期刊文献+

Trusted Data Acquisition Mechanism for Cloud Resource Scheduling Based on Distributed Agents 被引量:4

基于分布式代理的云资源调度中可信数据获取机制(英文)
在线阅读 下载PDF
导出
摘要 Goud computing is a new paradigm in which dynamic and virtualized computing resources are provided as services over the Internet. However, because cloud resource is open and dynamically configured, resource allocation and scheduling are extremely important challenges in cloud infrastructure. Based on distributed agents, this paper presents trusted data acquisition mechanism for efficient scheduling cloud resources to satisfy various user requests. Our mechanism defines, collects and analyzes multiple key trust targets of cloud service resources based on historical information of servers in a cloud data center. As a result, using our trust computing mechanism, cloud providers can utilize their resources efficiently and also provide highly trusted resources and services to many users. Cloud computing is a new paradigm in which dynamic and virtualized computing resources are provided as services over the Internet. However, because cloud resource is open and dynamically configured, resource allocation and scheduling are extremely important challenges in cloud infrastructure. Based on distributed agents, this paper presents trusted data acquisition mechanism for efficient scheduling cloud resources to satisfy various user requests. Our mechanism defines, collects and analyzes multiple key trust targets of cloud service resources based on historical information of servers in a cloud data center. As a result, using our trust computing mechanism, cloud providers can utilize their resources efficiently and also provide highly trusted resources and services to many users.
出处 《China Communications》 SCIE CSCD 2011年第6期108-116,共9页 中国通信(英文版)
基金 supported by the National Basic Research Program of China (973 Program) (No. 2012CB821200 (2012CB821206)) the National Nature Science Foundation of China (No.61003281, No.91024001 and No.61070142) Beijing Natural Science Foundation (Study on Internet Multi-mode Area Information Accurate Searching and Mining Based on Agent, No.4111002) the Chinese Universities Scientific Fund under Grant No.BUPT 2009RC0201
关键词 cloud computing trusted computing distributed agent resource scheduling cloud computing trusted computing distributed agent resource scheduling
  • 相关文献

参考文献20

  • 1王堃,吴蒙.Improved Secure Trust-based Location-Aided Routing Model for MANETs[J].China Communications,2011,8(3):154-162. 被引量:1
  • 2李小勇,桂小林.A Comprehensive and Adaptive Trust Model for Large-Scale P2P Networks[J].Journal of Computer Science & Technology,2009,24(5):868-882. 被引量:2
  • 3Marcin Dabrowski,Piotr Pacyna.Overview of Identity Management[J].China Communications,2008,5(4):129-142. 被引量:2
  • 4TIAN Liqin,LIN Chuang.Evaluation of User Behavior Trust in Cloud Computing. Proceedings of the 2010 Internation- al Conference on Computer Application and System Modeling (ICCASM 2010), 22-24 Oct. 2010 . 2010
  • 5LI H,SINGHAL M.Trust management in distributed sys- tems. IEEE Computer . 2007
  • 6JI M,ORGUN MA.Trust management and trust theory revi- sion. IEEE Transactions on Systems Man and Cybernetics . 2006
  • 7XIAO Yuelei,,WANG Yumin,PANG Liao-Jun.A Mutual Integrity Reporting Scheme for Remote Attestation. China Communications . 2010
  • 8THEODORAKOPOULOS G,BARAS JS.On trust models and trust evaluation metrics for ad-hoc networks. IEEE Journal on Selected Areas in Communications . 2006
  • 9SUN Y,YU W,HAN Z, et al.Information theoretic frame- work of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications . 2006
  • 10LIANG Z,SHI W.Enforcing cooperative resource sharing in untrusted Peer-to-Peer environments. Journal of Mobile Networks and Applications . 2005

