期刊文献+

云计算环境下数字媒体分发协议及其安全性证明 被引量:1

Digital Media Distributing Protocol Based on Cloud Computing and Proof of Security
下载PDF
导出
摘要 云计算是一种新兴的计算模型,具备可靠性高、数据处理量大、灵活可扩展以及设备利用率高等优势,环境下的数字媒体分发同时又能对数字媒体的版权进行保护是目前的一个热点和难点。提出了一种云计算环境下数字媒体分发协议CDMDP,可有效进行版权保护,并采用基于S_Petri网模型对其安全性进行了形式化证明,新的方法有效避免了状态空间爆炸问题。在证明过程中,采用协议安全性等价原则,对分发协议进行适当简化,使证明更加简洁。 Cloud computing is an emerging model, with high rellability, mass aata processing, scalability and flexibility features. Distributing the Digital Media Distribution based on the cloud computing is hot and it is difficult to protect the digital rights. The CDMDP Protocol was proposed which could protect the digital rights efficiently and the Security Petri Net model was adopted to formally prove the present security protocol which could avoid the state explosion problem. In this proof, an equality principle was used to transform the security protocols to guarantee the simplicity of the proof.
出处 《系统仿真学报》 CAS CSCD 北大核心 2012年第12期2431-2433,2438,共4页 Journal of System Simulation
基金 973计划项目(2011CB311809) 国家自然科学基金(61163050 60873254 60932003) 新世纪优秀人才支持计划(NCET-10-0101) 河北省自然科学基金(F2010001745)
关键词 PETRI网 安全协议 数字媒体 云计算 Petri net security protocol digital media cloud computing
  • 相关文献

参考文献8

  • 1Ramgovind S, Eloff MM, Smith E. The Management of Security in Cloud Computing [C]// Information Security for South Africa (ISSA), Aug 2010.
  • 2New York, USA: IEEE Computer Society Press, 2010: 1-7. Grobauer B, Walloschek T, Stocker E. Understanding Cloud Computing Vulnerabilities [J]. Security & Privacy, IEEE. (S1540-7993), 2011, 9(2): 50-57.
  • 3Grobauer B, Walloschck T, Stocker E. Understanding Cloud Computing Vulnembilities [J]. Security & Privacy, IEEE. (S1540-7993), 2011, 9(2): 50-57.
  • 4Yingjiu Guo, Chuang Lin, Hao Yin. Design and Analysis of IPTV Digital Copyright Management Security Protocol [C]// Intelligent Signal Processing and Communication Systems, Xiamen, China, 2007. New York, USA: IEEE Computer Society Press, 2007: 554-557.
  • 5郭迎九,林闯,尹浩,田立勤.基于Petri网的数字媒体分发协议的安全性证明[J].电子学报,2009,37(5):1030-1036. 被引量:4
  • 6林闯,雷蕾.下一代互联网体系结构研究[J].计算机学报,2007,30(5):693-711. 被引量:64
  • 7Federico Crazzolara, Glynn Winskel. Petri nets in cryptographic protocols [C]// Parallel and Distributed Processing Symposium, Proceedings 15th International, Apr 2001. New York, USA: IEEE Computer Society Press, 2001: 1507-1515.
  • 8范科峰,莫玮,曹山,赵新华,裴庆祺.数字版权管理技术及应用研究进展[J].电子学报,2007,35(6):1139-1147. 被引量:65

二级参考文献16

共引文献129

同被引文献21

  • 1乔海燕.安全协议验证的归纳方法与串空间形式化比较[J].计算机研究与发展,2008,45(z1):137-142. 被引量:1
  • 2吴吉义,沈千里,章剑林,沈忠华,平玲娣.云计算:从云安全到可信云[J].计算机研究与发展,2011,48(S1):229-233. 被引量:54
  • 3刘万伟,周倜,李梦君,李舟军.一种基于进程代数的安全协议验证消解算法[J].计算机工程与科学,2006,28(7):14-16. 被引量:1
  • 4Patrick Hner. Cloud Computing Security Requirements and Solutions: a Systematic Literature Review[C]. 19^th Twente Student Conference on IT, 2013.
  • 5R. La 'Quata Sumter. Cloud Computing: Security Risk Classification, ACMSE 2010, Oxford, USA.
  • 6何小虎.基于云计算的安全协议分析与设计[D].成都电子科技大学,2012.
  • 7王剑.移动终端可信接入与验证[D].同济大学,2011.
  • 8Grawrock D. TCG Specification Architecture Overview Revision 1.4.[EB/OL].[2011-05-01]. https://www. trustedcomputionggroup.org/groups/TCG 1.4 Archiecture Overview.pdf.
  • 9Shuching Wang, Wenpin Liao, Kuoqin Yan,et al. Security of cloud computing lightweight authentication protocol [J].Applied Mechanics and Materials, 2013, 284-287: 3502-3506.
  • 10R. Rajagopal, M. Chitra. Trust Based Interoperability Security Protocol for Grid and Cloud Computing[C].2012 3rd International Conference on Computing, Communication and Networking Technologies, 2012.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部