云计算平台下的动态信任模型的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
云计算是在分布式计算、并行计算、网格计算基础上发展起来的新兴商业计算技术。它一经提出便受到了IT技术各个行业的追捧,随后被Microsoft、IBM、Amazon和Google等大公司相继投入到该技术的产品研发中,并已经取得了喜人的成果。云计算的提出根本性地改变计算机的使用方式。
     云计算与以往的分布式计算模式最大的不同点是它采用“生产者”和“消费者”相分离的商业模式为用户服务,并采用了最新的虚拟化技术将“云”端的丰富资源提供给互联网上的用户,从而最大限度内满足用户对服务质量的要求。但是云计算环境需要超大的规模分布式计算机服务做支撑,简单的依靠传统的安全技术手段已经不能够满足用户对于数据安全性的需求,如何保证“云”端数据的安全性成为解决云计算平台可靠性的核心任务,近年来越来越多的用户和学者开始关注云计算的安全性和可靠性等一系列问题。本文认为将已经成为研究热点的信任机制引入云计算平台是一个很好的选择。信任模型是在人类信任关系的基础抽象和总结出来的,现在已经成为信息安全领域的一个重要研究分支,但是当前对于信任模型的研究还处于起步阶段,很多问题还需要深入的研究和探讨。本文根据云计算的相关特性,对动态信任模型在云计算平台上的应用进行了深入研究和探讨。
     文章在对经典信任模型尤其是(Cloud-Based Trust Model, CBTM)信任模型的优缺点进行归纳、总结的基础上展开进一步研究,设计了适应云计算平台下的动态信任模型(Dynamic Window Trust, DWTrust),它是结合局部信任值计算和全局信任值计算的混合信任模型。和CBTM相比,DWTrust模型最大的不同点是引入了动态信任机制,并从微观层面上讨论了云计算平台的信任特征。DWTrust信任模型的任务是评价云计算环境中节点间信任关系,并以此为依据辅助节点进行信任决策。模型将局部信任度计算和全局信任度计算有机的结合发挥各自的优势,对提高云计算环境可信任的水平起到了很好的效果。在文章结尾,通过cloudsim仿真包验证了DWTrust信任模型在增强云计算平台的可信性方面是切实有效的。
Cloud computing is a new business computing technology based on distributed computing, parallel computing and grid computing. It was pursued by all the industries of IT as soon as proposed, and was then researched and developed by large-scale companies such as Microsoft, IBM, Amazon and Google, that has won gratifying results. Cloud computing changes computer's usage mode thoroughly after it was proposed.
     Distinct from distributed computing greatly, cloud computing uses the business model separating producer and consumer to serve users, and adopts new virtualization technology to provide abundant resources on the "cloud", in order to satisfy users' demands for quality of service as much as possible. But cloud computing environment needs super large scale distributed computing service to support, simple traditional safety techniques have could not satisfy users'demand for data safety. How to ensure the data safety in the "cloud" becomes the core mission to solve the reliability of the cloud computing platform. Recently more and more users and scholars begin to pay more attentions on security and reliability of the cloud computing platform. This paper considered it a good choice to take trust mechanism which is a hot topic into cloud computing. Trust model is abstracted and summarized based on trust relation in society, which has become a major branch in the information safety field. But the research of trust model is still at an early stage, many problems need to be researched and discussed deeply. This paper studies dynamic trust model's application on cloud conputing platform in deep according to the correlation properties of the cloud computing.
     This paper launches further research based on generalizing merit and demerit of Classic trust model especially CBTM(Cloud-Based Trust Model), and designs a new dynamic trust model suiting Cloud computing platform called DWTrust (Dynamic Window Trust). It is a comprehensive trust model which combines local trust with global trust. The biggest difference from CBTM is that the DWTrust brings dynamic trust mechanism, and discuss the trust properties of cloud computing platform from microcosmic level. The mission of the DWTrust is to estimate the trust relation between nodes of cloud computing environment, and assist nodes to make the trust decision according to the estimated results. This paper combines local trust with global trust and produce advantages respectively to improve credible level of cloud computing environment. At the end of the paper, the simulation test proves that it is effective to enhance the cloud computing platform's credibility using DWTrust trust model.
