期刊文献+

一种面向IaaS租户的资源完整性度量协议

A Protocol of Integrity Measurement of IaaS Resource for Users
原文传递
导出
摘要 提出一种IaaS(infrastructure as a service)完整性度量协议,该协议允许租户主动发起对IaaS资源的度量和验证,使租户能够检测其自身资源的完整性状态,增强IaaS资源状态的可见性.利用SVO逻辑对协议的安全性、完备性进行了分析,并搭建实验平台对协议的抗攻击能力和时间性能进行了验证.分析和实验证明,该协议能够抵御重放攻击、假冒攻击等多种形式的攻击,同时协议的执行耗时不会影响租户的正常使用体验. This paper presents a protocol of integrity measurement of IaaS resource. It allows users to launch a measurement and verification of their IaaS sources ,which makes IaaS integrity state more visible to users. The protocol is analyzed by SVO logics and verified by an experiment. The protocol is proved to meet the goals and resist many attacks and the experiment results show that the protocol executes in a very short time which cannot have much affect on user experience.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2014年第5期386-392,共7页 Journal of Wuhan University:Natural Science Edition
基金 国家重点基础研究发展计划(973)项目(2014CB340600) 国家自然科学基金重点项目(61332019) 国家自然科学基金(61173138 61272452 61103220) 湖北省重点新产品新工艺研究开发项目(2012BAA03004) 华为研究基金(YB2012120174 YB2013110084)资助项目
关键词 IAAS 资源完整性 度量 协议 IaaS(infrastructure as a service) integrity measure protocol
  • 相关文献

参考文献18

  • 1Mell P,Grance T.The NIST definition of cloud computing(draft)[J/OL].http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf.
  • 2Jensen M,Schwenk J,Gruschka N,et al.On technical security issues in cloud computing[C]//CLOUD’09,IEEE International Conference on Cloud Computing,Los Angeles:IEEE,2009:109-116.
  • 3Chen D,Zhao H.Data security and privacy protection issues in cloud computing[C]//2012 International Conference on Computer Science and Electronics Engineering(ICCSEE),Los Angeles:IEEE,2012:647-651.
  • 4Subashini S,Kavitha V.A survey on security issues in service delivery models of cloud computing[J].Journal of Network and Computer Applications,2011,34(1):1-11.
  • 5Santos N,Gummadi K P,Rodrigues R.Toward strusted cloud computing[C]//Proceedings of the2009 conference on Hot Topics in Cloud Computing,Berkeley:USENIX Association,2009:Article No.3.
  • 6Khan I,Rehman H,Anwar Z.Design and deployment of a trusted eucalyptus cloud[C]//2011 IEEE International Conference on Cloud Computing,Washington D C:IEEE Computer Society,2011:380-387.
  • 7Azab A M,Ning P,Wang Z,et al.HyperSentry:enabling stealthy in-context measurement of hypervisor integrity[C]//Proceedings of the 17th ACM conference on Computer and Communications Security,New York:ACM,2010:38-49.
  • 8Bertholon B,Varrette S,Bouvry P.Certicloud:A novel TPM-based approach to ensure cloud IaaS security[C]//2011 IEEE International Conference on Cloud Computing.Los Angeles:IEEE,2011:121-130.
  • 9卿斯汉.安全协议的设计与逻辑分析[J].软件学报,2003,14(7):1300-1309. 被引量:69
  • 10陈丹伟,黄秀丽,孙国梓.基于SVO逻辑的云服务安全形式化分析[J].小型微型计算机系统,2010,31(12):2438-2441. 被引量:4

二级参考文献37

  • 1黎波涛,罗军舟.不可否认协议时限性的形式化分析[J].软件学报,2006,17(7):1510-1516. 被引量:13
  • 2卿斯汉.认证协议的形式化分析[J].软件学报,1996,7(A00):107-114. 被引量:7
  • 3Ian Foster,Yong Zhao.Cloud computing and grid computing 360-degree compared[C].2008 Grid Computing Environments Workshop,IEEE,Austin,Texas,12-16,2008,1-10.
  • 4Rajkumar Buyya,Chee Shin Yeo,Srikumar Venugopal.Market-oriented cloud computing:vision,hype,and reality for delivering IT services as computing utilities[C].Proc.of 10th IEEE Conference on HPCC'08,IEEE,Dalian,China,25-27 Sept.2008,5-13.
  • 5OASIS Standard.Web services security:SOAP message security1.1(WS-Security 2004)[EB/OL].http://does.oasis-open.org/wss/v1.1/.1 February 2006.
  • 6Wang Lv.Security model and specifications for web services[C].China Education INFO,2004,10,24-26.
  • 7OASIS Standard.Assertions and protocols for the OASIS security assertion markup language(SAML)V2.0[EB/OL].http://docs.oasis-open.org/security/saml/v2.0/,2005-03.
  • 8W3C Recommendation.XML key management specification(XKMS2.0)[EB/OL].http://www.w3.org/TR/2002/RECxmlenc-core-20021210/,2002-12-10.
  • 9Jaehong Park,Ravi Sandhu.Towards usage control models:beyond traditional access control[C].SACMAT02,June 3-4,2002,Monterey,California,USA,ACM.
  • 10Henry Bequet.Wei Hai-ping,Yu xiao-fei,et al.Java SOAP programming[M].Beijing:Publishing House of Electronics Industry,2002.

共引文献99

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部