期刊文献+

一种融合租户感知的云服务可信评估方法

An Evaluation Method for Credibility of Cloud Services Converged by Tenants Perception
下载PDF
导出
摘要 针对云平台遭遇恶意入侵和云服务商对数据的不透明处理可能导致云服务不可信的问题,迫切需要建立客观有效方法来评估云服务的可信性。从租户感知维度,研究云服务可信评估方法,结合云平台可信评估结果,给出不同维度可信性评估结论。分析表明所提方法具有较好的实用性。云服务可信评估关键技术突破,为云可信评测提供技术支撑。 In view of the problems of the cloud service may not be trusted as current cloud computing platform may be encountered malicious intrusion and the cloud service providers may process data opaquely,it is urgent to establish an objective and effective method to assess whether the cloud service is credible.Study the assessment of credibility of the cloud services from tenants'perception,and given different dimensions of credibility assessment conclusions of the cloud services combined with the credibility evaluation of cloud platform.Analysis result verifies the practicality of the proposed method.The breakthroughs of key technologies of credible assessment for the cloud services provide technical support for reliable testing and evaluation for the cloud platform.
作者 汪京培 朱茗 Wang Jing-pei;Zhu Ming(China CEPREI Laboratory,Guangdong Guangzhou 510610)
机构地区 中国赛宝实验室
出处 《电子质量》 2017年第8期27-31,共5页 Electronics Quality
关键词 云服务 可信性 租户感知 可信评估 Cloud service credibility tenants' perception credible assessment
  • 相关文献

参考文献1

二级参考文献24

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1069

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部