引文
[1]Wikipedia, http:/en.wikipedia.org/wiki/cloud_computing#cite_note-Informs-6
    [2]Gens F. IT Cloud Service User Survey, pt.2:Top Benefits & Challenges.IDC exchange[EB/OL].2009-08-03 http://blogs.idc.com/ie/?p=210
    [3]Buyya, R, Yeo, CS, Venugopal, Srikumar. Market-Oriented Cloud Computing:Vision, Hype, and Reality for Delivering IT Services as Computing Utilities[C].10th IEEE International Conference on High Performance Computing and Communications, 2008,925-27P
    [4]Boss G, Malladi P, Quan D, Legregni L, Hall H. Cloud computing. IBM White Paper, 2007. http://download.boulder.ibm.com/ibmd1/pub/software/dw/wes/hipods/Cloud_computing_wp_final_8Oct.pdf
    [5]王萍,张际平.云计算与网络学习.现代教育技术,vol18,No.11.2008:81-84页
    [6]D Patterson, A Brown, P Broadwell, G Candea. Recovery-oriented computing(ROC): Motivation, definition, techniques, and case studies. CSD-02-1175. March 15,2002
    [7]S Gi lbert, N Lynch. Brewer'S conjecture and the feasibility of consistent available partition-tolerant Web services. ACM SIGAffr News.V01.33,Issue 2.2002:51-59P
    [8]Sims K. IBM introduces ready-to-use cloud computing collaboration services get clients started with cloud computing.2007. http://www-03.ibm.com/press/us/en/press release/ 22613.wss
    [9]肖臻。 云计算与虚拟化.微电脑世界oct,2009:126页
    [10]柯亮亮,郑传行.浅析现阶段云计算发展中的瓶颈问题.电脑知识与技术Vol 5,No.20, July 2009,5357-5359页
    [11]欧阳璟.云计算趋势一览[J].程序员2008年精华本,2008(1):282-286页
    [12]Barroso L A, DEAN J, H?LZLE U. Web search for a planet:The Google cluster architecture[J].IEEE Micro,2003,23(2):22-28P
    [13]Brin S, Page L. The anatomy of a large-scale hypertextual Web search engine[J]. Computer Networks,1998,30(1-7):107-117P
    [14]Ghemawat s, Gobioff h, Leung s t. The Google file system[C]//Proc. of the 19th ACM Symp. on Operating Systems Principles. New York:ACM Press,2003:29-43P
    [15]Dean J, Ghemawat s. Map Reduce:Simplified data processing on large clusters. [C]//Proc. of the 6th Symp. on Operating System Design and Implementation.Berkeley:USENIX Association,2004:137-150P
    [16]Burrows m. The chubby lock service for loosely-coupled distributed systems[C] Proc of the 7th Usenix Symp. on Operating Systems Design and Implementation. Berkeley: Usenix Association,2006:335-350P
    [17]Chang f, Dean J, Ghemawat s, Hsieh w c, Wallach d a, Burrows m, Chandra t, Fikes, Gruber R E. Bigtable:A distributed storage system for structured data[C]//Proc. of the 7th Usenix Symp. on Operating Systems Design and Implementation. Berkeley:USENIX Association,2006:205.218P
    [18]Barham P, Dragovic B, Fraser K, Hand S, Harris T, Ho A, Neugebaur R, Pratt I, Warfield A. Xen and the art of virtualization[C]//Proc. Of the 9th ACM Symp. on Operating Systems Principles. New York:Bolton Landing,2003:164.177P
    [19]Citrix systems, citrix XenServer:Efficient virtual server software. XenSource Company [EB/OL]. [2009-08-02]. http://www.xensource.com
    [20]IBM. IBM virtualization[EB/OL]. [2009-08-03].http://www.ibm.com/virtualization
    [21]Apache. Apache hadoop[EB/OL]. [2009-08-02].http://hadoop.apache.org/core/
    [22]范春莹Force.com云计算解析[J].程序员2008年精华本,2008(1):291-293P
    [23]Amazon. Amazon elastic compute cloud (Amazon EC2)[EB/OL]. [2009-08-02]. http://aws.amazon.com/ec2/.
    [24]李永先,栾旭伦,李森森.云计算技术在图书馆中的应用探讨[J].江西图书馆学刊2009,20(1):105-106页
    [25]赵媛媛,赵广宇,余华鸿.云计算与高校教学教育资源整合[J].2009:23-24页
    [26]Jon Brodkin.Gartner:Seven cloud-computing security risks[EB/OL]. [2009-08-07]. http://www.infoworld.com/d/security-central/gartner-seven-cloud-computingsecurity-risk s-853.
    [27]Marsh Stephen:Formalising trust as a computational concept. PhD Thesis. Scotlnad, University of Stirling,1994.
    [28]Shafer G.:A Mathematical Theory of Evidence. Princeton. NJ:Princeton University Press,1976.
