络(software defined network,SDN)技术构建的云化网络基础设施,包括物理基础设施层、虚拟基础设施层、电信业务设施层,每层包括业务面和管理面。通过网络资源虚拟化打造弹性、高效、按需分配的业务网络。提出了电信云业务分层模型,分析了基础设施业务面及管理面六类主要的安全威胁及表现形式,从部署边界防火墙、部署入侵检测、密码算法协处理器等维度全方位提出了电信云基础设施系统化信息安全解决方案,从而有利于构建动态、主动、全网协同与智能运维的电信云平台纵深安全防护体系。 Telecom cloud is a cloud network infrastructure built based on NFV(Network Functions Virtualization)and SDN(Software Defined Network)technology,including physical infrastructure layer,virtual infrastructure layer and telecom service facility layer,each layer includes business surface and management surface.Create a flexible,efficient and on-demand business network through network resource virtualization.The telecom cloud business layered model,analyzes the infrastructure business and management of six kinds of main security threats and forms,from the deployment border firewall,intrusion detection,password algorithm assistant processor dimension proposed the telecom cloud infrastructure systematic information security solutions,to build dynamic,active,entire network synergy and intelligent operations of telecom cloud platform deep security protection system.
作者 陈舒 肖鸿耀 丁源 宋仕斌 Chen Shu;Xiao Hongyao;Ding Yuan;Song Shibin(China Mobile Internet of Things Co.,Ltd.,Chongqing 401336,China;Sichuan Public Project Consulting and Management Co.,Ltd.,Chengdu 610058,China)
出处 《现代计算机》 2024年第15期69-73,共5页 Modern Computer
关键词 电信云 业务分层模型 DDOS 安全风险 安全策略 telecom cloud business stratification model DDoS security risk security strategy
  • 相关文献

参考文献7

二级参考文献44

  • 1孙坦,黄国彬.基于云服务的图书馆建设与服务策略[J].图书馆建设,2009(9):1-6. 被引量:155
  • 2Mell P, Grance T. The NIST Definition of Cloud Compu- ting. National Institute of Standards and Technology, [C]Information Technology Laboratory, 2009.
  • 3Cloud Security Alliance. Security Guidance for Critical Areas of Focus in Cloud Computing V3.0. [C]The Cloud Security Appliance, 2011.
  • 4FORUM J. Cloud cube model: selecting cloud formations for secure collaboration[EB/OL], http://www.opengroup.org/jericho/cloud_cube_model_vl .0.pdf2012,1,11.
  • 5Elangop S, Dusseauaetal A. Deploying virtual machines as sandboxes for the grid. USENIX Association Proceed- ings of the 2nd Workshop on Real, [C]Large Distributed Systems. San Francisco, USA, 2005: 7-12.
  • 6Raj H, Nathuji R, Singh A, England P. Resource man agement for isolation enhanced cloud services. Proceed] ings of the 2009 ACM Workshop on Cloud Computin Security. New York, USA, 2009: 77-84. |.
  • 7Gong L, Qian XL. Computational issues in secure inte- roperation. [J]IEEE Transactions on Software and Engi- neering, 1996, 22(1): 43-52.
  • 8Bonatti P, Vimercati SC, Samarati P. An algebra for composing access control policies. [J]ACM Transactions on Information and System Security, 2002, 5(1): 1-35.
  • 9Wijesekera D, Jajodia S. A propositional policy algebra for access control. [J]ACM Transactions on Informationand System Security, 2003,6(2):286-325.
  • 10Agarwal S, Sprick B. Access control for semantic Web services. [C]Proceedings of the IEEE International Con- ference on Web Services. San Diego, USA, 2004: 770-773.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部