计算机科学 ›› 2016, Vol. 43 ›› Issue (8): 105-109.doi: 10.11896/j.issn.1002-137X.2016.08.022
束柬,梁昌勇
SHU Jian and LIANG Chang-yong
摘要: 云计算技术在带来信息更大范围共享、成本更低等便捷的同时,也面临着隐私泄露、信息丢失等新的安全问题。如何在海量分布式的云系统中识别和管理节点的可信度成为云安全问题研究的重要方向之一。本模型考虑云计算分布式体系架构,结合DS证据理论和信任机制,构建云环境下基于DS理论的信任模型,为云安全问题提供了新思路。该模型在主客观信任值的基础上合成综合信任值,进行可信度判断;并讨论模型中的关键问题,包括信任值初始化和更新、恶意节点惩罚、负载均衡;再通过仿真实验从有效性、均衡性和鲁棒性等方面对模型进行验证;最后进行总结并对下一步研究进行展望。
[1] Lin C,Su W B,Meng K,et al.Cloud Computing Security:Architecture Mechanism and Modeling [J].Chinese Journal of Computer,2013,36(9):1765-1784(in Chinese) 林闯,苏文博,孟坤,等.云计算安全:架构,机制与模型评价[J].计算机学报,2013,36(9):1765-1784 [2] Kirthica S,Sridhar R.Solution for Traversal Vulnerability and an Encryption-Based Security Solution for an Inter-cloud Environment [M]∥Computational Intelligence in Data Mining.Vo-lume 2,Springer India,2015:283-291 [3] Yu Neng-hai,et al.Review of cloud computing security[J].Acta Electronica Sinica,2013,1(2):371-381(in Chinese) 俞能海,等.云安全研究进展综述[J].电子学报,2013,1(2):371-381 [4] Feng Chao-sheng,et al.Key Techniques of Access Control for Cloud Computing[J].Acta Electronica Sinica,2015,43(2):312-319(in Chinese) 冯朝胜,等.云计算环境下访问控制关键技术[J].电子学报,2015,3(2):312-319 [5] Zacharia G,Moukas A,Maes P.Collaborative reputation mechanisms for electronic market places[J].Decision Support Systems,2000,9(4):371-388 [6] Li Xiao-yong,Gui Xiao-lin.Research on Dynamic Trust Model for Large Scale Distributed Environment[J].Journal of Software,2007(6):1510-1521(in Chinese) 李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007(6):1510-1521 [7] Blaze M,et al.Decentralized Trust Management[C]∥Procee-dings of 1996 IEEE Symposium on Security and Privacy.IEEE,1996:164-173 [8] Yang M H,Wang Z P,Yao J J.Research on a new cloud trust model and its defense abilities [J].Manufacturing and Enginee-ring Technology,2014,1(1):399-405 [9] Jaiganesh M,Aarthi M,Kumar A V A.Fuzzy ART-Based User Behavior Trust in Cloud Computing[M]∥Artificial Intelligence and Evolutionary Algorithms in Engineering Systems.Springer India,2015:341-348 [10] Kumar T S,Pandey S.Customization of Recommendation System Using Collaborative Filtering Algorithm on Cloud Using Mahout[M]∥Intelligent Distributed Computing.Springer International Publishing,2015:1-10 [11] Zhu Rui,Wang Huai-min,Feng Da-wei.Trustworthy ServicesSelection Based on Preference Recommendation[J].Journal of Software,2011(5):852-864(in Chinese) 朱锐,王怀民,冯大为.基于偏好推荐的可信服务选择[J].软件学报,2011(5):852-864 [12] Moghaddam M G,Mustapha N.AgeTrust:A New TemporalTrust-Based Collaborative Filtering Approach[C]∥Preceedings of 2014 International Conference on Information Science and Applications(ICISA).2014:1-4 [13] Song Guo-feng,Liang Chang-yong.A cloud security access control model based on user behavior trust[C]∥The 15th China Management Science Academic Essays.2013(in Chinese) 宋国峰,梁昌勇.一种基于用户行为信任的云安全访问控制模型[C]∥第十五届中国管理科学学术年会论文集 (下).2013 [14] Dempster A P.Upper and lower probabilities induced by a multiple valued mapping[J].The Annals of Mathematical Statistics,1967,38(2):325-339 [15] Shafer G.A mathematical theory of evidence[M].Princeton:Princeton University Press,1976 [16] 段新生.证据理论与决策、人工智能[M].北京:中国人民大学出版社,1990:13-35 [17] Sevastianov P,Dymova L,Bartosiewicz P.A framework for rule-base evidential reasoning in the interval setting applied to diagnosing type 2 diabetes[J].Expert Systems with Applications,2012,39(4):4190-4200 [18] Dempster A.Upper and Lower Probabilities Induced by Multivalued Mapping [J].Annalys of Mathematical Statistics,1967,38(2):325-339 [19] Shafer G.A mathematical theory of evidence[M].Princeton:Princeton university press,1976 [20] Zhu Jun-mao,et al.A Grid & P2P trust model based on recommendation evidence reasoning.Journal of Computer Research and Development,2005,42(5):797-803(in Chinese) 朱唆茂,等.Grid与P2P混合计算环境下基于推荐证据推理的信任模型[J].计算机研究与发展,2005,42(5):797-803 |
No related articles found! |
|