期刊文献+

一种基于AIFS权重计算的信任模型的研究 被引量:1

Research on a Trust Model Based on AIFS Weighting
下载PDF
导出
摘要 随着私有云和公共云的广泛使用,其安全性成为必须解决的首要问题。现有研究表明,安全问题与信任问题密不可分,选择可信的云服务提供商是行之有效的方法,而信任模型则是研究热点。文章利用信任度量模型与模糊集合理论来刻画相关的安全问题。考虑到AIFS模糊集合能较好地处理问题的模糊性与不确定性,文章提出一种基于AIFS最优权重计算的信任模型,该模型通过对服务指标向量进行最优权重方案选择,优化了用户对云服务提供商评价的权重,使得用户评价云服务提供商服务时结果更为客观。文章针对可信云服务提供商选择问题给出了仿真实验,实验结果表明文章方法具有较好的应用价值。 With the wide use of private and public clouds, their securities are primary issues that must be solved. Existing research shows that the safety problem is closely connected with mast problem. Selecting a credible cloud service provider is an effective way, and trust model is a hot research topic. Based on trust measurement model and the fuzzy set theory, this paper depicts the related security problems. Considering the AIFS can better deal with the problems of fuzziness and uncertainty, this paper proposes a mast model based on the AIFS optimal weighting. By selecting the optimal weight scheme of service index vectors, the model optimizes the user's evaluation weights to the cloud service provider, which makes the user's evaluation to the cloud service provider is more objective. The paper provides a simulation experiment to the selection of trusted cloud service providers. The experimental results show that this method has good application vatue.
出处 《信息网络安全》 2016年第12期8-12,共5页 Netinfo Security
基金 国家自然科学基金[71231003] 福建省科技厅工业引导性(重点)项目[2015H0020] 福建省科技厅区域发展项目[2015H4005] 福州市科技计划项目[2014G75]
关键词 可信云服务 最优选择 信任模型 AIFS 权重计算 trusted cloud services optimal selecting trust model AIFS weight calculation
  • 相关文献

参考文献6

二级参考文献63

  • 1张琳,饶凯莉,王汝传.云计算环境下基于评价可信度的动态信任评估模型[J].通信学报,2013,34(S1):31-37. 被引量:6
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 4Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 5Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 6Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 7Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 8Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 9Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 10Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.

共引文献1313

同被引文献5

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部