透過您的圖書館登入
IP:3.133.129.9
  • 期刊

Cloud Computing‐based Security Architecture Design

摘要


In order to improve data security protection, this paper introduces the key security technologies of cloud computing based on the introduction of cloud computing technology, and proposes a security architecture design based on cloud computing. The network design of the entire data center is divided into two parts: the back‐end is Using cloud computing related technologies and supporting multi‐architecture integration of business resource network, network, computing and storage resources are built into a virtual resource pool; the front end is based on the traditional Server Farm modular data center structure. Corresponding security technical protection measures are proposed, including functions such as resource domain classification, boundary security protection, cloud security matrix platform, information data security protection, and terminal security protection.

參考文獻


Hao, Lei, Tao, et al. Monitoring Travel Time Reliability from the Cloud: Cloud Computing–Based Architecture for Advanced Dissemination of Traffic Information[J]. Transportation Research Record, 2018, 2291(1):35-43.
Shaikh R , Sasikumar M . Trust Model for Measuring Security Strength of Cloud Computing Service[J]. Procedia Computer Science, 2015, 45:380-389.
Hao, Lei, Tao, et al. Monitoring Travel Time Reliability from the Cloud: Cloud Computing–Based Architecture for Advanced Dissemination of Traffic Information[J]. Transportation Research Record, 2018.
Zhu D . Architecture and security protection scheme for distributed new energy public service platform with hybrid cloud system[J]. 2017,13(2017-11-3), 2017, 2017(13).
Mishra P , Varadharajan V , Pilli E , et al. VMGuard: A VMI-based Security Architecture for Intrusion Detection in Cloud Environment[J]. IEEE Transactions on Cloud Computing, 2018:1-1.

延伸閱讀