期刊文献+

T-YUN:云提供商可信性审计与验证 被引量:1

T-YUN: Trustworthiness Audit and Verification of the Cloud Providers
在线阅读 下载PDF
导出
摘要 云计算被广泛认为是信息技术发展的必然趋势。然而,由于在云计算模式下用户失去了对托管在云端的数据和应用的直接控制能力,产生了云服务的可信性问题,严重影响了云计算与云服务的推广。文章设计实现了一种新的通过可信第三方TTP(Trusted Third Party)对云提供商可信性进行审计和验证的模型。为了防止TTP成为单点瓶颈或单点故障,通过云计算技术构建TTP云验证平台实现了原型系统,并对其进行定量测试、分析和评价。实验结果表明,T-YUN在有效验证可信性的同时没有引入过多的额外代价。 Cloud computing is broadly recognized as the trend of IT.However, in cloud computing mode, customers lose the direct control of their data and application outsourced to or hosted by the cloud providers, which leads to the trustworthiness issue of cloud services, hindering the widespread use of cloud computing.This paper designed and implemented a novel trust framework which involves a Trusted Third Party to audit and verify the trustworthiness of cloud providers. Moreover, in case of becoming the single point of failure or single point of performance bottleneck, this paper designed and implemented a cloud based TTP platform, which reflects idea of "The small cloud audits the big clouds. At the last, This paper implemented a prototype, and took a quantitative evaluation of the prototype. The experiments demonstrated that T-YUN brings little extra cost on the performance while provides trustworthiness guarantee.
机构地区 北京邮电大学
出处 《信息网络安全》 2012年第8期97-100,共4页 Netinfo Security
基金 国家自然科学基金[60273006]
关键词 云安全 可信 云提供商 可信性审计 cloud security trusted computing cloud provider trustworthiness audit
  • 相关文献

参考文献11

  • 1Michael Annbrust, Armando Fox, Rean Griffith, etc. A view of cloud computing[J]. Communications of the ACM, 2010, 53(04):50-58.
  • 2Y. Chen, V. Paxson, and R.H. Katz. What's New about Cloud Computing Security?[R]. EECS Dept., Univ. of California, Berkeley, UCB/EECS-2010-5, 2010.
  • 3R.K.L.Ko, P.Jagadpramana, M.Mowbray, S.Pearson, M.Kirchberg, Q.Liang, B.S.Lee, TmstCloud:A framework for accountability and trust in cloud computing[C]. 2nd IEEE World Congress on Services. Washington, DC: 2011. 584 - 588.
  • 4Fujitsu Research Institute. Personal Data in the Cloud: the importance of trust [EB/OL]. http://www.fujitsu.com/global/news/publications/ dataprivacy.html, 2012-07-12.
  • 5Wayne Jansen, Timothy Grance. Guidelines on Security and Privacy in Public Cloud Computing[S].
  • 6Marco Slaviero. BlackHat Presentation Demo Vids: Amazon, part 4 of 5, AMIBomb [EB/OL]. http://www.sensepost.com/blog/3797.html, 2009-08-08.
  • 7Stefan Berger, Ram o n C a ceres and D. P. etc. TVDc: Managing Security in the Trusted Virtual Datacenter[J]. Operating Systems Review (ACM), 2008, 42(01): 40-47.
  • 8Nuno Santos, Krishna P. Gummadi, Rodrigo Rodrigues. Towards trusted cloud computing[C]. Proc. of the 2009 conference on Hot topics in cloud computing. San Diego, California: 2009.
  • 9Joshua Schiffman, Thomas Moyer, H. V., Trent Jaeger and P. M.. Seeding Clouds with Trust Anchors[C].Proc. of the 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW '10, Co-located with CCS'10. Chicago, Illinois, USA: 2010. 43-46.
  • 10Imran Khan, H. Rehman, Zahid Anwar. Design and Deployment of a Trusted Eucalyptus Cloud[C]. 2011 IEEE International Conference onCloud Computing (CLOUD). Washington, DC, USA: 2011. 380-387.

同被引文献4

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部