期刊文献+

一种基于虚拟化技术增强云安全的可信赖模型 被引量:7

A Virtualization Techniques Based Dependability Model to Enhance Security of Cloud Computing Environments
下载PDF
导出
摘要 云计算的安全性问题不仅是安全技术自身问题,也涉及到云系统的可靠性、保密性、信息匮乏等相关问题.为了增强异构、独立的云计算环境的安全性,提出一种云可信赖性模型CDMV(cloud dependability model by virtualization techniques),主要贡献体现在以下两个方面:提出了一种新的具有较好可扩展性、通用性的云系统可信赖性模型CDMV,并系统分析了CDMV模型的可信赖特性;给出了云系统可信赖性的定义及可信赖性的度量指标,并予以量化分析. Security issues in cloud computing are not all technological,rather,it is the issue of reliability,confidence,and lack of clear and enough information about cloud security.In order to improve the security of heterogeneous independent cloud environments,a novel cloud dependability model named CDMV(cloud dependability model by virtualization techniques) is proposed by using virtualization techniques.Our contributions can be summarized as follows: a general formal CDMV model with good scalability by using system-level virtualization techniques for cloud systems is proposed,and systematic analysis on how CDMV model can enhance the system dependability is presented;the proposed CDMV construction is equipped with the definition of dependability in cloud systems and a series of quantitative indicators to evaluate the dependability,which are missing in most existing schemes.
出处 《东北大学学报(自然科学版)》 EI CAS CSCD 北大核心 2011年第6期786-790,共5页 Journal of Northeastern University(Natural Science)
基金 国家自然科学基金资助项目(61070162 71071028 60802023 70931001) 教育部高等学校博士学科点专项科研基金资助项目(20100042110025 20070145017) 中央高校基本科研业务费专项资金资助项目(N100604012 N090504003 N090504006)
关键词 云安全 可信赖 虚拟化技术 云计算 cloud security dependability virtualization techniques cloud computing
  • 相关文献

参考文献12

  • 1Foster I, Zhao Y, Raicu I, et al. Cloud computing and grid computing 360-degree compared [ C ] // Grid Computing Environments Workshop. Austin, 2008:1 - 10.
  • 2Buyya R, Yeo C S, Venugopal S, et al. Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility [J ]. Future Generation Computer Systems, 2009,25(6) :599- 616.
  • 3Mell P, Grance T. The NIST definition of cloud computing[J].Communications of the ACM, 2010,53(6) :50.
  • 4ENISA. Cloud computing: benefits, risks and recommendations for information security[ EL/OL]. [ 2010 - 05 - 06 ]. http:// enisa, europa, eu/act/rm/files/deliverables/cloudcomputing-risk-assessment/at download/fullReport.
  • 5Khan K M. Security dynamics of cloud computing [J] .Cutter IT Journal, 2009,22(6/7):38- 43.
  • 6Algirdas A, Jean-Clande L, Brian R, et al. Basic concepts and taxonomy of dependable and secure computing[J ]. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1):11-33.
  • 7Al-Kuwaiti M, Kyriakopoulos N, Hussein S. A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability [ J ]. IEEE Communications Surveys & Tutorials, 2009,11 (2) : 106 - 124.
  • 8Zhang X, Lin C, Kong X. Model-driven dependability analysis of virtualization systems [ C ] //8th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2009. Shanghai, 2009:199 - 204.
  • 9Dhama A, Theel O, Crouzen P, et al. Dependability engineering of silent self-stabilizing systems [C] // 11th International Symposium on Stabilization, Safety, and Security of Distributed Systems. Lyon, 2009 : 238 - 253.
  • 10Ribiere A. Using virtualization to improve durability and portability of industrial applications [ C ] // 6th IEEE International Conference on Industrial Inforrnatics. Daejeon, 2008:1545 -1550.

同被引文献45

  • 1王朝晖,张来斌,燕林,张利军.基于Web Service的远程多Agent故障诊断系统[J].石油机械,2004,32(C00):83-85. 被引量:2
  • 2许爱军,张文金,易丹.基于虚拟现实技术的远程教育平台研究与实现[J].计算机系统应用,2007,16(8):23-26. 被引量:13
  • 3黎加厚.云计算辅助教学[M].上海:上海教育出版社,2010.
  • 4王鹏.走近云计算[M].北京:人民邮电出版社,2010.
  • 5DONG Bo,ZHENG Qing-hua,YANG Jie,et al.An e-learning ecosystem based on cloud com-puting infrastruc-ture[C].Riga:Ninth IEEE International Confer-ence onAdvanced Learning Technologies,2009:125-127.
  • 6JENSEN J,SCHWENK J,GRUSCHKA N,et al.On tech-nical security issues in cloud computing[C].Bahgalore:IEEE International Conference on Cloud Computing,2009:109-116.
  • 7ZHANG Qiang,CUI Dong.Enhance the user data privacyfor SAAS by separation of data[C].Michigan:Interna-tional Conference on Information Management,2009:130-132.
  • 8AlKuwaiti M, Kyriakopoulos N, Hussein S. A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability [J]. IEEE Communications Surveys & Tutorials, 2009, 11 (2) : 106-124.
  • 9ALKUWAITI M, KYRIAKOPOULOS N,HUSSEIN S A. Comparative analysis of network dependability ,fault-toler- ance, reliability, security, and survivability [ J ]. IEEE Communications Surveys & Tutorials, 2009,11 ( 2 ) : 106- 124.
  • 10Salah K,Alcaraz Calero J M,Zeadally S,et al.Using Cloud Computing to Implement a Security Overlay Network[J].IEEE Security & Privacy,2013,11 (1):44-53.

引证文献7

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部