期刊文献+

基于SLA的云计算动态信任评估模型 被引量:6

SLA-based dynamic trust evaluation for cloud computing
下载PDF
导出
摘要 针对云计算环境中用户如何有效的选择云服务商及签订服务协议的问题,本文提出一种基于服务等级协议SLA的中立第三方动态信任评估系统框架.通过在用户端和云端设置的监测代理,实时监控并采集SLA相关的实际服务数据;通过实际观测的参数、其变化情况及SLA协定的参数,同时结合用户主观评价,计算得到服务质量的信任值,最终形成对云服务商服务可信度的全面的和动态的评价.本文给出了系统框架结构、评估方法和评估输入与流程等信任评估的实现方法.与其他信任评估方法相比,本文提出的模型全面融合了多种数据主客观评价来源,给出了具体流程和方法,具有更好的客观性、准确性和可信性. How to effectively choose cloud service providers and sign service agreements with cloud providers is a difficult question. This paper proposes a SLA-based, dynamic, neutral, third-party trust evaluation system framework in cloud computing. By embedding monitoring agents at client-side and the cloud-side, real-time service information related to SLA can be observed and gathered. Combining users' subjective evaluation with these practical parameters and their changes, the system can compute and get the trust about cloud service providers' credibility comprehensively, dynamically. This paper presents the system frame structure, implementation rules of the trust evaluation, input and working process, etc. Compared with other trust evaluation methods, the method proposed in this paper com- bines a variety of subjective and objective evaluation sources, and provides the specific methods and processes. It also avoids the malicious interference effectively, and has better objectivity, accuracy and feasibility.
出处 《北京交通大学学报》 CAS CSCD 北大核心 2013年第5期80-87,共8页 JOURNAL OF BEIJING JIAOTONG UNIVERSITY
基金 教育部博士点基金项目资助(20120009110007) 中央高校基本科研业务费专项资金资助(2012JBZ010 2011JBM217)
关键词 云计算 服务等级协议 实时监控 信任模型 主客观评价 cloud computing service level agreement (SLA) dynamic monitoring trust model sub-ject and objective evaluation
  • 相关文献

参考文献22

  • 1Alhamad M, Dillon T, Chang E. Sla-based trust model for cloud computing[ C] //Proceedings of 13th IEEE Interna- tional Conference on Network-Based Information Systems (NBiS), 2010:321 - 324.
  • 2高云璐,沈备军,孔华锋.基于SLA与用户评价的云计算信任模型[J].计算机工程,2012,38(7):28-30. 被引量:22
  • 3Wang M C, Wu X, Zhang W, et al. A conceptual plat- form of SLA in cloud computing[C]//Proceedings of 9th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC), 2011: 1131- 1135.
  • 4Hwang K, Li D. Trusted cloud computing with secure re- sources and data coloring[J].Intemet Computing, IEEE, 2010, 14(5) : 14- 22.
  • 5Manual P D, Thamarai Selvi S, Barr M I A E. Trust management system for grid and cloud resources[C]//Pro- ceedings of 1st IEEE International Conference on Ad- vanced Computing of(ICAC), 2009: 176- 181.
  • 6Song S, Hwang K, Macwan M. Fuzzy trust integration for security enforcement in grid computing[ C] //Proceedings of IFIP International Conference on Network and Parallel Computing 2004, Springer Berlin: Heidelberg, 2004 : 9 - 21.
  • 7吴慧,于炯,于斐然.云计算环境下基于信任模型的动态级访问控制[J].计算机工程与应用,2012,48(23):102-106. 被引量:13
  • 8Sun X, Chang G, Li F. A trust management model to en- hance security of cloud computing environments[ C]//Pro- ceedings of 2nd IEEE International Conference on Net- working and Distributed Computing (ICNDC), 2011:244 - 248.
  • 9Li W, Ping L, Pan X. Use trust management module to achieve effective security mechanisms in cloud environment [C]//Proceedings of IEEE International Conference On Electronics and Information Engineering (ICEIE), 2010, V1 : 14 - 19.
  • 10Alhamad M, Dillon T, Chang E. Conceptual SLA frame- work for cloud computing[C]//Proceedings of 4th IEEE International Conference on Digital Ecosystems and Tech- nologies (DEST), 2010:606 - 610.

二级参考文献19

共引文献468

同被引文献44

  • 1张琳,饶凯莉,王汝传.云计算环境下基于评价可信度的动态信任评估模型[J].通信学报,2013,34(S1):31-37. 被引量:6
  • 2Boss G,Malladi P,Quan D,et al.Cloud computing,IBM White paper [EB/OL].www/ibm,com/developer-works/websphere/zones/hipods/2010.
  • 3Wang M C,Wu X,Zhng W,et al.A conceptual platform of SLA in cloud computing [A].Proceedings of 9thIEEE International Conference on Dependable,Autonomicand Secure Computing(DASC)[C].2011:1131-1135.
  • 4Beloglazov A,Buyya R.Adaptive Threshold based Approach for Energy efficient Consolidation of Virtual Machines in Cloud Data Centers [A].Proc.of the 8th international Workshop on Middle-ware for Grids,Clouds and E-Science [C].Bangalore,India:ACM Press,2010.
  • 5Gandhi A,Chen Y,Gmach D,et al.Minimizing Data Center SLA violations and power consumption via hybrid resource provisioning [A].Proc.of the 2na international green computing conference [C].Orlando,USA:IEEE Press,2011.
  • 6Calhiros R,Ranjan R,Beloglazov A,et al.CloudSim:A Toolkit for modeling and simulation of Resource Provisioning Algorism [J].Software:Practice and experience,2011,41(1):23-50.
  • 7Armbrust M.A view of cloud computing[J].Communications of the ACM,2010,53(4):50-58.
  • 8Chandrasekhar S,Singhl M,Tingjian G E,et al.Collaboration in multicloud computing environments:Framework and security issues[J].Computer,2013,46(2):76-84.
  • 9Mohemed A,John G,Amani S.Collaboration based cloud computing security management framework[C]//Proceedings of IEEE International Conference on Cloud Computing,2011:364-371.
  • 10Chakraborty S,Roy K.An SLA-based framework for estimating trustworthiness of a cloud[C]//IEEE 11th International Conference on Trust,Security and Privacy in Computing and Communications,2012:937-942.

引证文献6

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部