Netinfo Security ›› 2023, Vol. 23 ›› Issue (2): 35-44.doi: 10.3969/j.issn.1671-1122.2023.02.005
Previous Articles Next Articles
WANG Yan(), ZHANG Kunpeng, JI Zhicheng
Received:
2022-11-26
Online:
2023-02-10
Published:
2023-02-28
Contact:
WANG Yan
E-mail:wangyan88@jiangnan.edu.cn
CLC Number:
WANG Yan, ZHANG Kunpeng, JI Zhicheng. Intelligent Optimization and Decision Method of Cloud Resources Based on Trusted Service[J]. Netinfo Security, 2023, 23(2): 35-44.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2023.02.005
子任务 | 加工时间(h)/加工成本(元)/服务质量/可信度 | |||||
---|---|---|---|---|---|---|
${{R}_{1}}$ | ${{R}_{2}}$ | ${{R}_{3}}$ | ${{R}_{4}}$ | ${{R}_{5}}$ | ${{R}_{6}}$ | |
${{O}_{1}}$ | 20/125/ 0.75/0.98 | — | 30/100/ 0.6/0.95 | — | 25/110/ 0.7/0.95 | — |
${{O}_{2}}$ | — | 35/100/ 0.7/0.95 | — | 20/120/ 0.7/0.97 | — | 30/130/ 0.8/0.95 |
${{O}_{3}}$ | 30/110/ 0.7/0.95 | 25/100/ 0.6/0.95 | 30/120/ 0.85/0.95 | — | — | 40/120/ 0.86/0.98 |
${{O}_{4}}$ | — | 30/90/ 0.5/0.96 | — | 60/120/ 0.9/0.96 | 50/100/ 0.7/0.93 | — |
${{O}_{5}}$ | 25/105/ 0.85/0.97 | — | 30/110/ 0.8/0.99 | — | — | 40/110/ 0.9/0.94 |
[1] |
CHEN Chiyuan, WU H M, WANG Lei, et al. Practical Integrity Preservation for Data Streaming in Cloud-Assisted Healthcare Sensor Systems[J]. Computer Networks, 2017, 129(5): 472-480.
doi: 10.1016/j.comnet.2017.05.032 URL |
[2] |
TIAN Junfeng, WANG Ziwei. Cloud Data Assured Deletion Scheme Based on Dynamic Sliding Window[J]. Peer to Peer Networking and Applications, 2022, 15: 1817-1833.
doi: 10.1007/s12083-022-01318-3 URL |
[3] |
YU Ying, LI Shan, MA Jing. Time-Aware Cloud Manufacturing Service Selection Using Unknown QoS Prediction and Uncertain User Preferences[J]. Concurrent Engineering, 2021, 29(4): 370-385.
doi: 10.1177/1063293X211019503 URL |
[4] |
FENG Chenwei, WANG Yan. Optimization of Parallel Task Scheduling in Cloud Manufacturing System[J]. Journal of System Simulation, 2019, 31(12): 2626-2635.
doi: 10.16182/j.issn1004731x.joss.19-FZ0275 |
冯晨微, 王艳. 云制造系统并行任务优化调度[J]. 系统仿真学报, 2019, 31(12):2626-2635.
doi: 10.16182/j.issn1004731x.joss.19-FZ0275 |
|
[5] |
VERMA P, TAPASWI S, GODFREY W. AVDR: A Framework for Migration Policy to Handle DDoS Attacked VM in Cloud[J]. Wireless Personal Communications, 2020, 115(2): 1335-1361.
