期刊文献+

云环境下自动信任协商机制研究 被引量:2

Research of automated trusted negotiation in cloud computing
下载PDF
导出
摘要 针对云计算环境带来的安全性问题,在目前云安全模型研究的基础上,对分层的云服务框架模型进行了安全性分析。综合考虑云计算环境特点,在不影响云服务质量的前提下保证数据安全,建立了一个云安全访问控制模型ACCP。该模型利用自动信任协商机制可以不依靠数据中心第三方安全服务,通过双方信任证集的交互和策略的控制自适应地建立组合安全域。通过在用户-服务以及组合服务之间两个场景下信任协商建立过程,表明了模型可行性和有效性。 For improving the security solution in cloud computing,based on the research of cloud security model at present,security problem at layered cloud model is analyzed.With the comprehensive consideration in cloud environment,a access control model-ACCP(ATN cloud computing platform) is proposed,which prove the data in cloud server to be safe without fewer affection on cloud Quos.This model,based on the ATN(automated trusted negotiation) mechanism,independently build the adaptive assorted security domain by translating the trust certificate set and controlling the access stratagem without the assistant from the third security service.By the description in the two scenes,user-services and assorted services,demonstrate the availability and feasibility of the model.
出处 《计算机工程与设计》 CSCD 北大核心 2012年第9期3286-3290,共5页 Computer Engineering and Design
基金 国家"十一五"科技支撑计划基金项目(2006BAF01A00)
关键词 云计算 数据安全 自动信任协商 访问控制 数字证书 cloud computing data security ATN access control digital certificate
  • 相关文献

参考文献10

  • 1Peterson. G, Don't Trust. And verify. A security architec- ture stack for the cloud [J]. Security & Privacy, IEEE, 2010, 8 (5). 83-86.
  • 2Nuno Santos Krishna P. Towards trusted cloud computing [C].USENIX Association Berkeley. CA, USA: Proceedings of the Conference on Hot Topics in Cloud Computing, 2009: 22.
  • 3Guan Shangyuan, Dong Xiaoshe, Mei Yiduo, Towards auto- mated trust negotiation for grids [C]. Sanya, China: Networ- king, Sensing andControl, 2008. 6-8.
  • 4Cloud security alliance (CSA) cloud computing architectural framework [EB/OL] . https://wiki, cloudsecurityalliance. org, 2011.
  • 5Armbrust. Above the douds: A berkeley view of cloud o:nrrputing [C]. UC Berkeley Tech Report UCB/EtKTS-2009-28, 2009.
  • 6Chow. Controlling data in cloud computing: Outsourcing com- putation without outsourcing control[C]. ACM New York, USA. Proceedings of the ACM workshop on Cloud Computing Security, 2009. 678.
  • 7Fisher, Steve, The architecture of the apex platform, sales- force. Com' s platform for building on-demand applications [J]. Minneapolis, USA: Software Engineering-Companion, 2007, 34 (1): 3-3.
  • 8DanielNurmi, RiehWolski. Theeuealyptusopen-sourceeloud- computing system [C]. Washington DC, USA: Cluster Com- puting and the Grid, 2009. 124-131.
  • 9冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1063
  • 10岳冬利,刘海涛,孙傲冰.IaaS公有云平台调度模型研究[J].计算机工程与设计,2011,32(6):1889-1892. 被引量:26

二级参考文献39

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1087

同被引文献14

引证文献2

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部