期刊文献+

基于层次变权的云服务可靠性评估模型 被引量:3

Reliability evaluation model of cloud services based on variable weights
原文传递
导出
摘要 针对当前可靠性评估模型解决动态、复杂、多变的云服务环境下支持可靠云服务协同应用中存在的不足,提出基于层次变权的云服务可靠性评估模型.根据云服务IaaS层、PaaS层和SaaS层应用的特点,借鉴AHP层次变权的思想,分析了层次云服务的失效关联关系,给出了利用三角模糊数的相关原理量化可靠性权重值的方法,基于互补判断矩阵给出了权重值的排序求解公式;结合云服务系统中各层次云服务的实时在线监测可靠性数据,给出了层次云服务可靠性评估计算公式.该模型计算量小,简单易行,操作性强,能对云服务可靠性进行合理、动态评估,具有较好的应用推广价值. In view of the drawbacks in the reliable cloud service coordinate application provided by the current reliability evaluation model, which is under the dynamic, complex and changeable cloud service conditions, a reliability evaluation model of cloud service based on variable weights is proposed in this paper. According to the application characteristics of IaaS, PaaS and SaaS cloud service, the reliability evaluation index stratification architecture of cloud service is established, and the hierarchy analytic structure of the reliability model is built. In reference to the thought of AHP variable weights, the reliability importance weights value between each layer services is given a quantitative analysis using the related principles of triangle fuzzy number, and a new weights value order calculating method is given out by the triangle fuzzy complementary judgment matrix. In addition, combined with the online monitoring reliability data of cloud service system in each level of cloud services, the reliability evaluation calculating formulae of cloud services are put forward. Comparing to others, the model which presented in this paper lies in the smaller computation, simple implement, strong practical, and Call evaluate the reliability of cloud service reasonably and dynamically, it is worth applying and popularizing.
出处 《系统工程理论与实践》 EI CSSCI CSCD 北大核心 2014年第12期3212-3220,共9页 Systems Engineering-Theory & Practice
基金 武器装备预研重点基金(9140A15060311JB5201)
关键词 可靠性 云服务 层次变权 动态评估 三角模糊数 reliability evaluation cloud services variable weights dynamic evaluation triangle fuzzy
  • 相关文献

参考文献13

  • 1Armbrust M, Fox A, Griffith R, et al. Above the clouds: A Berkeley view of cloud computing[R]. EECS Department, University of California, Berkeley, 2009.
  • 2Li D Y, Lin R H. Cloud computing technology development report[R]. Beijing: Science Press, 2011.
  • 3Lin M, Chang M, Chen D. Distributed-program reliability analysis: Complexity and fficient algorithms[J]. IEEE Transactions on Reliability, 1999, 48(1): 87-95.
  • 4Staaty T L. The analytic hierarchy process[M]. New York: McGraw, 1980.
  • 5Yu B, Wang F M, Sun H C. Systems engineering theories[M]. Hefei: University of Science and Technology of China Press, 2009.
  • 6冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1072
  • 7Wang P Z. Fuzzy sets and random colony[M].Beijing: Beijing Normal University Press, 1985.
  • 8李洪兴.因素空间理论与知识表示的数学框架(Ⅷ)─—变权综合原理[J].模糊系统与数学,1995,9(3):1-9. 被引量:266
  • 9Xu J P, Wu W. Multiple attribute decision making theory and methods[M]. Beijing: Tsinghua University Press, 2006: 124-125.
  • 10Wang Y M. An overview of priority methods of comparison matrix[J]. Journal of Management Sciences in China, 1995, 5(3): 101-114.

二级参考文献40

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2纪树新.[D].杭州大学,1995.
  • 3Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 4Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 5Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 6Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 7Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 8Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 9Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 10Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.

共引文献1659

同被引文献27

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部