    [29]M.Ginsberg:Non-monotonic reasoning using dempster's rule. In Proc. Of the AAAI-84,1984:125-129页
    [30]D. W. Manchala:Trust metrics, models and protocols for electronic commerce transactions. In the 18th International conference on distributed Computing Systems, 1998:3-12P
    [31]唐文:基于模糊集合理论的主观信任管理模型研究.软件学报.2003,08期:1401-1408页
    [32]Almenarez F, Marin A, Diaz D, Sanchez J. Developing a model for trust management in pervasive devices. In:Bob Werner. Ed. Proc. of the 3rd IEEE Int'l Workshop on Pervasive Computing and Communication Security(PerSec 2006). Washington:IEEE Computer Society Press,2006.267-272P
    [33]Almenarez F, Marin A, Campo C, Garcia RC. PTM:A pervasive trust management model for dynamic open environments. In:Procof the 1 st Workshop on Pervasive Security,Privacy and Trust. Boston,2004. http//jerry.clab.de/ubisec/publications/PSPT04-PTM.pdf
    [34]Almenarez F,Marin A,Campo C,Garcia RC. TrustAC:Trust-Based access control for pervasive devices. LNCS 450. Berlin:Springer-Verlag,2005:225-238P
    [35]Jameel H,Hung LX,Kalim U,Asjjad A,Lee SY,Lee YK. A trust model for ubiquitous systems based on vectors of trust values. In Proc. of the 7th IEEE Int'l Symp. on Multimedia. Washington:IEEE Computer Society Press,2005:674-679P
    [36]Theodorakopoulos G,Baras JS. On trust models and trust evaluation metrics for ad-hoc networks. IEEE Journal on Selected Areas in Communications,2006,24(2):318-328P
    [37]Theodorakopoulos G. Distributed trust evaluation in ad-hoc networks fMS Thesis].2004. http/www.isr.umd.edu/~baras/publications/dissertations/2004/Theodorakopoulos-MS 2004-2.pdf
    [38]Sun Y,Yu W,Han Z,Liu KJR. Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications, Selected Areas in Communications,2006,249(2):305-319P
    [39]Sun Y, Yu W, Hall Z, Liu KJR. Trust modeling and evaluation in ad hoe networks. In: Proc. of the Global Telecommunications Conf. Globccom 2005. Washington:IEEE Computer Society Press,2005:1-10P
    [40]He R, Niu JW, Zhang GW. CBTM:A trust model with uncertainty quantification and reasoning for pervasive computing. LNCS 3758. Berlin:Springer-Verlag.2005.541-552P
    [41]Song SS, Hwang K. Fuzzy trust integration for security enforcement in grid computing. In:Proc. of the Int'l Symp. on Network and Parallel Computing(NPC 2004). Berlin: Springer-Verlag,2005:3222P
    [42]Duma C, Shahmehri N. Dynamic trust metrics for peer-to-peer system. In:Proc. of the 16th Int'l Workshop on Database and Expert Systems Applications(DEXA 2005). Washington:IEEE Computer Society Press,2005:776-781P
    [43]KaeIbling LP, Littman ML, Moore AW. Reinforcement learning:A survey. Journal of Artificial Intelligence Research,1996,4:237-285P
    [44]李小勇,桂小林.可信网络中基于多维决策属性的信任量化模型[J].计算机学报,2009,第32卷,第3期:405-416页
    [45]张楠.云计算颠覆现有商业模式[J].信息系统工程,2008(9):25-28页
    [46]蔡宜秀.李开复谈云计算应用三大关键前提——浏览器,付费机制与应用服务缺一不可[J].信息系统工程,2009(2):8页
    [47]Michael Miller.云计算[M].北京:机械工业出版社,2009:13-15页
    [48]胡炜,钟卫连.浅谈云计算的网络安全问题[J].中国科技信息,2008(23):109-111页
    [49]徐峰,吕建.web安全中的信任管理研究与进展.软件学报,2002,11(13):2057-2064页
    [50]He R, Niu JW, Zhang GW. CBTM-A trust model with uncertainty quantification and reasoning for pervasive computing. LNCS 3758.Berlin:Springer-Verlag2005:541-552P
    [51]窦文等:构造基于推荐的Peer-to-peer环境下的Trust模型.软件学报,2004,15(4):571-583页
    [52]Yao,W.T.-M. Fidelis:A Policy-Driven Trust Management Framework. In 1st International Conference on Trust Management. Heraklion, Crete, Greece:Springer,2003:1327-1335P
    [53]Yu, T.,M. Winslett and K.e. Seamons:Interoperable Strategies in Automated Trust Negotiation, in ACM Conference on Computer and Communications Security(CCS). 2001. Philadelphia, Pennsly vania, USA:ACM. http://isrLcs.byuedu/pubs/ccs2001.pdf
    [54]Almenarez F, Marin A, Diaz D, Sanchez J. Developing a model for trust management in pervasive devices. In:Bob Werner, ed. Proc of the 3rd IEEE Int'l Workshop on Pervasive Computing and Communication Security(PerSec 2006). Washington:IEEE Computer Society Press,2006267-272P
    [55]Duma C, Shahmehri N. Dynamic trust metrics for peer-to-peer system. In:Proc. of the 16th Int'l Workshop on Database and Expert Systems Applications(DEXA 2005). Washington:IEEE Conputer Society Press,2005:776-781P
    [56]胡晓明.P2P中混合式信任模型的研究.哈尔滨工程大学硕士论文.2009
    [57]陈康,郑纬民.云计算:系统实例与研究现状.软件学报vol20,No.5,May 2009:1337-1348页
    [58]苏永乐.对等网络信任模型及激励机制研究.山东大学硕士论文.2009
    [59]杨段生.基于信誉机制的P2P网络安全模型研究.贵州大学硕士论文2008
    [60]Ruohomaa S, Kutvonen L. Trust management survey. LNCS 3477 Berlin: Springer-Verlag,2005:77-92P
    [61]马彬.普适计算安全中的访问控制和信任模型研究.北京航空航天大学学报.vol6,2007:205-208页
    [62]何锐,牛建伟,胡建平.一种开放网络环境中的不确定信任模型.北京航空航天大学学报.vol 11,2004:1125-1128页

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700