信息网络安全 ›› 2016, Vol. 16 ›› Issue (2): 33-39.doi: 10.3969/j.issn.1671-1122.2016.02.006

• • 上一篇    下一篇

基于评价可信度的云计算信任管理模型研究

廖子渊1,2, 陈明志1,2(), 邓辉3   

  1. 1. 福州大学数学与计算机科学学院,福建福州 350108
    2. 网络系统信息安全福建省高校重点实验室,福建福州 350108
    3. 安徽省淮南市公安局,安徽淮南 232001
  • 收稿日期:2015-10-27 出版日期:2016-02-10 发布日期:2020-05-13
  • 作者简介:

    作者简介: 廖子渊(1992—),男,广东,硕士研究生,主要研究方向为云计算安全;陈明志(1975—),男,福建,副教授,博士,主要研究方向为互联网安全通信与智能信息处理;邓辉 (1973—),男,安徽,硕士研究生,主要研究方向为网络安全、视频应用技术。

  • 基金资助:
    国家自然科学基金[71231003];福建省科技厅工业引导性(重点)项目[2015H0020];福建省科技厅区域发展项目[2015H4005];福州市科技计划项目[2014G75]

Research on the Model of Cloud Computing Trust Management Based on Evaluation Credibility

Ziyuan LIAO1,2, Mingzhi CHEN1,2(), Hui DENG3   

  1. 1.College of Mathematics and Computer Science, Fuzhou University, Fuzhou Fujian 350108, China
    2. Key Lab of Information Security of Network System in Fujian Province, Fuzhou Fujian 350108, China
    3. Huainan Municipal Public Security Bureau, Huainan Anhui 232001, China
  • Received:2015-10-27 Online:2016-02-10 Published:2020-05-13

摘要:

当前云计算发展十分迅速,而信任管理对其可持续发展而言是最具挑战性的问题之一。云计算因其高度动态、分布式以及非透明等特点而引发了若干关键性问题,如隐私性、安全性以及可用性。保护云服务商免受恶意用户的攻击也是一个棘手的问题。文章根据云计算信任管理的设计理念,引入一种计算用户评价可信度的方法,将计算得到的信任结果作为其评价证据的可信权重。用户一般分为两类,一类是正常用户,根据实际的交易情况给出可信评价;另一类是恶意用户,通过提交恶意评价来攻击服务实体。通过计算用户的评价可信度可识别出恶意用户,保护信任管理模型。文章使用云计算中真实的信任反馈建立实验,通过用户的评价可信度淘汰恶意用户,使用正常的用户反馈证明了该模型的可行性。

关键词: 云计算, 信任管理, 信任反馈, 评价可信度

Abstract:

At present, cloud computing is developing rapidly, and trust management is one of the most challenging problems to the sustainable development of cloud computing. The highly dynamic, distributed, and non-transparent nature of cloud computing introduces several key issues such as privacy, security, and availability. Protecting cloud services providers against attacks from malicious users is also a difficult problem. Based on the design of the cloud computing trust management, this paper introduces a method to calculate users’ evaluation credibility which uses the calculated trust results as the credibility weights of the evaluation evidences. Users are generally divided into two kinds, one kind is the normal user who gives the credibility evaluation according to the actual transaction situation, and the other is the malicious user who attacks the service entity by submitting malicious evaluation. By calculating the evaluation credibility of the user, the method can identify the malicious user entity and protect the trust management model. In this paper, the experiment is based on the real trust feedback in cloud computing, which eliminates malicious user according to the user’s evaluation credibility. The feasibility of the model is proved by using the normal user feedback.

Key words: cloud computing, trust management, trust feedback, evaluation credibility

中图分类号: