期刊文献+

云计算视角下可验证计算的分析研究

An Analysis and Study on Verifiable Computing from the Perspective of Cloud Computing
下载PDF
导出
摘要 云计算能否在未来的各个领域中被广泛运用,决定因素在于其可信度。可验证计算在检测云计算结果的可信度方面具有其独特优势。利用可验证计算协议可验证云服务器端所返回的数据是否正确,它成为实现云计算可信度的重要保障。文中在阐述可验证计算基本内容和相关设计原则的基础上,分析了可验证计算协议的一般流程、设计原则及计算模型,并结合基于交互系统的可验证计算协议分析,探讨在云计算视角下可验证计算的研究展望。 Whether cloud computing is widely used in the various fields in the future is determined by its credibility.Verifiable computing has its unique advantages in detecting the credibility of cloud computing results.Using a verifiable protocol to verify whether the data returned by the cloud server is correct,which is an important guarantee for th credibility of the cloud computing.In this paper based verification calculation of basic content and related design principles,the general process of verifiable computing,design principle and calculation model of verifiable computation protocol combined with protocol analysis calculation of interaction system are analyzed to explore the prospect of research on the verifiable computing from the perspective of computing in the cloud.
作者 张琳
出处 《长春工程学院学报(自然科学版)》 2018年第1期100-102,共3页 Journal of Changchun Institute of Technology:Natural Sciences Edition
基金 安徽省教学研究项目(2016jyxm1121) 安徽省质量工程项目(2016mooc320,2014sjjd036,2015mooc125) 芜湖职业技术学院自然科学项目(Wzyzr201716) 2016年度职业教育专业教学资源库项目(2016-B11)
关键词 云计算 可验证计算 编译 验证 cloud computing verifiable computing compilation verification
  • 相关文献

参考文献6

二级参考文献258

  • 1林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 2樊亚军,刘久文.TPM安全芯片设计与实现[J].信息安全与通信保密,2007,29(6):136-137. 被引量:5
  • 3张旻晋 桂文明 苏递生 等.从终端到网络的可信计算技术.信息技术快报,2006,4(2):21-34.
  • 4Garg V K.Elements of Distributed Computing.Wiley-IEEE Press,2002.
  • 5Foster I,Kesselman C,Tuecke S.The anatomy of the grid:Enabling scalable virtual organizations.International Journal of High Performance Computing Applications,2001,15(3):200-222.
  • 6Schoder D,Fischbach K.Peer-to-peer prospects.Communications of the ACM,2003,46(2):27-29.
  • 7Mell P,Grance T.The NIST definition of cloud computing (draft).NIST Special Publication,2011,800:145.
  • 8Almorsy M,Grundy J,Müller I.An analysis of the cloud computing security problem//Proceedings of the 2010 Asia Pacific Cloud Workshop,Collocated with APSEC2010.Sydney,Australia,2010:1-10.
  • 9Chen Y,Paxson V,Katz R H.What' s new about cloud computing security? University of California,Berkeley Report No.UCB/EECS 2010-5,January,2010.
  • 10Ristenpart T,Tromer E,Shacham H,et al.Hey,you,get off of my cloud:exploring information leakage in third-party compute clouds//Proceedings of the 16th ACM Conference on Computer and Communications Security.Chicago,USA,2009:199-212.

共引文献639

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部