计算机科学 ›› 2016, Vol. 43 ›› Issue (8): 105-109.doi: 10.11896/j.issn.1002-137X.2016.08.022

• 信息安全 • 上一篇    下一篇

基于DS理论的多源证据融合云安全信任模型

束柬,梁昌勇   

  1. 合肥工业大学管理学院 合肥230009 过程优化与智能决策教育部重点实验室 合肥230009,合肥工业大学管理学院 合肥230009 过程优化与智能决策教育部重点实验室 合肥230009
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金项目(71331002,2),高等学校博士点基金项目(20110111110006)资助

Dynamic Trust Model Based on DS Evidence Theory under Cloud Computing Environment

SHU Jian and LIANG Chang-yong   

  • Online:2018-12-01 Published:2018-12-01

摘要: 云计算技术在带来信息更大范围共享、成本更低等便捷的同时,也面临着隐私泄露、信息丢失等新的安全问题。如何在海量分布式的云系统中识别和管理节点的可信度成为云安全问题研究的重要方向之一。本模型考虑云计算分布式体系架构,结合DS证据理论和信任机制,构建云环境下基于DS理论的信任模型,为云安全问题提供了新思路。该模型在主客观信任值的基础上合成综合信任值,进行可信度判断;并讨论模型中的关键问题,包括信任值初始化和更新、恶意节点惩罚、负载均衡;再通过仿真实验从有效性、均衡性和鲁棒性等方面对模型进行验证;最后进行总结并对下一步研究进行展望。

关键词: 云计算,信息安全,信任机制,DS证据理论

Abstract: Cloud computing technology faces the new security problems of privacy disclosure and information lost.How to identify and manage the trust degree of nodes in cloud system becomes a important research area of cloud security.Then the trust model can provide a new idea to solve it.Considering that the architecture of cloud computing is a distributed system,combining with the DS evidence theory and trust mechanism,a dynamic trust model based on DS theory was built under the cloud environment.In the model, subjective and objective trust values are merged into a integrated trust-value to describe the safety and credibility of the cloud nodes.The problems of trust value initialization and updating,malicious nodes punishment and load balancing were discussed.Simulation experiment proves the effectiveness,balance and robustness of the model.Finally,the summary and the prospects for future research were put forward.

Key words: Cloud computing,Information security,Trust mechanism,DS evidence theory

[1] Lin C,Su W B,Meng K,et al.Cloud Computing Security:Architecture Mechanism and Modeling [J].Chinese Journal of Computer,2013,36(9):1765-1784(in Chinese) 林闯,苏文博,孟坤,等.云计算安全:架构,机制与模型评价[J].计算机学报,2013,36(9):1765-1784
[2] Kirthica S,Sridhar R.Solution for Traversal Vulnerability and an Encryption-Based Security Solution for an Inter-cloud Environment [M]∥Computational Intelligence in Data Mining.Vo-lume 2,Springer India,2015:283-291
[3] Yu Neng-hai,et al.Review of cloud computing security[J].Acta Electronica Sinica,2013,1(2):371-381(in Chinese) 俞能海,等.云安全研究进展综述[J].电子学报,2013,1(2):371-381
[4] Feng Chao-sheng,et al.Key Techniques of Access Control for Cloud Computing[J].Acta Electronica Sinica,2015,43(2):312-319(in Chinese) 冯朝胜,等.云计算环境下访问控制关键技术[J].电子学报,2015,3(2):312-319
[5] Zacharia G,Moukas A,Maes P.Collaborative reputation mechanisms for electronic market places[J].Decision Support Systems,2000,9(4):371-388
[6] Li Xiao-yong,Gui Xiao-lin.Research on Dynamic Trust Model for Large Scale Distributed Environment[J].Journal of Software,2007(6):1510-1521(in Chinese) 李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007(6):1510-1521
[7] Blaze M,et al.Decentralized Trust Management[C]∥Procee-dings of 1996 IEEE Symposium on Security and Privacy.IEEE,1996:164-173
[8] Yang M H,Wang Z P,Yao J J.Research on a new cloud trust model and its defense abilities [J].Manufacturing and Enginee-ring Technology,2014,1(1):399-405
[9] Jaiganesh M,Aarthi M,Kumar A V A.Fuzzy ART-Based User Behavior Trust in Cloud Computing[M]∥Artificial Intelligence and Evolutionary Algorithms in Engineering Systems.Springer India,2015:341-348
[10] Kumar T S,Pandey S.Customization of Recommendation System Using Collaborative Filtering Algorithm on Cloud Using Mahout[M]∥Intelligent Distributed Computing.Springer International Publishing,2015:1-10
[11] Zhu Rui,Wang Huai-min,Feng Da-wei.Trustworthy ServicesSelection Based on Preference Recommendation[J].Journal of Software,2011(5):852-864(in Chinese) 朱锐,王怀民,冯大为.基于偏好推荐的可信服务选择[J].软件学报,2011(5):852-864
[12] Moghaddam M G,Mustapha N.AgeTrust:A New TemporalTrust-Based Collaborative Filtering Approach[C]∥Preceedings of 2014 International Conference on Information Science and Applications(ICISA).2014:1-4
[13] Song Guo-feng,Liang Chang-yong.A cloud security access control model based on user behavior trust[C]∥The 15th China Management Science Academic Essays.2013(in Chinese) 宋国峰,梁昌勇.一种基于用户行为信任的云安全访问控制模型[C]∥第十五届中国管理科学学术年会论文集 (下).2013
[14] Dempster A P.Upper and lower probabilities induced by a multiple valued mapping[J].The Annals of Mathematical Statistics,1967,38(2):325-339
[15] Shafer G.A mathematical theory of evidence[M].Princeton:Princeton University Press,1976
[16] 段新生.证据理论与决策、人工智能[M].北京:中国人民大学出版社,1990:13-35
[17] Sevastianov P,Dymova L,Bartosiewicz P.A framework for rule-base evidential reasoning in the interval setting applied to diagnosing type 2 diabetes[J].Expert Systems with Applications,2012,39(4):4190-4200
[18] Dempster A.Upper and Lower Probabilities Induced by Multivalued Mapping [J].Annalys of Mathematical Statistics,1967,38(2):325-339
[19] Shafer G.A mathematical theory of evidence[M].Princeton:Princeton university press,1976
[20] Zhu Jun-mao,et al.A Grid & P2P trust model based on recommendation evidence reasoning.Journal of Computer Research and Development,2005,42(5):797-803(in Chinese) 朱唆茂,等.Grid与P2P混合计算环境下基于推荐证据推理的信任模型[J].计算机研究与发展,2005,42(5):797-803

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!