[1]何颖,徐军,侯雅婷. 云计算中的信任机制研究[J].计算机技术与发展,2017,27(10):101-105.
 HE Ying,XU Jun,HOU Ya-ting. Research on Trust Mechanism in Cloud Computing[J].,2017,27(10):101-105.
点击复制

 云计算中的信任机制研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
27
期数:
2017年10期
页码:
101-105
栏目:
安全与防范
出版日期:
2017-10-10

文章信息/Info

Title:
 Research on Trust Mechanism in Cloud Computing
文章编号:
1673-629X(2017)10-0101-05
作者:
 何颖徐军侯雅婷
 南京航空航天大学 计算机科学与技术学院
Author(s):
 HE YingXU JunHOU Ya-ting
关键词:
 云计算云计算安全信任机制声望
Keywords:
 cloud computingcloud computing securittrust mechanismreputation
分类号:
TP309
文献标志码:
A
摘要:
 云计算作为继网格计算、对等计算以及服务计算之后的一种新型计算模式,其异构、虚拟、松散等特性导致了有别于传统计算模式的新的安全问题.为此,从云计算的特点出发,综合回顾并分析了云计算作为新型计算模式所引发的比传统分布式计算更加复杂的安全问题.从边界访问控制、租户间信任、服务质量、虚拟化安全等方面讨论了信任机制与云计算安全的关系,并就如何对云计算环境中的信任进行有效评估问题进行了讨论分析.结合云计算环境下的安全需求,讨论分析了将信任机制引入到云计算环境中的理论依据和可行性,深入剖析了信任机制在云计算背景中不同技术层面的应用.针对当前云计算研究工作中的不足,提出了云计算环境中关于信任机制研究的下一步方向.
Abstract:
 Cloud computing has been considered as a new type of computation model after grid computing,peer-to-peer computing and service computing,and its heterogeneous,virtual and loose characteristics leads to new security problems different from the traditional computing model. Therefore,starting from the characteristics of cloud computing,the more complex security problems in contrast with the traditional distribution computing caused by cloud computing as a new type of computation model are synthetically reviewed and ana-lyzed. The relationship between trust mechanism and security of cloud computing is discussed involving border access control,trust among tenants,service quality and virtualization security etc as well as that of effective evaluation on the trust mechanism in the environment of cloud computation. According to the security requirements of cloud computing environment,the theoretical basis and feasibility for intro-duction of confidence mechanism into cloud computing environment is discussed and analyzed and the applications of trust mechanism in various technical layers in the context of cloud computing is analyzed in depth. In allusion to deficiencies in the present investigations on cloud computing,the research orientation of trust mechanism in environment of cloud computing is also proposed.

相似文献/References:

