• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
高级检索

弹性移动云计算的研究进展与安全性分析

李鹏伟, 傅建明, 李拴保, 吕少卿, 沙乐天

李鹏伟, 傅建明, 李拴保, 吕少卿, 沙乐天. 弹性移动云计算的研究进展与安全性分析[J]. 计算机研究与发展, 2015, 52(6): 1362-1377. DOI: 10.7544/issn1000-1239.2015.20140227
引用本文: 李鹏伟, 傅建明, 李拴保, 吕少卿, 沙乐天. 弹性移动云计算的研究进展与安全性分析[J]. 计算机研究与发展, 2015, 52(6): 1362-1377. DOI: 10.7544/issn1000-1239.2015.20140227
Li Pengwei, Fu Jianming, Li Shuanbao, Lü Shaoqing, Sha Letian. Elastic Mobile Cloud Computing:State of the Art and Security Analysis[J]. Journal of Computer Research and Development, 2015, 52(6): 1362-1377. DOI: 10.7544/issn1000-1239.2015.20140227
Citation: Li Pengwei, Fu Jianming, Li Shuanbao, Lü Shaoqing, Sha Letian. Elastic Mobile Cloud Computing:State of the Art and Security Analysis[J]. Journal of Computer Research and Development, 2015, 52(6): 1362-1377. DOI: 10.7544/issn1000-1239.2015.20140227
李鹏伟, 傅建明, 李拴保, 吕少卿, 沙乐天. 弹性移动云计算的研究进展与安全性分析[J]. 计算机研究与发展, 2015, 52(6): 1362-1377. CSTR: 32373.14.issn1000-1239.2015.20140227
引用本文: 李鹏伟, 傅建明, 李拴保, 吕少卿, 沙乐天. 弹性移动云计算的研究进展与安全性分析[J]. 计算机研究与发展, 2015, 52(6): 1362-1377. CSTR: 32373.14.issn1000-1239.2015.20140227
Li Pengwei, Fu Jianming, Li Shuanbao, Lü Shaoqing, Sha Letian. Elastic Mobile Cloud Computing:State of the Art and Security Analysis[J]. Journal of Computer Research and Development, 2015, 52(6): 1362-1377. CSTR: 32373.14.issn1000-1239.2015.20140227
Citation: Li Pengwei, Fu Jianming, Li Shuanbao, Lü Shaoqing, Sha Letian. Elastic Mobile Cloud Computing:State of the Art and Security Analysis[J]. Journal of Computer Research and Development, 2015, 52(6): 1362-1377. CSTR: 32373.14.issn1000-1239.2015.20140227

弹性移动云计算的研究进展与安全性分析

基金项目: 国家自然科学基金项目(61373168,61202387);高等学校博士学科点专项科研基金项目(20120141110002)
详细信息
  • 中图分类号: TP393

Elastic Mobile Cloud Computing:State of the Art and Security Analysis

  • 摘要: 弹性移动云计算(elastic mobile cloud computing, EMCC)中,移动设备按照实时需求将部分任务迁移到云端执行,无缝透明的利用云资源增强自身功能.将现有EMCC方案分为雇佣云端完成部分计算密集任务的计算迁移型移动云计算(computing migration-mobile cloud computing, CM-MCC)和通过云端的虚拟移动设备来辅助或代替移动设备完成多种任务的云端代理型移动云计算(cloud agent-mobile cloud computing, CA-MCC)两类,分别对CM-MCC,CA-MCC的适用场景、实现流程、关键技术、存在问题及相应解决方法进行研究并指出其发展方向.对EMCC所面临的主要安全威胁,包括用户的错误操作或恶意行为、恶意代码、通信安全以及虚拟系统漏洞、多租户、不安全资源等云安全问题进行分析并研究相应防御方法,指出安全问题将是EMCC研究的重点和难点.
    Abstract: Elastic mobile cloud computing (EMCC) enables the seamless and transparent use of cloud resource to augment the capability of mobile devices by off-loading parts of mobile devices’ tasks to cloud according to the real-time user requirement. By summarizing the service providing models of EMCC, we divide existing EMCC models into two categories: computing migration-mobile cloud computing(CM-MCC), in which the mobile devices employ the cloud to perform the parts of their computing intensive tasks; and cloud agent-mobile cloud computing(CA-MCC), in which the cloud maintains one or more virtual mobile devices for each mobile device and these virtual mobile devices are synchronized with the mobile device to complete various tasks such as computing, storage, security and communication instead of the mobile device. Then the applicable scenarios, the implementation method, the key issues, and the future research of EMCC models in each category are studied. After that, we analyze the critical security threats of EMCC, including users’ error operations or malicious actions, malicious applications, communications security problems, and cloud computing security issues such as the vulnerabilities of virtual system, multi-tenant problems, malicious cloud service providers. The corresponding defenses of these threats are discussed. At last, we point out that security is a key issue for EMCC.
  • 期刊类型引用(10)

    1. 杨秀璋,彭国军,刘思德,田杨,李晨光,傅建明. 面向APT攻击的溯源和推理研究综述. 软件学报. 2025(01): 203-252 . 百度学术
    2. 申国霞,常鑫. 基于可信密码模块的网络信道潜在攻击挖掘. 信息技术. 2023(10): 152-156+162 . 百度学术
    3. 谢峥,路广平,付安民. 一种可扩展的实时多步攻击场景重构方法. 信息安全研究. 2023(12): 1173-1179 . 百度学术
    4. 黄维贵,孙怡峰,欧旺,王玉宾. 基于不确定攻击图的违规外联风险分析. 信息工程大学学报. 2022(05): 570-577 . 百度学术
    5. 王文娟,杜学绘,单棣斌. 基于动态概率攻击图的云环境攻击场景构建方法. 通信学报. 2021(01): 1-17 . 百度学术
    6. 潘亚峰,朱俊虎,周天阳. APT攻击场景重构方法综述. 信息工程大学学报. 2021(01): 55-60+80 . 百度学术
    7. 罗智勇,杨旭,刘嘉辉,许瑞. 基于贝叶斯攻击图的网络入侵意图分析模型. 通信学报. 2020(09): 160-169 . 百度学术
    8. 王硕,王建华,汤光明,裴庆祺,张玉臣,刘小虎. 一种智能高效的最优渗透路径生成方法. 计算机研究与发展. 2019(05): 929-941 . 本站查看
    9. 吴东,郭春,申国伟. 一种基于多因素的告警关联方法. 计算机与现代化. 2019(06): 30-37 . 百度学术
    10. 韩宜轩,秦元庆. 基于因果关联的电力工控系统攻击场景还原. 信息技术. 2019(08): 41-44+48 . 百度学术

    其他类型引用(12)

计量
  • 文章访问数:  1438
  • HTML全文浏览量:  0
  • PDF下载量:  770
  • 被引次数: 22
出版历程
  • 发布日期:  2015-05-31

目录

    /

    返回文章
    返回