期刊文献+

数据集中环境下云计算中私密信息安全攻防方法 被引量:2

Data Set in the Cloud Computing under the Environment of Private Information Security Defense Method Research
下载PDF
导出
摘要 数据集中环境下不确定性较高,当前私密信息安全攻防方法不能有效解决攻击意图和策略随机性高的问题,无法保证私密信息的安全性。为此,提出一种新的数据集中环境下云计算中私密信息安全攻防方法,将云计算平台划分成应用层、应用接口层和基础层,给出详细结构。依据博弈模型的要素,建立开放式云计算网络攻防博弈的一般模型。介绍了云计算中私密信息安全攻防收益量化的相关定义,把私密信息安全攻防对抗看作零与博弈,在某种博弈状态下,获取私密信息攻击者和私密信息防御者的期望收益函数,令攻击者期望收益最小,防御者期望收益达到最大化,以获取私密信息安全攻防双方的最佳策略。实验结果表明,所提方法能够有效保证云计算中私密信息的安全性。 The data set under environmental uncertainty is higher,the current private information security attack and defense methods cannot effectively solve the problem of high attack intention and strategy of randomness,there is no guarantee that the security of private information. For this,a new data set was put forward in the cloud computing under the environment of private information security defense method,applied cloud computing platform into the application layer,interface layer and base layer,and give the detailed structure. Based on the elements of a game model,the general model of an open cloud computing network attack and defense game was established. Private information security defense gains in cloud computing are introduced quantitative definition of the private information security defence is regarded as zero and game,in some kind of game state,access to private information of attackers and defenders private information expected revenue function,make the attacker expected return to a minimum,the defender expect profits to maximize,to obtain private information security attack and defense both sides of the optimal strategy. The experimental results show that the proposed method can effectively ensure the security of private information in the cloud.
作者 郭良
出处 《科学技术与工程》 北大核心 2017年第24期242-246,共5页 Science Technology and Engineering
基金 山东省高等学校科技计划课题(J15LN78)资助
关键词 数据集中环境 云计算 私密信息 安全攻防 data set environment cloud computing private information security defense
  • 相关文献

参考文献12

二级参考文献123

  • 1孙瑞锋,赵政文.基于云计算的资源调度策略[J].航空计算技术,2010,40(3):103-105. 被引量:43
  • 2蔚赵春,凌鸿.我国商业银行私有云建设研究[J].浙江金融,2012(5):59-62. 被引量:6
  • 3肖艳文,王金宝,李亚平,高宏.云计算系统中能量有效的数据摆放算法和节点调度策略[J].计算机研究与发展,2013,50(S1):342-351. 被引量:9
  • 4伍之昂,罗军舟,宋爱波.基于QoS的网格资源管理[J].软件学报,2006,17(11):2264-2276. 被引量:21
  • 5刘高嵩 张传昌.网格环境下统一身份认证的研究.网络安全技术与应用,2008,(10):19-21.
  • 6Armbrust M, Fox A, Griffith R. A view of cloud computing[J]. Communications of the ACM, 2010,53(4): 50-58.
  • 7Vaquero L, Rodero L, Caceres J, et al. A break in theclouds: Towards a cloud definition [J]. ACM SIGCOMMComputer Communication Review, 2009,39(1) :-5055.
  • 8Wickremasinghe B,Calheiros R, Buyya R. Cloud analyst : Acloudsim-based visual modeller for analysing cloud computingenvironments and applications [C]//Proc of the 24th IEEEInt Conf onAdvanced Information Networking andApplications (AINA 2010). Piscataway, NJ: IEEE, 2010 :446-452.
  • 9Rodrigo N,Calheiros L, Rajiv R. Cloudsim: A toolkit formodeling and simulation of cloud computing environmentsand evaluation of resource provisioning algorithms [J].Software Practice and Experience(SPE),2011,41(1) : 23-50.
  • 10Tian Guanhua,Meng Dan. Failure rules based node resourceprovision policy for cloud computing [C]//Proc of 2010IEEEInt Symp on IntelligentSignalProcessing. Piscataway, NJ :IEEE, 2010: 397-404.

共引文献95

同被引文献22

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部