首页 | 本学科首页   官方微博 | 高级检索  
     

基于云理论的可信技术研究
引用本文:吕慎娟,张永胜,娄迎红,张艳东,田 明.基于云理论的可信技术研究[J].计算机应用研究,2013,30(8):2523-2526.
作者姓名:吕慎娟  张永胜  娄迎红  张艳东  田 明
作者单位:1. 山东师范大学 信息科学与工程学院,济南 250014;山东省分布式计算机软件新技术重点实验室,济南 250014
2. 山东广播电视大学 计算机与通信学院,济南,250014
基金项目:山东省自然科学基金资助项目(ZR2011FM019); 山东省研究生教育创新计划资助项目(SDYY11117)
摘    要:针对云计算环境下信息的安全性和可靠性方面的欠缺, 为了建立灵活多适应性的安全机制, 将云与可信的概念相结合, 是现今安全领域的一个主要研究方向。为进一步解决云计算安全问题, 对云计算环境下的一些可信技术进行了研究, 并在此基础上提出了一种新的逆向云生成算法。该算法基于原一维逆向云算法, 使用主观信任云的期望和超熵对信任客体的可信度进行了评价, 为网上交易的信任决策提供了依据。对实验数据的分析表明, 与传统的算法相比, 此算法在信任度的可靠性和稳定性上存在比较明显的优势。

关 键 词:可信云  主观信任  云模型  信息可信评价  相似度  云安全

Research of trusted technology based on cloud model
LV Shen-juan,ZHANG Yong-sheng,LOU Ying-hong,ZHANG Yan-dong,TIAN Ming.Research of trusted technology based on cloud model[J].Application Research of Computers,2013,30(8):2523-2526.
Authors:LV Shen-juan  ZHANG Yong-sheng  LOU Ying-hong  ZHANG Yan-dong  TIAN Ming
Affiliation:1. School of Information Science & Engineering, Shandong Normal University, Jinan 250014, China; 2. Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology, Jinan 250014, China; 3. School of Computer & Communication, Shandong TV University, Jinan 250014, China
Abstract:For the lack of safety and reliability of the information in the cloud computing environment, in order to establish more flexible and adaptable security mechanism, combining the cloud and credible is a major research direction in the field of security today. Based on this point, this paper studied some credible technology in cloud computing environment, and on the basis of the above, proposed a new reverse cloud generation algorithms to further address the security issues of cloud computing. Based on the original reverse cloud generation algorithms, the expected value and hyper entropy of subjective cloud was used to evaluate the reputation of trust objects, and provided a basis for trust decisions online trading. The result of simulating experiments show that this algorithm has more obvious advantages compared with traditional algorithms on the reliability and stability of the trust.
Keywords:trusted cloud  subjective trust  cloud model  evaluate information security  similarity  cloud security
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号