- 1、本文档共24页,可阅读全部内容。
- 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
云计算中存在的安全问题.ppt
* When the underlying components fail in the cloud, the effect of the failures to the mission logic needs to be known so that correct recovery measures can be performed. We propose an application-specific run-time monitoring and management tool. With this tool, the application logic can remain on the consumer’s host computer. This allows the consumer to centrally monitor all aspects of the application as well as data flow. Since all outputs from underlying services are sent to the application logic, any data incompatibility between services is not an issue. The capabilities of the run-time monitoring and management tool are as follows: 1) Enable application user to determine the status of the cloud resources that may be used to run the application (across multiple clouds), 2)??Enable application user to determine the real-time security posture and situational awareness of the application, 3) Provide the application user with the ability to move user’s application (or part of it) to another site (other VM in same cloud or different cloud altogether), 4) Provide the application user with the ability to change the application logic on the fly, 5) Provide communicate capabilities with cloud providers. There are a few cloud vendors such as NimSoft [41] and Hyperic [42] that provide application-specific monitoring tools that provide some of the above functionality. These monitoring tools may be further enhanced or used in conjunction with other tools to provide the degree of monitoring required. However, any tool that is to be used for military purposes must also receive some type of accreditation and certification procedure. * Differering data semantics example: does a data item labeld secret in one cloud have the same semantics as another piece of data also labeled secret in a different cliud? * In cloud computing (as well as other systems), there are many possible layers of access control. For example, access to the cloud, access to servers, access to services, access
您可能关注的文档
最近下载
- 六年级数学上册期末复习计划.docx VIP
- 测量测绘重点难点分析.docx
- 2024年中考道德与法治复习:解题方法 课件53张.pptx
- 全国国家版图知识竞赛题库及答案(中小学组).doc VIP
- 《电子政务外网安全监测平台技术规范》.docx VIP
- 中小学必背飞花令诗词-(春、月、风、花、山、江、人、日、动物、颜色、数字).doc VIP
- DELTA台达-UPS不间断电源系统HPH 系列 20-30-40 kW UPS用户使用手册-操作说明书.pdf
- 2024年商丘永城市污水处理运营有限公司招才引智引进专业技术人员12名笔试模拟试题及答案解析.docx
- 国家开放大学22228《物业信息管理》期末考试复习资料汇编.docx
- DCS系统巡检与维护和故障处理及应急预案.docx VIP
文档评论(0)