Font Size: a A A

Specialized Security Evaluation Based On Cloud Computing Services

Posted on:2019-09-13Degree:MasterType:Thesis
Country:ChinaCandidate:H LuoFull Text:PDF
GTID:2568305615951609Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In the new era,various computer-related technologies have been rapidly developed.The service models based on big data,the Internet of Things,and cloud computing and other related technologies have also been rapidly developed.The core concept is "application outsourcing,rental resources,and market services." It has a very important role in the construction of information technology related facilities in China.With the unprecedented development of cloud computing technology,the security issues it has faced have become the biggest obstacle to this new information service model.Its security and credibility have always plagued cloud computing users,which has seriously hindered the popularization and application of cloud computing.Currently,domestic research in cloud computing,cloud storage,and cloud security has just begun.Product technology implementation and solutions are still not mature enough,and cloud computing products also have shortcomings.There are illegal out-of-office address links,hidden fields,and obvious Information security risks such as login,sensitive information disclosure,source code disclosure,weak password,default path,default table name,and illegal modification are allowed.If these risks are used,the system will be severely damaged and not only will the user’s privacy information be disclosed.,And threaten the normal operation of the public system,endangering national security.This article will focus on the key technologies,testing standards,detection methods and other issues of cloud security,build and improve cloud computing business system information security testing environment,form a cloud computing platform /system information security assessment,vulnerability mining,security protection,monitoring and early warning,online monitoring Other technical capabilities.The focus will be on how to improve the comprehensive information security service capabilities of cloud computing services from the perspectives of theoretical analysis of cloud security technologies,cloud service security assessment systems,cloud security protection and management technologies,and cloud security monitoring technologies,and form a relationship with cloud computing security technologies and management.The adaptive security service system is discussed in detail,and further proposals are made on how to develop and improve cloud computing professional security evaluation.
Keywords/Search Tags:information security, cloud computing, safety evaluation, Virtualization
PDF Full Text Request
Related items