天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

云計(jì)算環(huán)境下信任管理機(jī)制研究

發(fā)布時(shí)間:2018-04-25 22:42

  本文選題:本體 + 上下文; 參考:《曲阜師范大學(xué)》2014年碩士論文


【摘要】:云計(jì)算是一種融合分布式計(jì)算、網(wǎng)格計(jì)算和并行計(jì)算等技術(shù)的新型商業(yè)計(jì)算模式,它利用虛擬化技術(shù),將存儲(chǔ)資源、計(jì)算資源、網(wǎng)絡(luò)資源和應(yīng)用資源等以服務(wù)的形式對(duì)外發(fā)布。云計(jì)算用戶可以“輕而易舉”獲取“彈性且無(wú)處不在”的服務(wù)。 云計(jì)算的服務(wù)思想一方面可以縮短用戶重新部署或升級(jí)IT資源的時(shí)間,另一方面可以降低軟件和基礎(chǔ)設(shè)施成本,從而在時(shí)間和空間上都能給用戶帶來(lái)極大的益處。然而,云計(jì)算服務(wù)在提供上述優(yōu)勢(shì)的同時(shí)帶也來(lái)了新的安全問(wèn)題:由于服務(wù)相對(duì)于用戶來(lái)說(shuō)是位置、應(yīng)用透明的,不受用戶直接控制,因而用戶既擔(dān)心存放到云端的隱私信息和核心數(shù)據(jù)被泄露,又質(zhì)疑與之共享、交互服務(wù)的可信度。由此可見(jiàn),無(wú)論是用戶利用云計(jì)算平臺(tái)進(jìn)行數(shù)據(jù)存儲(chǔ)、科學(xué)計(jì)算,還是與其他用戶協(xié)作完成自己的作業(yè)任務(wù),信任都成為不得不考慮的重要問(wèn)題。 在保持云服務(wù)優(yōu)勢(shì)的同時(shí),針對(duì)如何提高交互服務(wù)間的信任度,本文從云計(jì)算的視角對(duì)信任機(jī)制做了如下四方面的研究: 第一,針對(duì)云計(jì)算環(huán)境,對(duì)信任及信任關(guān)系進(jìn)行了詳細(xì)研究,給出了綜合服務(wù)消費(fèi)者動(dòng)機(jī)(需求信息和反饋信息等)、行為上下文(交互時(shí)間、歷史交易記錄和軟硬件環(huán)境等)和服務(wù)自身質(zhì)量(SLA和QoS等)有關(guān)的信任要素構(gòu)造信任本體的方法。 第二,從云服務(wù)的角度對(duì)信任管理模型進(jìn)行分類,在分類的基礎(chǔ)上,,構(gòu)建了一種融合云服務(wù)的信任管理架構(gòu),并詳細(xì)分析了該架構(gòu)所包含的與信任有關(guān)的要素。 第三,給出了一種云計(jì)算環(huán)境下基于上下文本體的信任評(píng)估方法。該方法利用本體既可以對(duì)屬性進(jìn)行一致性語(yǔ)義描述,又可以借助時(shí)間和交互次數(shù)對(duì)信任進(jìn)行動(dòng)態(tài)評(píng)估。利用信任本體具有的語(yǔ)義特性和推理機(jī)制,描述了信任評(píng)估的具體過(guò)程。 第四,提出了一種基于本體的自動(dòng)信任協(xié)商模型,該模型從本體自身的特點(diǎn)和本體信息的傳輸過(guò)程兩個(gè)層面對(duì)敏感信息進(jìn)行保護(hù)。 總之,本文從云服務(wù)協(xié)作的角度對(duì)信任有關(guān)的關(guān)鍵要素進(jìn)行分類和綜合,構(gòu)建了信任本體;對(duì)信任管理模型從策略、推薦、聲譽(yù)和預(yù)測(cè)四個(gè)角度進(jìn)行分析,提出了一種適合云計(jì)算環(huán)境的信任管理分層架構(gòu),并將信任本體中的信任要素與本文提出的信任管理模型的三層架構(gòu)進(jìn)行了對(duì)應(yīng)和分析,對(duì)云環(huán)境的安全建設(shè)具有理論和實(shí)踐意義;利用信任本體記錄服務(wù)的運(yùn)行和交互的歷史信息,提出了一種基于本體的信任度評(píng)估方法,用仿真實(shí)驗(yàn)驗(yàn)證了該方法的有效性;利用本體自身的層次性,從信任協(xié)商的請(qǐng)求和應(yīng)答兩個(gè)層面對(duì)敏感信息保護(hù)的策略進(jìn)行了詳述。為進(jìn)一步保證敏感信息在傳輸過(guò)程層面的安全性,提出了一種基于本體的自動(dòng)信任協(xié)商模型。
[Abstract]:Cloud computing is a new business computing model which combines distributed computing, grid computing and parallel computing. It uses virtualization technology to release storage resources, computing resources, network resources and application resources as services. Cloud computing users can easily access "flexible and ubiquitous" services. On the one hand, the service idea of cloud computing can shorten the time for users to redeploy or upgrade IT resources, on the other hand, it can reduce the cost of software and infrastructure, which can bring great benefits to users in time and space. However, cloud computing services offer these advantages with new security issues: because the service is located relative to the user, the application is transparent and not directly controlled by the user. Therefore, users not only worry that the privacy information and core data stored in the cloud will be leaked, but also question the credibility of the interactive services. It can be seen that whether users use cloud computing platform for data storage, scientific computing, or cooperate with other users to complete their own tasks, trust has become an important issue to be considered. While maintaining the advantage of cloud service, aiming at how to improve the trust degree between interactive services, this paper makes the following four aspects of research on trust mechanism from the perspective of cloud computing: Firstly, trust and trust relationship are studied in detail in cloud computing environment, and the comprehensive service consumer motivation (requirement information and feedback information), behavior context (interaction time, etc.) are given. The method of constructing trust ontology is based on the historical transaction record and software / hardware environment) and the quality of service (SLA and QoS etc.). Secondly, the trust management model is classified from the point of view of cloud service. On the basis of the classification, a trust management architecture integrating cloud services is constructed, and the factors related to trust are analyzed in detail. Thirdly, a trust evaluation method based on context ontology in cloud computing environment is presented. In this method, ontology can be used not only to describe attribute consistency semantics, but also to evaluate trust dynamically by time and interaction times. The process of trust evaluation is described by using the semantic characteristics and reasoning mechanism of trust ontology. Fourthly, an automatic trust negotiation model based on ontology is proposed, which protects sensitive information from two aspects: ontology's own characteristics and ontology's information transmission process. In a word, this paper classifies and synthesizes the key elements related to trust from the perspective of cloud service collaboration, constructs trust ontology, and analyzes trust management model from four angles: policy, recommendation, reputation and prediction. In this paper, a trust management hierarchical architecture suitable for cloud computing environment is proposed, and the trust elements in the trust ontology are compared with the three-tier framework of the trust management model proposed in this paper. It has theoretical and practical significance for the security construction of cloud environment, and uses trust ontology to record the running and interactive historical information of the service, proposes an ontology-based trust evaluation method, and verifies the effectiveness of the method by simulation experiments. Based on the hierarchy of ontology, the strategy of protecting sensitive information is described in detail from two levels: request and response of trust negotiation. In order to ensure the security of sensitive information in the transmission process, an ontology based automatic trust negotiation model is proposed.
【學(xué)位授予單位】:曲阜師范大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP393.08

