期刊文献+

基于LabWindows的云计算环境安全框架研究 被引量:3

Labwindows-based Cloud Computing Environment Security Framework Research
下载PDF
导出
摘要 为保证云计算环境下网络数据传输过程中数据的保密性、完整性以及流畅性,需要对云计算环境安全框架进行研究,目前的云计算环境安全框架系统设计方法主要是利用恩尼格码加密技术和分割二进制码技术实现当前云计算环境下网络数据的安全传输与通信;存在网络节点能量开销较大,且数据安全性判断平均准确率较低的问题;为提高云计算环境下网络数据的安全性判断准确率,避免网络节点的能量浪费,提出一种基于LabWindows的云计算环境安全框架系统设计方法,首先运用LabWindows对云计算环境下的数据进行采集,然后利用证据信任度求取算法对云计算环境下的网络数据安全性进行判断;其次将异常漂移检测器与恶意节点ID号过滤器有机结合,剔除云计算环境中的恶意攻击数据;再利用数字证书对云计算环境下的客户端与服务器进行身份认证;最后利用LabWindows平台创建云计算环境安全框架模型;实验结果证明,利用该方法能够节省云计算环境下网络节点的能量开销,对网络数据安全性判断准确率较高。 In order to ensure that cloud computing environment in the process of the network data transmission data confidentiality, in tegrity and fluency, need security framework for research on cloud computing environment, the current cloud computing environment security framework system design method is mainly use the Enigma code encryption technology and segmentation binary code technology to realize the current cloud computing environment the security of the network data transmission and communication. The problem is that the network node has a high energy cost and the average accuracy of the data security is low. In order to enhance the security of network data in cloud computing environment judgment accuracy, avoid network node energy waste, presents a cloud computing environment based on LabWin dows security framework system design method, first using LabWindows to cloud computing environment data acquisition, and then use evi dence credibility calculating algorithm in cloud computing environment of the network data security for judgment ; The second is to combine the anomalous drift detector with the malicious node--Id filter, which removes the malicious attack data from the cloud computing environ ment; Using digital certificates to authenticate clients and servers in the cloud computing environment; Finally, use the LabWindows plat form to create a cloud computing environment security framework model. The experimental results show that the nlethud can save the energy expenditure of network nodes in cloud computing environment, and the accuracy of network data security is higher.
出处 《计算机测量与控制》 2018年第2期142-145,149,共5页 Computer Measurement &Control
基金 广东省大数据分析与处理重点实验室开放基金项目资助(2017013) 广东教育学会"十三五"教育科研重点课题(GDESH13010)
关键词 基于LabWindows 云计算环境 安全框架 based on LahWindows cloud computing environment security framework
  • 相关文献

参考文献10

二级参考文献103

  • 1刘奇旭,张翀斌,张玉清,张宝峰.安全漏洞等级划分关键技术研究[J].通信学报,2012,33(S1):79-87. 被引量:36
  • 2余勇,林为民.基于等级保护的电力信息安全监控系统的设计[J].计算机科学,2012,39(S3):440-442. 被引量:20
  • 3肖美华,薛锦云.基于SPIN/Promela的并发系统验证[J].计算机科学,2004,31(8):201-203. 被引量:20
  • 4陈秀真,郑庆华,管晓宏,林晨光.层次化网络安全威胁态势量化评估方法[J].软件学报,2006,17(4):885-897. 被引量:341
  • 5向馗,蒋静坪.时间序列的符号化方法研究[J].模式识别与人工智能,2007,20(2):154-161. 被引量:23
  • 6汪小帆,李翔,陈关荣.复杂网络理论及应用[M].北京:清华大学出版社,2006.
  • 7BASS T, GRUBER D. A glimpse into the future of ID [ EB/OL]. (1999). http://www, usenix, org/publications/login/1999/29/fea- tures/future, html.
  • 8MAN Da-peng, WANG Yan, WU Yong, et al. A combined predic- tion method for network security situation [ C ]//Proc of International Conference on Computational Intelligence and Software Engineering. [ S. 1. ] : IEEE Press ,2010 : 1-4.
  • 9DONG Jian-feng. The building of network security situation evaluation and prediction model based on grey theory[ C ]//Proe of International Conference on Challenges in Environmental Science and Computer Engineering. [ S. 1. ] : IEEE Press ,2010:401-404.
  • 10CHEN Jun, TU Xiong-gang. Network security risk assessment based on support vector machine [ C ]//Proc of the 3rd IEEE International Conference on Communication Software and Networks. [ S. 1. ] : IEEE Press ,2011 : 184-187.

共引文献210

同被引文献16

引证文献3

二级引证文献20

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部