Computer Science ›› 2014, Vol. 41 ›› Issue (Z6): 363-365.

Previous Articles     Next Articles

Research on Cloud Security Model Based on Trusted Third Party on Multi-tenant Environment

WANG Pei-xue and ZHOU Hua-qiang   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Aiming at multi-tenant environments for cloud computing,introducing the trusted third party is into cloud security solutions,this paper proposed a new cloud security model based on trusted third party.Then we designed the authentication protocol and a multi-tenant resource allocation algorithm based on TTP.Finally,the CloudSim simulation tools were used for simulation and performance analysis,and Short Jobs First strategy,First-come First-served policy were compared with TTP strategy in successful implementation rate of resources.The experimental results show that the model provides the highest credibility cloud node resources to cloud users,builds a trust web between entities effectively,verifies the correctness of the data and the correctness of the data exchange,and provides a multi-level,end-to-end security services in the distributed environment.

Key words: Cloud computing,Multi-tenant,Trusted third party,Cloud security

[1] 刘鹏.网格计算与云计算(PPT)[EB/OL].http://www.chinacloud.cn/download/PPT/GridCloudComputing.ppt
[2] Buyya R,Abramson D,Giddy J,et al.Economic models for resource management and scheduling in grid computing [J].Concurrency & Computation,2002,14(13-15):1507-1542
[3] 高宏卿,邢颖.基于经济学的云资源管理模型研究[J].计算机工程与设计,2010,1(10):4139-4142
[4] Geimer M,Shende S,Malony A D,et al.A generic and configurable source-code instrumentation component[C]∥Allen G, Nabrzyski J,Seidel E,et al.,eds.ICCS (2),Vol.5545of Lecture Notes in Computer Science.Springer,2009:696-705
[5] International Telecommunication Union.X-509|ISO/IEC 9594-8,The directory:Public-key and attribute certificate frameworks[S].ITU,X-Series,2001
[6] 卿斯汉.电子商务协议中的可信第三方角色[J].软件学报,2003,4(11):1936-1943
[7] Lekkas D,Gritzalis S,Katsikas S.Quality assured trusted third parties for Deploying secure Internet-based health care applications[J].International Journal of Medical Informatics,2002,65(2):79-96
[8] 陈冬娥,杨扬,刘丽.基于效用最优的网格计算资源调度算法[J].计算机工程与应用,2006,2(2):191-193

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!