【參考文獻(xiàn)】

相關(guān)期刊論文 前8條

1 蘇森;李飛;楊放春;;分布式環(huán)境中服務(wù)組合的迭代選擇算法[J];中國(guó)科學(xué)(E輯:信息科學(xué));2008年10期

2 吳吉義;沈千里;章劍林;沈忠華;平玲娣;;云計(jì)算:從云安全到可信云[J];計(jì)算機(jī)研究與發(fā)展;2011年S1期

3 胡春華;陳曉紅;吳敏;劉建勛;;云計(jì)算中基于SLA的服務(wù)可信協(xié)商與訪問(wèn)控制策略[J];中國(guó)科學(xué):信息科學(xué);2012年03期

4 廖振松;金海;李赤松;鄒德清;;自動(dòng)信任協(xié)商及其發(fā)展趨勢(shì)[J];軟件學(xué)報(bào);2006年09期

5 李小勇;桂小林;;大規(guī)模分布式環(huán)境下動(dòng)態(tài)信任模型研究[J];軟件學(xué)報(bào);2007年06期

6 邵凌霜;周立;趙俊峰;謝冰;梅宏;;一種Web Service的服務(wù)質(zhì)量預(yù)測(cè)方法[J];軟件學(xué)報(bào);2009年08期

7 潘靜;徐鋒;呂建;;面向可信服務(wù)選取的基于聲譽(yù)的推薦者發(fā)現(xiàn)方法[J];軟件學(xué)報(bào);2010年02期

8 馮登國(guó);張敏;張妍;徐震;;云計(jì)算安全研究[J];軟件學(xué)報(bào);2011年01期



本文編號(hào):1803342

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/guanlilunwen/ydhl/1803342.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶bbdf3***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com
沐浴偷拍一区二区视频| 中文字幕日韩欧美一区| 欧美国产亚洲一区二区三区| 国产精品午夜视频免费观看| 男生和女生哪个更好色| 国产精品人妻熟女毛片av久| 一个人的久久精彩视频| 九九蜜桃视频香蕉视频| 国产精品乱子伦一区二区三区| 91精品视频免费播放| 免费在线成人午夜视频| 精品熟女少妇一区二区三区| 国产成人免费激情视频| 人妻偷人精品一区二区三区不卡| 日韩精品综合免费视频| 亚洲美女国产精品久久| 欧美一二三区高清不卡| 老司机这里只有精品视频| 亚洲超碰成人天堂涩涩| 91日韩在线视频观看| 亚洲欧美日韩综合在线成成| 免费福利午夜在线观看| 午夜精品在线观看视频午夜| 国内尹人香蕉综合在线| 熟女一区二区三区国产| 青草草在线视频免费视频| 国产韩国日本精品视频| 一区二区三区国产日韩| 夜夜躁狠狠躁日日躁视频黑人| 最近的中文字幕一区二区| 欧美一区二区三区十区| 丰满人妻熟妇乱又伦精另类视频| 高跟丝袜av在线一区二区三区| 亚洲国产婷婷六月丁香| 麻豆国产精品一区二区| 在线视频免费看你懂的| 午夜精品成年人免费视频| 国产精品刮毛视频不卡| 国产美女网红精品演绎| 在线免费观看黄色美女| 日韩aa一区二区三区|