期刊文献+

A Privacy-Based SLA Violation Detection Model for the Security of Cloud Computing 被引量:4

A Privacy-Based SLA Violation Detection Model for the Security of Cloud Computing
下载PDF
导出
摘要 A Service Level Agreement(SLA) is a legal contract between any two parties to ensure an adequate Quality of Service(Qo S). Most research on SLAs has concentrated on protecting the user data through encryption. However, these methods can not supervise a cloud service provider(CSP) directly. In order to address this problem, we propose a privacy-based SLA violation detection model for cloud computing based on Markov decision process theory. This model can recognize and regulate CSP's actions based on specific requirements of various users. Additionally, the model could make effective evaluation to the credibility of CSP, and can monitor events that user privacy is violated. Experiments and analysis indicate that the violation detection model can achieve good results in both the algorithm's convergence and prediction effect. A Service Level Agreement(SLA) is a legal contract between any two parties to ensure an adequate Quality of Service(Qo S). Most research on SLAs has concentrated on protecting the user data through encryption. However, these methods can not supervise a cloud service provider(CSP) directly. In order to address this problem, we propose a privacy-based SLA violation detection model for cloud computing based on Markov decision process theory. This model can recognize and regulate CSP's actions based on specific requirements of various users. Additionally, the model could make effective evaluation to the credibility of CSP, and can monitor events that user privacy is violated. Experiments and analysis indicate that the violation detection model can achieve good results in both the algorithm's convergence and prediction effect.
出处 《China Communications》 SCIE CSCD 2017年第9期155-165,共11页 中国通信(英文版)
基金 supported in part by National Natural Science Foundation of China (NSFC) under Grant U1509219 and 2017YFB0802900
关键词 SECURITY and PRIVACY markovchain cloud computing REPUTATION manage-ment SLA security and privacy markov chain cloud computing reputation management SLA
  • 相关文献

参考文献3

二级参考文献24

共引文献62

同被引文献8

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部