ZTE Communications ›› 2011, Vol. 9 ›› Issue (1): 37-40.

• Special Topic • Previous Articles     Next Articles

An On-Demand Security Mechanism for Cloud-Based Telecommunications Services

Zhaoji Lin, Ping Lu, Shengmei Luo, Feng Gao, and Jianyong Chen   

  1. ZTE Corporation
  • Online:2011-03-25 Published:2011-03-25
  • About author:Zhaoji Lin (lin.zhaoji@zte.com.cn) graduated from Huazhong University of Science and Technology, majoring in Systems Engineering. He is a project manager for service and application security in the Standards Development and Industry Relations department of ZTE Corporation. His research interests include cloud computing and ubiquitous network and identity management. He has published more than 60 contributions and proposals on cloud computing security, identity management, device management, and digital rights management for ITU-T SG17, Open Mobile Alliance (OMA) and China Communications Standards Association (CCSA). He has also been an editor and convenor for several work items in these SDOs.

    Ping Lu (lu.ping@zte.com.cn) graduated from South East University, China majoring in Automatic Control Theory and Application. He is chief executive officer of the Service Institute of ZTE Corporation. For more than a decade, he has steered the Institute towards innovative research and development of value added services, cloud computing, Internet services, ICT services, and home network services.

    Shengmei Luo (luo.shengmei@zte.com.cn) graduated from Harbin Institute of Technology, China, majoring in Communications and Electronic Information. He is a chief engineer and architect at ZTE Corporation. He is also a member of the China Cloud Computing Committee, and heads pre-research into new technologies. He was awarded the second prize of scientific and technological progress, with several invention patents. He has published a number of academic papers in core national communication journals.

    Feng Gao (gao.feng1@zte.com.cn) graduated from Beijing University of Aeronautics & Astronautics, majoring in Computer Science. He is a senior engineer in the Standards Development and Industry Relations department of ZTE Corporation. His research interests include bearer network controlling and network security. He has published more than 10 academic papers.

    Jianyong Chen (chen.jianyong@zte.com.cn) received a Ph.D. degree from City University of Hong Kong in 2003. Currently, he is technical advisor at ZTE Corporation. His research interests include security of cloud computing and identity management. He has published more than 20 contributions and proposals on cloud computing security and identity management for the ITU-T SG17 and China Communications Standards Association (CCSA). He is also the vice-chairman of ITU-T SG17, chairman of ITU-T WP3/SG17 and chairman of fix network security working group in CCSA.

An On-Demand Security Mechanism for Cloud-Based Telecommunications Services

Zhaoji Lin, Ping Lu, Shengmei Luo, Feng Gao, and Jianyong Chen   

  1. ZTE Corporation
  • 作者简介:Zhaoji Lin (lin.zhaoji@zte.com.cn) graduated from Huazhong University of Science and Technology, majoring in Systems Engineering. He is a project manager for service and application security in the Standards Development and Industry Relations department of ZTE Corporation. His research interests include cloud computing and ubiquitous network and identity management. He has published more than 60 contributions and proposals on cloud computing security, identity management, device management, and digital rights management for ITU-T SG17, Open Mobile Alliance (OMA) and China Communications Standards Association (CCSA). He has also been an editor and convenor for several work items in these SDOs.

    Ping Lu (lu.ping@zte.com.cn) graduated from South East University, China majoring in Automatic Control Theory and Application. He is chief executive officer of the Service Institute of ZTE Corporation. For more than a decade, he has steered the Institute towards innovative research and development of value added services, cloud computing, Internet services, ICT services, and home network services.

    Shengmei Luo (luo.shengmei@zte.com.cn) graduated from Harbin Institute of Technology, China, majoring in Communications and Electronic Information. He is a chief engineer and architect at ZTE Corporation. He is also a member of the China Cloud Computing Committee, and heads pre-research into new technologies. He was awarded the second prize of scientific and technological progress, with several invention patents. He has published a number of academic papers in core national communication journals.

    Feng Gao (gao.feng1@zte.com.cn) graduated from Beijing University of Aeronautics & Astronautics, majoring in Computer Science. He is a senior engineer in the Standards Development and Industry Relations department of ZTE Corporation. His research interests include bearer network controlling and network security. He has published more than 10 academic papers.

    Jianyong Chen (chen.jianyong@zte.com.cn) received a Ph.D. degree from City University of Hong Kong in 2003. Currently, he is technical advisor at ZTE Corporation. His research interests include security of cloud computing and identity management. He has published more than 20 contributions and proposals on cloud computing security and identity management for the ITU-T SG17 and China Communications Standards Association (CCSA). He is also the vice-chairman of ITU-T SG17, chairman of ITU-T WP3/SG17 and chairman of fix network security working group in CCSA.

Abstract: As cloud computing gains in popularity, data migrated off premises is exposed to more threats than ever before. This is because data is out of control of the owner while floating in the cloud. Traditional device-centric security systems are not efficient enough and need to be evolved to data-centric protection systems. Cloud telecommunications services require security measures in three domains: data storage, processing, and transmission. Data stored in the cloud requires a mechanism to protect it; data in transit needs to be protected either at the service or transmission level; and data being processed needs to be protected during the processing stage. In this paper, we propose a security model based on a new method of security domain division to provide on-demand, dynamic, and differentiated protection for cloud-based telecommunications services.

Key words: cloud computing, security, on demand

摘要: As cloud computing gains in popularity, data migrated off premises is exposed to more threats than ever before. This is because data is out of control of the owner while floating in the cloud. Traditional device-centric security systems are not efficient enough and need to be evolved to data-centric protection systems. Cloud telecommunications services require security measures in three domains: data storage, processing, and transmission. Data stored in the cloud requires a mechanism to protect it; data in transit needs to be protected either at the service or transmission level; and data being processed needs to be protected during the processing stage. In this paper, we propose a security model based on a new method of security domain division to provide on-demand, dynamic, and differentiated protection for cloud-based telecommunications services.

关键词: cloud computing, security, on demand