期刊文献+

信息不对称视角下数据安全对中小企业云计算采纳影响的动态博弈 被引量:4

Dynamic game of cloud computing adoption for the small and medium-sized enterprises under the influence of data security from the perspective of information asymmetry
下载PDF
导出
摘要 云计算为广大中小企业的信息化带来优势的同时也带来数据安全威胁,中小企业和云服务提供商在云计算数据安全领域存在典型的信息不对称现象。提出数据安全影响中小企业云计算采纳的不完全信息动态博弈模型,通过多阶段博弈来分析数据安全对中小企业云计算采纳的影响,分析博弈模型均衡下中小企业和云服务提供商的策略组合,并给出减少中小企业云计算数据安全信息不对称的补偿估算过程。研究表明,通过市场补偿,中小企业和云服务提供商都致力于减少云计算数据安全的信息不对称,从而降低数据安全对中小企业采纳云计算的影响。 Cloud computing brings not only advantages, but also data security threats for the informatization of the small and medi- um-sized enterprises. Typical information asymmetry consists in the data security information of cloud computing between small and medium-sized enterprises and cloud service providers, presents a dynamic game with incomplete information model of cloud computing adoption of the small and medium-sized enterprises produced by data security, analyzes the effect on cloud computing adoption strategies of small and medium-sized enterprises given rise to by data security through the multi stage game, probes into the strategy combination under game equilibrium between the small and medium-sized enterprises and cloud service providers, gives the estimating process of compensation about removing cloud computing data security information asymmetry. In order to cut down the influence which is led to by data security toward cloud computing adoption of the small and medium-sized enterprises and lessen information asymmetry of data security with regard to cloud computing market for the small and medium-sized enterpri- ses, the study states small and medium-sized enterprises and cloud service providers focus on reducing the information asymmetry about cloud computing data security through the market compensation, this helps to reduce the influence caused by data security for the small and medium-sized enterprises adopting cloud computing.
出处 《现代制造工程》 CSCD 北大核心 2016年第6期40-46,共7页 Modern Manufacturing Engineering
基金 江苏高校哲学社会科学研究资助项目(2015SJB852) 国家自然科学基金重点项目(71331003) 国家自然科学基金面上项目(71471078 71271104) 江苏科技大学国家自然科学基金前期预研项目(633041303) 江苏科技大学研究生科技创新计划资助项目(YCX14B-01) 江苏省2015年度普通高校研究生创新计划项目(SJZZ15_0139)
关键词 云计算 数据安全 不完全信息动态博弈 信息不对称 cloud computing data security dynamic game with incomplete information information asymmetry
  • 相关文献

参考文献31

  • 1MICHAEL Armbrust, ARMANDO Fox, REAN Griffith, et al. A view of cloud computing [ J ]. Communications of the ACM,2010,53(4) :50 -59.
  • 2杨善林,罗贺,丁帅.基于云计算的多源信息服务系统研究综述[J].管理科学学报,2012,15(5):83-96. 被引量:86
  • 3LEENA Jain, SUSHIL Bhardwaj. Enterprise Cloud Computing: Key Considerations for Adoption[ J ]. International Journal of Engineering and Information Technology ,2010,2(2) : 113 - 117.
  • 4DIMITRIOS Zissis, DIMITRIOS Lekkas. Addressing cloud computing security issues [ J ]. Future Generation Computer Systems ;2012,28 (3) :583 - 592.
  • 5LIN Angela,CHEN Nan-Chou . Cloud computing as an inno- vation : Percepetion, attitude, and adoption [ J ]. International Journal of Information Management, 2012,32 (6) : 533 - 540.
  • 6杨健,汪海航,王剑,俞定国.云计算安全问题研究综述[J].小型微型计算机系统,2012,33(3):472-479. 被引量:92
  • 7HEIFER J, NICOLET M, Assessing the security risks of cloud computing [ R ]. Stanford, USA: Gartner, Inc. and/or its Affiliates,2008.
  • 8MURAT Kantarcioglu, ALAIN Bensoussan, SING Ru ( Ce- line) Hoe. Impact of Security Risks on Cloud Computing A- doption. Forty-Ninth Annual Allerton House [ C]. UIUC, Il- linois, USA: IEEE Press ,2011.
  • 9WANG C, WANG Q, REN K, et al, Privacy-preserving public auditing for data storage security in cloud computing. INFO- COM,2010 Proceedings IEEE [ C]. San Diego, CA: IEEE Press ,2010.
  • 10WANG Q, WANG C, LI J, et al. Enabling Public Verifiabil- ity and Data Dynamics for Storage Security in Cloud Com- puting . In Proceedings of ESORICS 2009 [ C ]. Saint Malo, France : Springer-Verlag,2009.

二级参考文献129

  • 1黄志刚.中小企业分类方法新探[J].科技进步与对策,2004,21(5):144-145. 被引量:3
  • 2李伟超.我国中小型企业信息化模式问题研究[J].情报科学,2006,24(2):200-203. 被引量:17
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 5Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 6Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 7Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 8Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 9Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 10Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.

共引文献1302

同被引文献41

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部