期刊文献+

云计算环境下动态用户行为认证的机制、模型与分析 被引量:10

Modeling and Analysis of Dynamic User Behavior Authentication Scheme in Cloud Computing
下载PDF
导出
摘要 在云计算中,终端用户对云资源软硬件的影响和破坏远比目前用户利用因特网进行资源共享要严重的多,因此相对于用户的身份,用户的行为是否真实可信是云计算研究的一个重要内容。提出了户行为认证的机制,包括行为认证集的确立、行为证据的获得、行为认证的策略,建立相应的随机Petri网模型,并通过量化瞬时变迁的实施概率来模拟不同的认证选择,利用系统达到稳定状态时位置中的平均标记数来评价认证效果,为云计算的安全应用奠定理论和实践基础。 The impact to the hardware/software resource generated by end users in cloud computing is much more significant than in the Internet resource sharing scenario. Therefore the authentication of user behavior becomes a key aspect in cloud computing research community. A scheme for user behavior authentication was purposed, including the establishment of authentication set, the acquirement of user behavior evidence, and a scheme for behavior authentication. A Stochastic Petri Net Model of the system was built to analyze the system performance by computing the steady state marking distribution.
出处 《系统仿真学报》 CAS CSCD 北大核心 2011年第11期2302-2307,共6页 Journal of System Simulation
基金 国家973计划项目(2011CB311809) 国家自然科学基金(61163050 61070182 60873192) 河北省自然科学基金(F2010001745) 新世纪优秀人才支持计划(NCET-10-0101)
关键词 云计算 行为证据 用户行为认证 随机PETRI网 cloud computing behavior evidence user behavior authentication SPN
  • 相关文献

参考文献8

  • 1Minqi Zhou, Rong Zhang, Wei Xie, et al. Security and Privacy in Cloud Computing: A Survey [C]// 2010 Sixth International Conference on Semantics, Knowledge and Grids, Beijing, China. USA: IEEE Computer Society, 2010:105-112.
  • 2Roger Clarke. User Requirements for Cloud Computing Architecture [C]// 2010 10th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, Melbourne, Australia. USA: IEEE, 2010: 625-630.
  • 3冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1066
  • 4Voron J-B, Demoulins C, Kordon F. Adaptable Intrusion Detection Systems Dedicated to Concurrent Programs: a Petri Net-Based Approach [C]// 10th International Conference on Application of Concurrency to System Design, Braga, Portugal. USA: IEEE Computer Society, 2010: 57-66.
  • 5Chen Hang, Tao Jun. Research on Layered Network Security Architecture Modeling based on Stochastic Petri Nets [C]// 2010 International Conference on Internet Technology and Applications, Wuhan, China. USA: IEEE, 2010: 1-5.
  • 6Ing-Ray Chela, Fenye Bao, Moonjeong Chang, Jin-Hee Cho. Trust Management for Encounter-Based Routing in Delay Tolerant Networks [C]//GLOBECOM 2010, Miami, USA. USA: IEEE, 2010: 1-6.
  • 7Tian Li-qin, Lin Chuang, Ji Tie-guo. Quantitative Analysis of Trust Evidence in Intemet [C]// 2006 IEEE International Conference on Communication Technology. USA: IEEE, 2006: 1-5.
  • 8田立勤,林闯.可信网络中一种基于行为信任预测的博弈控制机制[J].计算机学报,2007,30(11):1930-1938. 被引量:70

二级参考文献37

  • 1林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:252
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 4Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 5Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 6Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 7Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 8Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 9Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 10Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.

共引文献1130

同被引文献98

引证文献10

二级引证文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部