期刊文献+

保护私有数据的云工作流调度方法 被引量:4

Cloud workflow scheduling method with data privacy protection
下载PDF
导出
摘要 为解决云工作流中数据资源的私有性问题,提出一种保护私有数据的云工作流调度方法。针对云工作流中数据资源之间依赖关系和互斥关系并存的特点,提出扩展中国墙的云工作流私有性策略模型,对资源分配中的利益冲突问题进行精确描述;提出云工作流私有性策略描述语言,采用基于逻辑语言的分析方法,将策略形式化表达为一组逻辑规则集,通过对规则的逻辑推理可对策略的一致性进行分析和检验;基于上述策略模型和描述语言,提出保护私有资源的云工作流调度方法,并证明了该调度方法不会违背用户设定的数据资源私有性策略。 To solve the data privacy problem of cloud workflows, a cloud workflow scheduling method to protect data privacy was presented. Aiming at the coexistence of dependent relationship and mutex relationship among data re- sources, a privacy policy model of cloud workflow to extend Chinese wall model was proposed for precisely tackling the conflict-of-interest problem during resource allocation. A privacy policy description language was proposed, which could formulize the privacy policies as a set of logic rules so that the consistency of the privacy policies could be analyzed and verified by logic reasoning. Based on above model and language, a workflow scheduling approach was put forward. It was proved that the approach did not violate the privacypolicies for data protection.
作者 王菁 韩燕波
出处 《计算机集成制造系统》 EI CSCD 北大核心 2013年第8期1859-1867,共9页 Computer Integrated Manufacturing Systems
基金 国家自然科学基金重点资助项目(61033006) 北京市自然科学基金重点资助项目(4131001) 北京市属高等学校创新团队建设与教师职业发展计划资助项目(IDHT20130502) 北方工业大学博士启动基金资助项目~~
关键词 云工作流 数据资源私有性保护 工作流调度 中国墙模型 cloud workflow~ data privacy protectiom workflow scheduling~ Chinese wall model
  • 相关文献

参考文献12

  • 1韩燕波,王桂玲,刘晨,等.互联网计算的原理与实践——探索网格、云和Web X.0背后的本质问题和关键技术[M].北京:科学出版社,2010.
  • 2韩燕波,孙君意,王桂玲,李厚福.A Cloud-Based BPM Architecture with User-End Distribution of Non-Compute-Intensive Activities and Sensitive Data[J].Journal of Computer Science & Technology,2010,25(6):1157-1167. 被引量:4
  • 3王菁,张利永,韩燕波.Client-Centric Adaptive Scheduling of Service-Oriented Applications[J].Journal of Computer Science & Technology,2006,21(4):537-546. 被引量:4
  • 4BREWER D F C,NASH M J.The Chinese wall security policy[C]//Proceedings of IEEE Symposium on Security and Privacy.Washington,D.C.,USA:IEEE,1989:206-214.
  • 5HOFFA C,MEHTA G,FREEMAN T,et al.On the use of cloud computing for scientific workflows[C]//Proceedings of eScience'08.Washington,D.C.,USA:IEEE,2008:640-645.
  • 6D(O)RNEMANN T,JUHNKE E,FREISLEBEN B.On-demand resource provisioning for BPEL workflows using Amazon's elastic compute cloud[C]//Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.Washington,D.C.,USA:IEEE Computer Society,2009:140-147.
  • 7LIU K,JIN H,CHEN J,et al.A compromised-time-cost scheduling algorithm in swindew-c for instance-intensive cost-constrained workflows on a cloud computing platform[J].International Journal of High Performance Computing Applications,2010,24(4):445.
  • 8MUTHUSAMY V,JACOBSEN H A.BPM in cloud architectures:Business process management with SLAs and events[C]//Proceedings of the 8th International Conference on Business Process Management.Berlin,Germany:Springer-Verlag,2010:5-10.
  • 9CRANOR L,BOBBS B,EGELMAN S,et al.NOTE-P3P112061113 The platform for privacy preferences 1.1 (P3P1.1)Specification[S].W3C working Group Note,2006.
  • 10YAU S S,LIU J.A situation-aware access control based privacy-preserving service matchmaking approach for service-oriented architecture[C]//Proceedings of 2007 IEEE International Conference on Web Services.Washington,D.C.,USA:IEEE,2007.

二级参考文献27

  • 1李厚福,韩燕波,虎嵩林,单保华,梁英.一种面向服务、事件驱动的企业应用动态联盟构造方法[J].计算机学报,2005,28(4):739-749. 被引量:24
  • 2王菁,张利永,韩燕波.Client-Centric Adaptive Scheduling of Service-Oriented Applications[J].Journal of Computer Science & Technology,2006,21(4):537-546. 被引量:4
  • 3Singh M P. Being interactive: Physics of service composition. IEEE Internet Computing, 2001, 5(3): 6-7.
  • 4Casati F, Sayal M, Shan M. Developing e-services for composing e-services. In Proc. 13th Int. Conf. Advanced Information System Engineering (CAiSE2001), Interlaken, Switzerland, June 4-8, 2001, pp.171-186.
  • 5Berardi D, Calvanese D, Giacomo G D et al. Automatic composition of e-services that export their behavior. In Proc. 1st Int. Conf. Service Oriented Computing (ICSOC2003), Trento, Italy, December 15-18, 2003, pp.43-58.
  • 6Han Y, Geng H, Li H et al. VINCA-A visual and personalized business-level composition language for chaining webbased services. In Proc. 1st Int. Conf. Service-Oriented Computing (ICSOC2003), Trento, Italy, December 15-18, 2003, pp.165-177.
  • 7Deelman E, Blythe J, Gil Yet al. Mapping abstract complex workflows onto grid environments. J. Grid Comput., 2003, 1(1): 25-39.
  • 8Domingues P, Marques P, Silva L M. Resource usage of windows computer laboratories. In Proc. 94th Int. Conf. Parallel Processing Workshops, Oslo, Norway, June 14-17, 2005, pp.469-476.
  • 9SETI@home. http://setiathome.ssl.berkeley.edu/.
  • 10GENOME@HOME. http://www.stanford.edu/group/pandegroup/genome/.

共引文献4

同被引文献32

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部