计算机科学 ›› 2014, Vol. 41 ›› Issue (Z6): 363-365.

• 信息安全 • 上一篇    下一篇

多租户环境下基于可信第三方的云安全模型研究

王佩雪,周华强   

  1. 中原工学院计算机学院 郑州450007;中原工学院理学院 郑州450007
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受河南省 软科学(122400450154)资助

Research on Cloud Security Model Based on Trusted Third Party on Multi-tenant Environment

WANG Pei-xue and ZHOU Hua-qiang   

  • Online:2018-11-14 Published:2018-11-14

摘要: 针对云计算中多租户环境特点,将可信第三方引入云计算的安全解决方案中,提出了一种新型的基于可信第三方的云安全模型。在该模型基础上,讨论了认证协议,并设计了基于TTP的多租户资源分配算法。采用CloudSim模拟工具进行仿真实验和性能比较分析,将短任务先行策略、先来先服务策略与本策略在资源成功执行率方面进行比较。实验结果表明,该模型能将可信度最高的云节点资源提供给云用户,有效构建了实体之间的信任网,可验证数据的正确性和数据交换的正确性,提供了多层次、分布式环境下端对端的安全服务。

关键词: 云计算,多租户,可信第三方,云安全 中图法分类号TP393文献标识码A

Abstract: Aiming at multi-tenant environments for cloud computing,introducing the trusted third party is into cloud security solutions,this paper proposed a new cloud security model based on trusted third party.Then we designed the authentication protocol and a multi-tenant resource allocation algorithm based on TTP.Finally,the CloudSim simulation tools were used for simulation and performance analysis,and Short Jobs First strategy,First-come First-served policy were compared with TTP strategy in successful implementation rate of resources.The experimental results show that the model provides the highest credibility cloud node resources to cloud users,builds a trust web between entities effectively,verifies the correctness of the data and the correctness of the data exchange,and provides a multi-level,end-to-end security services in the distributed environment.

Key words: Cloud computing,Multi-tenant,Trusted third party,Cloud security

[1] 刘鹏.网格计算与云计算(PPT)[EB/OL].http://www.chinacloud.cn/download/PPT/GridCloudComputing.ppt
[2] Buyya R,Abramson D,Giddy J,et al.Economic models for resource management and scheduling in grid computing [J].Concurrency & Computation,2002,14(13-15):1507-1542
[3] 高宏卿,邢颖.基于经济学的云资源管理模型研究[J].计算机工程与设计,2010,1(10):4139-4142
[4] Geimer M,Shende S,Malony A D,et al.A generic and configurable source-code instrumentation component[C]∥Allen G, Nabrzyski J,Seidel E,et al.,eds.ICCS (2),Vol.5545of Lecture Notes in Computer Science.Springer,2009:696-705
[5] International Telecommunication Union.X-509|ISO/IEC 9594-8,The directory:Public-key and attribute certificate frameworks[S].ITU,X-Series,2001
[6] 卿斯汉.电子商务协议中的可信第三方角色[J].软件学报,2003,4(11):1936-1943
[7] Lekkas D,Gritzalis S,Katsikas S.Quality assured trusted third parties for Deploying secure Internet-based health care applications[J].International Journal of Medical Informatics,2002,65(2):79-96
[8] 陈冬娥,杨扬,刘丽.基于效用最优的网格计算资源调度算法[J].计算机工程与应用,2006,2(2):191-193

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!