[1]王茜,朱志祥,史晨昱,等.应用于数据库安全保护的加解密引擎系统[J].计算机技术与发展,2014,24(01):143.
 WANG Qian[],ZHU Zhi-xiang[],SHI Chen-yu[],et al.Encryption and Decryption Engine System Applying to Database Security and Detection[J].,2014,24(10):143.
[2]陈丹伟 黄秀丽 任勋益.云计算及安全分析[J].计算机技术与发展,2010,(02):99.
 CHEN Dan-wei,HUANG Xiu-li,REN Xun-yi.Analysis of Cloud Computing and Cloud Security[J].,2010,(10):99.
[3]孙放 陈云芳 林杭锋.适用于富客户端的云计算模型[J].计算机技术与发展,2010,(08):96.
 SUN Fang,CHEN Yun-fang,LIN Hang-feng.Cloud Computing Model Applicable to Rich Client Applications[J].,2010,(10):96.
[4]郭苑 张顺颐 孙雁飞.物联网关键技术及有待解决的问题研究[J].计算机技术与发展,2010,(11):180.
 GUO Yuan,ZHANG Shun-yi,SUN Yan-fei.Research of Key Technologies and Unresolved Questions of Internet of Things[J].,2010,(10):180.
[5]李玲娟 张敏.云计算环境下关联规则挖掘算法的研究[J].计算机技术与发展,2011,(02):43.
 LI Ling-juan,ZHANG Min.Research on Algorithms of Mining Association Rule under Cloud Computing Environment[J].,2011,(10):43.
[6]王德政 申山宏 周宁宁.云计算环境下的数据存储[J].计算机技术与发展,2011,(04):81.
 WANG De-zheng,SHEN Shan-hong,ZHOU Ning-ning.Data Storage in Cloud Computing Environment[J].,2011,(10):81.
[7]宋丽华 姜家轩 张建成 田长录 马文征.黄河三角洲云计算平台关键技术的研究[J].计算机技术与发展,2011,(06):40.
 SONG Li-hua,JIANG Jia-xuan,ZHANG Jian-cheng,et al.Research of Key Technologies of Cloud Computing of Yellow River Delta[J].,2011,(10):40.
[8]田宏伟 解福 倪俊敏.云计算环境下基于粒子群算法的资源分配策略[J].计算机技术与发展,2011,(12):22.
 TIAN Hong-wei,XIE Fu,NI Jun-min.Resource Allocation Algorithm Based on Particle Swarm Algorithm in Cloud Computing Environment[J].,2011,(10):22.
[9]张慧 邢培振.云计算环境下信息安全分析[J].计算机技术与发展,2011,(12):164.
 ZHANG Hui,XING Pei-zhen.Information Security Analysis in Cloud Computing Environment[J].,2011,(10):164.
[10]张建成[] 宋丽华[] 鹿全礼[] 郭锐[] 刘永泉[].云计算方案分析研究[J].计算机技术与发展,2012,(01):165.
 ZHANG Jian-cheng,SONG Li-hua,LU Quan-li,et al.Study and Analysis of Cloud Computing Procedure[J].,2012,(10):165.
[11]王雷,陈彦先,袁哲,等. 面向预拌混凝土行业的云计算[J].计算机技术与发展,2014,24(08):14.
 WANG Lei,CHEN Yan-xian,YUAN Zhe JI Xu. Research on Cloud Computing for Ready-mixed Concrete Industry[J].,2014,24(10):14.
[12]殷小龙,李君,万明祥. 云环境下基于改进NSGA II的虚拟机调度算法[J].计算机技术与发展,2014,24(08):71.
 YIN Xiao-long,LI Jun,WAN Ming-xiang. Virtual Machines Scheduling Algorithm Based on Improved NSGA II in Cloud Environment[J].,2014,24(10):71.
[13]张也弛,周文钦,石润华. 一种面向云的大数据完整性检测协议[J].计算机技术与发展,2014,24(09):68.
 ZHANG Ye-chi,ZHOU Wen-qin,SHI Run-hua. A Big Data Integrity Checking Protocol for Cloud[J].,2014,24(10):68.
[14]徐源吾[][],王珣[][]. 基于Hadoop的智能家居信息处理平台[J].计算机技术与发展,2014,24(09):183.
 XU Yuan-wu[] [],WANG Xun[][]. nformation Processing Platform of Smart Home Based on Hadoop[J].,2014,24(10):183.
[15]谢福伟,梁昌勇,马银超. 基于云计算的景区数据仓库应用研究[J].计算机技术与发展,2014,24(09):198.
 XIE Fu-wei,LIANG Chang-yong,MA Yin-chao. Research on Data Warehouse Application of Tourist Areas Data Based on Cloud Computing[J].,2014,24(10):198.
[16]孙滔,王杉,邢军. 文献共享系统和数据共享系统的云计算平台建设[J].计算机技术与发展,2014,24(09):206.
 SUN Tao,WANG Shan,XING Jun. Construction of Cloud Computing Platform of Sci-tech Literature Sharing System and Data Sharing System[J].,2014,24(10):206.
[17]周文琼[],王乐球[],郑述招[]. 云环境下的数据库扩展策略的设计[J].计算机技术与发展,2014,24(09):213.
 ZHOU Wen-qiong[],WANG Le-qiu[],ZHENG Shu-zhao[]. Design of Database Expansion Strategy under Cloud Computing[J].,2014,24(10):213.
[18]申侃,梁昌勇,赵树平. 基于云的MIS开放式体系结构[J].计算机技术与发展,2014,24(10):21.
 SHEN Kan,LIANG Chang-yong,ZHAO Shu-ping. Open Architecture of MIS Based on Cloud[J].,2014,24(10):21.
[19]王霞俊. 云环境下一种基于能耗感知的虚拟机部署算法[J].计算机技术与发展,2014,24(10):88.
 WANG Xia-jun. A Virtual Machine Allocation Algorithm Based on Power-aware in Cloud Computing[J].,2014,24(10):88.
[20]孟蒙,茅苏. 基于云计算的可反馈负载均衡策略的研究[J].计算机技术与发展,2014,24(10):135.
 MENG Meng,MAO Su. Study on Feedback Load Balancing Strategy Based on Cloud Computing[J].,2014,24(10):135.

更新日期/Last Update: 2017-11-23