期刊文献+

可信基础设施云设计与实现 被引量:2

Design and Implementation of A Trusted IaaS
下载PDF
导出
摘要 云计算正在加速应用到各行各业。然而在云计算模式下用户将数据和应用转移到云服务器或者虚拟机中,可能会受到来自云内部恶意管理员的攻击,加剧了云服务的可信性问题,阻碍了云计算的发展和推广。本文通过引入可信计算技术和第三方验证的方式,设计实现一种新的可信基础实施云模型T-IaaS。最后在Linux上实现原型系统,对其进行定量分析评估。实验结果表明,T-IaaS能够有效的保证基础设施云的可信性,而只引入很小的额外代价。 Cloud computing is rapidly applied to all walks. However, with cloud computing, customers must store their data or deploy applications on the cloud. These resources may be damaged by the malicious administrator of cloud, which aggravates the trustworthiness issue of cloud services and hinders the development and widespread of cloud computing. This paper introduces the Trusted Computing and a Trusted Third Party to verify the trustworthiness of IaaS cloud. This paper implemented a prototype on Linux, and took a quantitative assessment. The experiments demonstrated that T-IaaS brings little extra cost on the performance while guaranteeing trustworthiness.
作者 王小亮 刘彬
出处 《软件》 2012年第11期11-13,共3页 Software
基金 国家自然科学基金(60273006 61202081)
关键词 计算机应用 基础设施云 可信 computer application IaaS trust
  • 相关文献

参考文献10

  • 1Michael Armbrust, Armando Fox, Rean Griffith,etc. Aview of cloud computing(J]. Communications of the ACM,2010,53(4):50-58.
  • 2Fujitsu Research Institute. Personal Data in the Cloud: theimportance of trust [OL]. http://www.fujitsu.com/global/news/publications/dataprivacy. html.
  • 3Wayne Jansen, Timothy Grance. Guidelines on securityand privacy in public Cloud Computing[S], 2011.
  • 4Marco Slaviero. BlackHat Presentation Demo Vids:Amazon, part 4 of 5, AMIBomb [EB/OL].[2009-8].http : //www. sensepost. com/blog/3797. html.
  • 5Stefan Berger, Ramon C a ceres and D P etc. TVDc:managing security in the trusted virtual datacenter[J].Operating Systems Review (ACM), 2008, 42(1): 40-47.
  • 6Bertholon B, Varrette S, Bouvry P. Certicloud: anovel tpm-based approach to ensure cloud Iaas security.Proceedings of the 4th International Conference on CloudComputing[C]. Washington,USA, 2011: 121.
  • 7Wallom, D,Turilli, etc. MyTrustedCloud: trusted cloudinfrastructure for security-critical computation and datamanagement[A]. Proceedings of the 3th IEEE InternationalConference on Cloud Computing Technology and Science(CIoudCom2011)[C]. Athens, Greece, 2011 : 247-254.
  • 8Nuno Santos, Krishna P Gummadi, Rodrigo Rodrigues.Towards trusted cloud computing[A]. Proc. of the 2009conference on Hot topics in cloud computing[C]. SanDiego, California: 2009.
  • 9Hwang K.,Li D, Trusted cloud computing with secureresources and data coloring[J], IEEE Internet Comput.,2010: 30-39.
  • 10Sreenidhi P M., Vinay Kumar V. A novel reputationmanagement system for volunteer clouds[A]. InternationalConference on Computer Communication and Informatics(ICCCI)[C],2012:1-5.

同被引文献13

引证文献2

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部