Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Theory and methodology of research on cloud security

云安全理论与方法研究

  • 127 Accesses

  • 7 Citations

摘要

创新点

  1. 1

    提出可信执行环境构建机制, 通过将传统的动态可信度量根虚拟化, 同时为多个云服务虚拟机构建可信执行环境;

  2. 2

    提出安全回滚机制, 保持云服务安全状态的一致性, 使得云租户不会因为云服务的回滚而导致安全状态丢失;

  3. 3

    提出虚拟机组安全构建机制, 保持云服务安全状态的一致性, 使得云服务提供商不会因为虚拟机的加入、 退出和迁移而丢失对虚拟机安全状态的追踪;

  4. 4

    提出栈数据立即更新机制和栈数据实时更新机制, 通过动态软件升级系统, 保证了服务在更新过程中的可靠性和持续性;

  5. 5

    提出云平台中离线镜像更新机制, 通过镜像离线更新系统, 避免了离线镜像更新所产生的大部分开销。

This is a preview of subscription content, log in to check access.

References

  1. 1

    Tsai W T, Bai X Y, Huang Y. Software-as-a-service (SaaS): perspectives and challenges. Sci China Inf Sci, 2014, 57: 051101

  2. 2

    Dai W Q, Jin H, Zou D Q, et al. TEE: a virtual DRTM based execution environment for secure cloudend computing. Future Gener Comput Syst, 2015; 49: 47–57

  3. 3

    Dai WQ, Paul P T, Jin H, et al. Enhancing data trustworthiness via assured digital signing. IEEE Trans Depend Secure Comput (TDSC), 2012; 9: 838–851

  4. 4

    Shi L, Zou D Q, Jin H. Xen Virtualization Technology (in Chinese). Wuhan: Huazhong University of Science and Technology Press, 2009

  5. 5

    Jin H. The Virtualization of Computing System Principles and Applications (in Chinese). Beijing: Tsinghua University Press, 2008

  6. 6

    Zou D Q, Qiang WZ, Jin H. The Principles and Application of Trusted Computing Technology (in Chinese). Beijing: Science Press, 2011

  7. 7

    Chen G, Jin H, Zou D Q, et al. A framework for practical dynamic software updating. IEEE Trans Parallel Distrib Syst, 2016; 27: 941–950

  8. 8

    Liu K, Zou D Q, Jin H. UaaS: software update as a service for the IaaS cloud. In: Proceedings of IEEE International Conference on Services Computing, Chicago, 2015. 483–490

Download references

Author information

Correspondence to Hai Jin.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Jin, H., Dai, W. & Zou, D. Theory and methodology of research on cloud security. Sci. China Inf. Sci. 59, 050105 (2016). https://doi.org/10.1007/s11432-016-5549-1

Download citation

关键词

  • 云安全
  • 可信执行环境
  • 虚拟机回滚
  • 虚拟机组
  • 软件故障诊断
  • 软件更新