二级参考文献36

  • 1李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521. 被引量:138
  • 2李小勇,桂小林,赵娟,冯大鹏.一种可扩展的反馈信任信息聚合算法[J].西安交通大学学报,2007,41(8):879-883. 被引量:10
  • 3孙知信,唐益慰.基于全局信任度的多层分组P2P信任模型[J].通信学报,2007,28(9):133-140. 被引量:21
  • 4Tom Scavo,Scott Cantor.“Shibboleth Architecture.Technical Overview”. .
  • 5Joaquin Miller.“Yadis Specification”,version 1.0. www.yadis.org .
  • 6Rick Kuhn,Susan Landau,Ramaswamy Chandramouli.User-Centric Identity Management. IEEE Security and Privacy . 2007
  • 7TMiyata,,Y.Koga,,P.Madesen,,S.Adachi,,Y.Tsuchiya,,Y.Sakamoto,,K.Takahashi.A survey on Identity Management Protocols and Standards. IEICE Transactions on Information and Systems . 2006
  • 8Phil Windley.Digital Identity. . 2005
  • 9Digital Identity Management.A Critical Link to Service Suc- cess. .
  • 10Liberty ID-WSD Service - federated social identity. .

共引文献2

同被引文献26

  • 1田文洪,赵勇,仲元椋,徐敏贤,景晨.Dynamic and Integrated Load-Balancing Scheduling Algorithm for Cloud Data Centers[J].China Communications,2011,8(6):117-126. 被引量:6
  • 2HAJJAT M, SUN Xin, SUNG Y E, et al. Cloudward Bound: Planning for Beneficial Migration of Enterprise Applications to the Cloud[C]// Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications: August 30-September 3, 2010. New Delhi, India. ACM Press, 2010: 243-254.
  • 3LI Haitao, ZHONG Lili, LIU Jiangchuan, et al. Cost-effective Partial Migration of VoD Services to Content Clouds[Cl// Proceedings of 2011 4th IEEE International Conference on Cloud Computing (CLOUD): July 4-9, 2011. Washington DC, USA. IEEE Press, 2011: 203-210.
  • 4Electrical Engineering and Computer Sciences Department, University of California at Berkeley. Above the Clouds: A Berkeley View of Cloud Computing[R]. Berkeley, CA, US, 2009.
  • 5XIAO Yanping, LIN Chuang, JIANG Yinxin, et al. Reputation-Based QoS Provisioning in Cloud Computing via Dirichlet Multinomial Model [C]// Proceedings of 2010 IEEE International Conference on Communications (ICC): May 23-27, 2010. Cape Town, South Africa. IEEE Press, 2012: 1-5.
  • 6WANG Qian, REN Kui, MENG Xiaoqiao. When Cloud Meets eBay: Towards Effective Pricing for Cloud Computing[C]// Proceedings of 2012 Proceedings IEEE INFOCOM: March 25-30, 2012. Orlando, FL, USA. IEEE Press, 2012: 936-944.
  • 7SHARMA U, SHENOY P J, SAHU S, et al. Kingfisher: Cost-aware Elasticity in the Cloud[C]// Proceedings of 2011 Proceedings IEEE INFOCOM: April 10-15, 2011. Shanghai, China. IEEE Press, 2011: 206-210.
  • 8SEUNG Y, LAM T, LI L E, et al. Seamless Scaling of Enterprise Applications into The Cloud[C]// Proceedings of 2011 Proceedings IEEE INFOCOM: April 10-15, 2011. Shanghai, China. IEEE Press, 2011: 211-215.
  • 9ALICHERRY M, LAKSHMAN T V. Network Aware Resource Allocation in Distributed Clouds[C]// Proceedings of 2012 Proceedings IEEE INFOCOM: March 25-30, 2012. Orlando, FL, USA. IEEE Press, 2012: 963-971.
  • 10KIM K H, BELOGLAZOV A, UYVA R. Poweraware Provisioning of Virtual Machines for Real-Time Cloud Services[J]. Concurrency and Computation: Practice and Experience, 2011, 23(13): 1491-1505.

引证文献4

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部