期刊文献+

云环境下多副本审计策略研究

Research on Strategy of Auditing Replication in Cloud Environment
下载PDF
导出
摘要 针对云计算多副本审计中用户利益不能最大化的问题,基于博弈理论,建立了用户和CSP之间的博弈模型.分析了在不同条件下用户和CSP之间的最优策略,达到使用户利益最大化目的.根据Amazon S3提供的价格模型进行了仿真实验.实验结果表明,当错误率小于0.167%时,用户应选择非审计策略,当错误率大于0.167%时,用户应选择审计策略.该模型为用户提供了云计算环境下多副本审计最优策略的选择依据. For the problem that the user's interest cannot be maximized during replication auditing in cloud computing environment,based on the game theory,agame model was established between the user and CSP.The optimal strategy of user and CSP was analyzed under different conditions and the purpose of maximizing the interests of the user was achieved.The price model provided by Amazon S3 was used in the simulation experiment.The simulation results show that when the error rate is less than 0.167%,user should choose the non-audit strategy.When the error rate is greater than 0.167%,the user should choose audit strategy.The model provides reference for user and CSP in choosing the optimal strategies during replication auditing in cloud computing environment.
作者 柳妍珠 李治
出处 《中北大学学报(自然科学版)》 CAS 北大核心 2015年第5期540-544,共5页 Journal of North University of China(Natural Science Edition)
关键词 多副本 云审计 最优策略 博弈论 replication cloud auditing optimal strategy game theory
  • 相关文献

参考文献5

二级参考文献82

  • 1刘丽,杨扬,郭文彩,施水才.基于纳什均衡理论的网格资源调度机制[J].计算机工程与应用,2004,40(29):106-108. 被引量:5
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 4Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 5Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 6Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 7Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 8Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 9Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 10Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.

共引文献1110

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部