期刊文献+

云计算中的信任机制研究 被引量:3

Research on Trust Mechanism in Cloud Computing
下载PDF
导出
摘要 云计算作为继网格计算、对等计算以及服务计算之后的一种新型计算模式,其异构、虚拟、松散等特性导致了有别于传统计算模式的新的安全问题。为此,从云计算的特点出发,综合回顾并分析了云计算作为新型计算模式所引发的比传统分布式计算更加复杂的安全问题。从边界访问控制、租户间信任、服务质量、虚拟化安全等方面讨论了信任机制与云计算安全的关系,并就如何对云计算环境中的信任进行有效评估问题进行了讨论分析。结合云计算环境下的安全需求,讨论分析了将信任机制引入到云计算环境中的理论依据和可行性,深入剖析了信任机制在云计算背景中不同技术层面的应用。针对当前云计算研究工作中的不足,提出了云计算环境中关于信任机制研究的下一步方向。 Cloud computing has been considered as a new type of computation model after grid computing,peer-to-peer computing and service computing, and its heterogeneous, virtual and loose characteristics leads to new security problems different from the traditional computing model. Therefore, starting from the charactersfics of cloud computing, the more complex security problems in contrast with the traditional distribution computing caused by cloud computing as a new type of computation model are synthetically reviewed and ana- lyzed. The relationship between trust mechanism and security of cloud computing is discussed involving border access control, trust among tenants, service quality and vin'ualization security etc as well as that of effective evaluation on the trust mechanism in the environment of cloud computation, According to the security requirements of cloud computing environment,the theoretical basis and feasibility for intro- duction of confidence mechanism into cloud computing environment is discussed and analyzed and the applications of trust mechanism in various technical layers in the context of cloud computing is analyzed in depth. In allusion to deficiencies in the present investigations on cloud computing,the research orientation of trust mechanism in environment of cloud computing is also proposed.
出处 《计算机技术与发展》 2017年第10期101-105,共5页 Computer Technology and Development
基金 中央高校基本科研业务费(NZ2013306) 南京市医学科技发展一般性课题(YKK1571)
关键词 云计算 云计算安全 信任机制 声望 cloud computing cloud computing security trust mechanism reputation
  • 相关文献

参考文献5

二级参考文献133

  • 1冀铁果,田立勤,胡志兴,孙锦霞.可信网络中一种基于AHP的用户行为评估方法[J].计算机工程与应用,2007,43(19):123-126. 被引量:27
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/. 被引量:1
  • 4Distributed Management Task Force (DMTF) http://www.dmtf.org/home. 被引量:1
  • 5Cloud Security Alliance http://www.cloudsecurityalliance.org. 被引量:1
  • 6Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7. 被引量:1
  • 7Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396. 被引量:1
  • 8Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11]. 被引量:1
  • 9Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf. 被引量:1
  • 10Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009. 被引量:1

共引文献1201

同被引文献12

引证文献3

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部