加入收藏 | 设为首页 | 会员中心 | 我要投稿 武汉站长网 (https://www.027zz.cn/)- 科技、建站、经验、云计算、5G、大数据,站长网!
当前位置: 首页 > 云计算 > 正文

云计算可信性问题研究

发布时间:2022-12-19 17:04:11 所属栏目:云计算 来源:网络
导读: (1)云计算可信性研究起步不早,但已有很多论文和著作发表。在可信平台、框架与模型,可信机制,可信技术,可信管理,可信评估等方面均有较多研究。
(2)较多文献往往借鉴传统信任管理和可信

(1)云计算可信性研究起步不早,但已有很多论文和著作发表。在可信平台、框架与模型,可信机制,可信技术,可信管理,可信评估等方面均有较多研究。

(2)较多文献往往借鉴传统信任管理和可信计算理论与方法。传统的信任管理理论已经较为成熟,尤其是E-commerce、Ad Hoc Networks、P2P、Social Networks等领域,典型的模型有基于声誉的信任模型、基于证据理论的信任模型、基于模糊数据的信任模型、基于概率论的信任模型、基于主观逻辑的信任模型等。在可信电子服务领域,典型的代表作有Elizabeth[45]的著作,它对服务环境下的信任与信誉进行了全面的介绍,被潘云鹤院士推荐、浙大陈德人教授翻译为中文。将可信计算理论融入云计算是解决云计算信任问题的途径之一,有很多学者已采用可信密码学、可信融合验证、可信模式识别等可信云安全技术解决云计算可信性问题。

(3)针对云服务提供商的可信性评估研究极为罕见。可信评估已成为目前研究热点之一,很多学者已认识到云计算可信服务度量与评估的重要性和紧迫性,但这些文献往往针对用户行为的可信性进行评估,如Edna Dias Canedo[9]、田立勤[46]和林闯等[47]所作文献,专门评估云服务供应商的极为罕见,笔者仅发现Habib[28]、高云璐[41]和王磊[42]的3篇,而且存在不足。

3 结束语

云计算的优势和前景毋庸置疑,云服务的可信性问题严重阻碍着云计算的发展,其根源在于云计算的特点和云计算可信服务理论研究的不完善[13]。云计算的核心模式是服务,服务的前提是用户和服务提供方建立信任,但目前云计算信任机制还不健全[48]。用户缺乏对云计算服务可信性和服务质量的了解,自然对云计算服务缺乏信任,而云计算服务是否可信需要一套有效的测试系统对其可信性进行度量与评估[7],但这方面的研究工作尚展开不多。因此,要大规模应用云计算技术与平台,发展更多用户,推进云计算产业发展,就必须开展云计算可信服务理论研究,度量和评估云服务可信性刻不容缓[7,35]。

总之,云计算可信服务机制的不健全已严重制约着云计算的发展和应用,可信服务度量与评估是云计算领域亟待突破的重要研究课题。

参考文献

[1] WARD B T,SIPIOR J C.The Internet jurisdiction risk of cloud computing[J].Information Systems Management,2010(27):334-339.

[2] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83.

[3] MACKAY M,BAKER T,Al-Yasiri A.Security-oriented cloud computing platform for critical infrastructures[J].Com-puter Law & Security Review,2012(28):679-686.

[4] Santos Nuno,Gummadi Krishna P,Rodrigues Rodrigo.Towards trusted cloud computing[C].Proceedings of the 2009Conference on Hot Topics in Cloud Computing 2011.Berkeley,CA,USA:ACM,1-4.

[5] 陈海波.云计算平台可信性增强技术的研究[D].上海:复旦大学,2009.

[6] KO R K L,JAGADPRAMANA P,MOWBRAY M.Trust-Cloud:A framework for accountability and trust in cloud com-puting[C].Proceedings of 2nd IEEE Cloud Forum for Practi-tioners,2011:584-588.

[7] Abawajy Jemal.Establishing trust in hybrid cloud computingenvironments[C].Proceedings of 2011 IEEE 10th InternationalConference on Trust,Security and Privacy in Computing andCommunications,Changsha IEEE Computer Society,2011:118-125.

[8] GUERRERO R S.Trust-aware federated IdM in consumer cloud computing[C].Proceedings of 2012 IEEE InternationalConference on Consumer Electronics,2012,Las Vegas,NV,USA IEEE Computer Society,53-54.

[9] Edna Dias Canedo,Rafael Timóteo de Sousa Junior,Robsonde Oliveira Albuquerque.Trust model for reliable file exchange in cloud Computing[J].International Journal of Computer Science and Information Technology,2012,4(1):1-18.

[10] Li Wenjuan,Ping Lingdi,Pan Xuezeng.Use trust manage-ment module to achieve effective security mechanisms in

cloud environment[C].Proceedings of 2010 International Conference on Electronics and Information Engineering,2010:1-14.

[11] 谢晓兰,刘亮,赵鹏,面向云计算基于双层激励和欺骗检测的信任模型[J].电子与信息学报,2012,34(4):813-817.

[12] 任伟,雷敏,杨榆.DRT:一种云计算中可信软件服务的通用动态演变鲁棒信任模型[J].小型微型计算机系统,2012,33(4):679-683.

