期刊文献+

云计算环境下基于信任的虚拟机可信证明模型 被引量:2

Trust based trustworthiness attestation model of virtual machines for cloud computing
下载PDF
导出
摘要 为了解决云计算环境下虚拟机可信证明存在可信证据来源不足和证明过程容易暴露节点隐私信息的缺陷,将信任管理与群签名机制相结合,提出了一种基于信任的虚拟机可信证明模型,并给出了模型的结构和虚拟机节点总体信任度的计算方法.首先,通过综合直接信任度和反馈信任度,得到虚拟机节点的整体可信度,并据此识别出恶意的虚拟机节点;然后,采用基于群签名的证据保护方法,通过检验虚拟机节点的签名来考察其可信性,以保护节点隐私的同时降低节点遭受攻击的可能性.实验结果表明,该模型在虚拟机运行过程中可以有效识别出恶意节点并保护节点的隐私信息. The trust evidence sources of cloud computing nodes are usually insufficient, and during the attestation process sensitive information of the involved nodes is easily exposed. To solve these problems, a trust-based trustworthiness attestation model (TBTAM) for virtual machine is presented by combining trust management and group signature scheme. The TBTAM architecture and the calculation method of the trustworthiness of virtual machine nodes are put forward. First, considering both direct trustworthiness and feedback trustworthiness, the trustworthiness of virtual machine nodes is comprehensively evaluated, and malicious nodes are identified. Then, by the group-signaturebased method for proof protection, the trustworthiness of tenants is verified by validating the signatures of nodes, which protects the privacy of nodes and reduces the attack possibilities. The experimental results show that the model can effectively identify malicious nodes and protect privacy of virtual machine nodes during the running process.
出处 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2015年第1期31-35,共5页 Journal of Southeast University:Natural Science Edition
基金 江苏省自然科学基金资助项目(BK2011115 BK20131069)
关键词 云计算 信任管理 虚拟机 群签名 cloud computing trust management virtual machine group signature
  • 相关文献

参考文献13

  • 1冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1067
  • 2黄瑛,石文昌.云基础设施安全性研究综述[J].计算机科学,2011,38(7):24-30. 被引量:16
  • 3Trusted Computing Group. TCG specification architecture overview, version 1.4[EB/OL].(2007-08)[2014-06-25]. http://www.trustedcomputinggroup.org/resources/tcg-architecture-overview-version-14/.
  • 4Santos N, Gummadi K P, Rodrigues R. Towards trusted cloud computing[C]//Proceedings of 2009 Conference on Hot Topics in Cloud Computing. San Diego, CA, USA,2009:14-19.
  • 5Krautheim F J. Private virtual infrastructure for cloud computing[C]//Proceedings of 2009 Workshop on Hot Topics in Cloud Computing. San Diego, CA, USA,2009:1-5.
  • 6Krautheim F J, Phatak D S, Sherman A T. Introducing the trusted virtual environment module: a new mechanism for rooting trust in cloud computing[C]//2010 Trust and Trustworthy Computing. Berlin, Germany,2010:211-227.
  • 7Schiffman J, Moyer T, Vijayakumar H, et al. Seeding clouds with trust anchors[C]//Proceedings of 2010 ACM Workshop on Cloud Computing Security Workshop. New York, USA,2010:43-46.
  • 8Neisse R, Holling D, Pretschner A. Implementing trust in cloud infrastructures[C]//Proceedings of 2011 IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. Newport Beach, CA, USA,2011:524-533.
  • 9Zhao Y, Cong P Y. On remote attestation based on trusted cloud computing[J]. Journal of Applied Sciences,2013,13(22):5092-5098.
  • 10Ateniese G, Camenisch J, Joye M, et al. A practical and provably secure coalition-resistant group signature scheme[C]//The 20th Annual International Cryptology Conference. Santa Barbara, CA, USA,2000:255-270.

二级参考文献127

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2王庆波,金漳,何乐,等.虚拟化与云计算[M].北京:电子工业出版社,2010.
  • 3Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 4Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 5Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 6Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 7Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 8Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 9Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 10Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.

共引文献1092

同被引文献19

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部