首页 | 本学科首页   官方微博 | 高级检索  
     

一种云平台可信性分析模型建立方法
引用本文:赵波,戴忠华,向騻,陶威.一种云平台可信性分析模型建立方法[J].软件学报,2016,27(6):1349-1365.
作者姓名:赵波  戴忠华  向騻  陶威
作者单位:武汉大学 计算机学院,武汉 430072;空天信息安全与可信计算教育部重点实验室(武汉大学),湖北 武汉 430072,武汉大学 计算机学院,武汉 430072;空天信息安全与可信计算教育部重点实验室(武汉大学),湖北 武汉 430072;中国信息安全测评中心,北京100085,武汉大学 计算机学院,武汉 430072;空天信息安全与可信计算教育部重点实验室(武汉大学),湖北 武汉 430072,武汉大学 计算机学院,武汉 430072;空天信息安全与可信计算教育部重点实验室(武汉大学),湖北 武汉 430072
基金项目:国家重点基础研究发展规划(973)( 2014CB340600); 国家高技术研究发展计划(863) (2015AA016002); 国家自然科学基金重点项目(91118003); 国家自然科学基金 (61173138, 61272452,61332019)
摘    要:如何使得用户信任云服务提供商及其云平台是云计算普及的关键因素之一,针对目前云平台可信性所包含的内容与分析评价依据尚不完善的现状,且缺乏从理论层次对于云平台的部分可信属性进行分析与评估方法的问题,首先对云平台的可信性进行定义,并结合国内外相关云安全标准与可信性规范以及我们自己的理解,明确了云平台可信性的子属性与具体分析内容,从而明确本文提出模型的适用范围、分析目的以及依据.在此基础上,提出模型建立方法,方法以标记变迁系统作为操作语义描述工具,从云平台内部组件交互过程出发,将平台对外提供服务过程刻画为用户与云的交互以及云平台内部实体间的交互,并利用模型分析检测工具Kronos从可用、可靠、安全等多个角度对平台内部状态变化过程进行分析,分析结果不但能够发现已知的可信性问题,还发现了一些未知的隐患,说明了模型建立方法的有效性,并为如何评价云平台的可信性进而构建可信云提供了理论支撑.

关 键 词:云平台  可信性分析  平台建模  标记变迁系统  Kronos
收稿时间:2015/8/12 0:00:00
修稿时间:2015/10/9 0:00:00

Model Constructing Method for Analyzing the Trusty of Cloud
ZHAO Bo,DAI Zhong-Hu,XIANG Shuang and TAO Wei.Model Constructing Method for Analyzing the Trusty of Cloud[J].Journal of Software,2016,27(6):1349-1365.
Authors:ZHAO Bo  DAI Zhong-Hu  XIANG Shuang and TAO Wei
Affiliation:School of Computer Science, Wuhan University, Wuhan 430072, China;Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education (Wuhan University), Wuhan 430072, China,School of Computer Science, Wuhan University, Wuhan 430072, China;Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education (Wuhan University), Wuhan 430072, China;China Information Technology Security Evaluation Center, Beijing 100085, China,School of Computer Science, Wuhan University, Wuhan 430072, China;Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education (Wuhan University), Wuhan 430072, China and School of Computer Science, Wuhan University, Wuhan 430072, China;Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education (Wuhan University), Wuhan 430072, China
Abstract:One of the key factors that affect people's preferences in cloud computing choosing is the trusty of it. However, the content and the evaluation basis of cloud trusty are still not perfect, and the dynamic properties of it lack strict theoretical analysis and evaluation method. For the status quo, we defined cloud trusty first, described its details and sub-properties according to related international cloud security standards and trusty specifications. Thus the basis, purpose, and scope of the model presented in this paper can be drawn. We then described how to build this model. Using LTS as an operational semantics profiling tool, starting from the interactive process of internal components in cloud, the cloud service is depicted as the interactions between users and cloud, and interactions among entities inside cloud. Finally, we used model analysis tool Kronos to analyze system state variations in service provision from multiple perspectives: availability, reliability and security. From the analysis results we could not only find known trusty problems, but also unknown risks, which indicates our model is effective, and can provide theoretical support for trusted cloud construction.
Keywords:cloud computing  trust property  platform modeling  labelled transition system  Kronos
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号