[13] Ahmed Mahbub,Xiang Yang.Trust ticket deployment: A notion of a data owner's trust in cloud computing[C].Proceedings of 2011 IEEE 10th International Conference on Trust,Security and Privacy in Computing and Commu-nications.2011.Changsha IEEE Computer Society,p.1-7.

[14] 胡春华,陈晓红,吴敏,等.云计算中基于SLA的服务可信协商与访问控制策略[J].中国科学:信息科学,2012,42(3):314-332.

[15] 王小亮,刘彬,王春露.云计算可信机制的有效性评估方法研究[J].中国科技论文在线,2012(12):1-9.

[16] 孔华锋,高云璐.云计算环境柔性易扩展的信任协商机制研究[J].系统工程理论与实践,2011(31):38-42.

[17] Zhang Gaofeng,Yang Yun,Yuan Dong,et al.A trust-basednoise injection strategy for privacy protection in cloud[J].Journal of Software Practice and Experience,2012,42(4):431-445.

[18] Wang Wei,Zeng Guosun,Tang Daizhong,et al.Cloud-DLS:Dynamic trusted scheduling for cloud computing[J].ExpertSystems with Applications,2012(39):2321-2329.

[19] Cachin Christian,Keidar Idit,Shraer Alexander.Trusting the cloud[J].ACM SIGACT News,2009,40(2):1-6.

[20] Hwang Kai,Li Deyi.Trusted cloud computing with secure resources and data coloring[J].IEEE Internet Computing,2010,14(5):14-22.

[21] Khan Khaled M,Malluhi Qutaibah.Establishing trust in cloud computing[J].IT Professional,2010,12(5):20-27.

[22] Rong Chunming,NGUYEN S T,JAATUN M G.Beyond lightning:A survey on security challenges in cloud comput-ing[J].Computers and Electrical Engineering,2013,39(1):47-54.

[23] Rajagopal,Chitra.Trust based interoperability security proto-col for grid and cloud computing[C].Proceedings of 2012 Third International Conference on Computing Communica-tion & Networking Technologies.2012.Coimbatore,Tamil-nadu,India IEEE Computer Society,1-5.

[24] 吴吉义,沈千里,章剑林,等.云计算:从云安全到可信云[J].计算机研究与发展,2011(48):229-233.

[25] 李虹,李昊.可信云安全的关键技术与实现[M].北京:人民邮电出版社,2010.

[26] 吴遥,赵勇.可信云计算平台中外部信任实体的安全性研究[J].计算机仿真,2012,29(6):156-158.

[27] 季涛,李永忠.基于可信计算机制的云计算盲数据处理[J].山东大学学报(工学版),2012,42(5):30-34.

[28] HABJB S M,RIES S,MUHLHAUSER M.Towards a trust management system for cloud computing[C].Proceedings of2011 IEEE 10th International Conference on Trust,Securi-ty and Privacy in Computing and Communications.2011.Changsha IEEE Computer Society,933-939.

[29] Hwang Kai,Kulkareni Sameer,Hu Yue.Cloud security with virtualized defense and reputation-based trust mangement[C].Proceedings of DASC′09 Proceedings of the 2009 Eighth IEEE International Conference on Dependable,Autonomic and Secure Computing 2009.Chengdu:IEEE Computer Society:717-722.

[30] ZISSIS D,LEKKAS D.Addressing cloud computing securityissues[J].Future Generation Computer Systems,2012(28):583-592.

[31] Firdhous Mohamed,Ghazali Osman,Hassan Suhaidi.Trust management in cloud computing:A critical review[J].International Journal on Advances in ICT for Emerging Regions云计算框架图,2011,4(2):24-36.

[32] Zhang Hengxi.Comparison of dynamic trust management model in cloud computing[C].Proceedings of 2012 Inter-national Conference on Computer Science & Service System,2012.Nanjing,China IEEE Computer Society:699-701.

[33] Sun Xiaodong.A Trust management model to enhance security of cloud computing environments[C].Proceedings of 2011 Second International Conference on Networking and Distributed Computing.2011.Beijing:IEEE Computer Society,244-248.

[34] Sun Dawei,Sun Lina,Wang Xingwei.Surveying and ana-lyzing security,privacy and trust issues in cloud com-puting environments[J].Procedia Engineering,2011(15):2852-2856.

[35] Foster,Zhao Yong,Lu Shiyong,Cloud computing and gridcomputing 360-degree compared[C].Proceedings of Grid Computing Environments Workshop,2008.GCE′08.2008,IEEE:Austin,TX.p.1-10.

[36] ALHAMAD M,DILLON T S,CHANG E.SLA-based trustmodel for cloud computing[C].Proceedings of 2010 13th International Conference on Network-Based Information Systems,2010:321-324.

[37] Guo Qiang.Modeling and evaluation of trust in cloud com-puting environments[C].Proceedings of 2011 3rd Interna-tional Conference on Advanced Computer Control,China IEEE Computer Society,2011:112-116.

[38] Tian Liqin,Lin Chuang,Ni Yang.Evaluation of user behavior trust in cloud computing[C].Proceedings of 2010 International Conference on Computer Application and System Modeling,2010:567-572.

(编辑:武汉站长网)

【声明】本站内容均来自网络,其相关言论仅代表作者个人观点,不代表本站立场。若无意侵犯到您的权利,请及时与联系站长删除相关内容!