doi: 10.1007/s11277-020-07630-6 URL |
[6] | LIN Chuang, SU Wenbo, MENG Kun, et al. Cloud Computing Security: Architecture, Mechanism and Model Evaluation[J]. Chinese Journal of computer science, 2013, 36(9): 1765-1784. |
林闯, 苏文博, 孟坤, 等. 云计算安全:架构、机制与模型评价[J]. 计算机学报, 2013, 36(9):1765-1784. | |
[7] | YU Chengli, ZHANG Yang, JIA Shijie. Research on Data Security Threats and Protection of Key Technologies in Cloud Environment[J]. Netinfo Security, 2022, 22(7): 55-63. |
于成丽, 张阳, 贾世杰. 云环境中数据安全威胁与防护关键技术研究[J]. 信息网络安全, 2022, 22(7):55-63. | |
[8] | ZHANG Yuqing, WANG Xiaofei, LIU Xuefeng, et al. Survey on Cloud Computing Security[J]. Journal of Software, 2016, 27(6): 1328-1348. |
张玉清, 王晓菲, 刘雪峰, 等. 云计算环境安全综述[J]. 软件学报, 2016, 27(6):1328-1348. | |
[9] | LU Hongwei, REN Lixia, CHEN Yizhong, et al. A Cloud Model Based Multi-Attribute Decision Making Approach for Selection and Evalution of Groundwater Management Schemes[J]. Journal of Hydrology, 2017(555): 881-893. |
[10] | WANG Lijing, WANG Xingwei, HUANG Min. Research on a Cloud Resource Allocation Mechanism Based on Double Auction and Cell Membrane Optimization Algorithm[J]. Netinfo Security, 2016, 16(12): 51-59. |
王梨静, 王兴伟, 黄敏. 一种基于双向拍卖和细胞膜优化的云资源分配机制的研究[J]. 信息网络安全, 2016, 16 (12):51-59. | |
[11] |
YU Chunxia, ZHANG Luping, ZHAO Wenfan, et al. A Blockchain-Based Service Composition Architecture in Cloud Manufacturing[J]. International Journal of Computer Integrated Manufacturing, 2020, 33(7): 701-715.
doi: 10.1080/0951192X.2019.1571234 URL |
[12] | BARENJI R V. A Blockchain Technology Based Trust System for Cloud Manufacturing[J]. Journal of Intelligent Manufacturing, 2021: 1-15. |
[13] |
SIMEONE A, CAGGIANO A, DENG Bin, et al. A Deep Learning Based-Decision Support Tool for Solution Recommendation in Cloud Manufacturing Platforms[J]. Procedia CIRP, 2019, 86: 68-73.
doi: 10.1016/j.procir.2020.01.019 URL |
[14] | ZHAO Daozhi, LI Rui. Two-Sided Matching Mechanism with Agents’ Expectation for Cloud Manufacturing Resource[J]. Control and Decision, 2017, 32(5): 871-878. |
赵道致, 李锐. 考虑主体心理预期的云制造资源双边匹配机制[J]. 控制与决策, 2017, 32(5):871-878. | |
[15] |
JIN Hong, YAO Xifan, CHEN Yong. Correlation-Aware QoS Modeling and Manufacturing Cloud Service Composition[J]. Journal of Intelligent Manufacturing, 2017, 28(8): 1947-1960.
doi: 10.1007/s10845-015-1080-2 URL |
[16] |
LI Li, WANG Wanliang, LI Weikun, et al. A Novel Ranking-Based Optimal Guides Selection Strategy in MOPSO[J]. Procedia Computer Science, 2016, 91(1): 1001-1010.
doi: 10.1016/j.procs.2016.07.135 URL |
[17] |
FAIK B, FULYA Z, MIRAC F, et al. The Evaluation of Renewable Energy Alternatives for Sustainable Development in Turkey Using Intuitionistic Fuzzy-TOPSIS Method[J]. Renewable Energy, 2022, 189:1443-1458.
doi: 10.1016/j.renene.2022.03.058 URL |
[18] |
SUN Yan, LIN Fuhong, XU Haitao. Multi-Objective Optimization of Resource Scheduling in Fog Computing Using an Improved NSGA-II[J]. Wireless Personal Communications, 2018, 102(2): 1369-1385.
doi: 10.1007/s11277-017-5200-5 URL |
[1] | KONG Jiaqi, WANG Liming, GE Xiaoxue. Simulated Annealing and Particle Swarm Enhanced Relational Database Watermark [J]. Netinfo Security, 2022, 22(5): 37-45. |
[2] | CHEN Yan, WEI Xiang, LU Zhen. Research on Testing Approaches for Network Security Products in Cloud Computing Environment [J]. Netinfo Security, 2022, 22(12): 1-6. |
[3] | YIN Mengmeng, WANG Lei, YAO Changhua, WU Xinrong. Evaluation of the Importance of Complex Network Nodes Based on VIKOR Model [J]. Netinfo Security, 2022, 22(1): 87-94. |
[4] | SONG Yulong, WANG Lei, WU Xinrong, ZENG Weijun. Research on WSN Topological Invulnerability Based on Adaptive Simulated Annealing Particle Swarm Optimization Algorithm [J]. Netinfo Security, 2021, 21(6): 89-96. |
[5] | ZHENG Luxin, ZHANG Jian. Threats and Future Development Trends to the Cloud Security [J]. Netinfo Security, 2021, 21(10): 17-24. |
[6] | YU Xiaojun, WU Yabiao, ZHANG Yuqing. Research on the Design of Cloud Security Architecture [J]. Netinfo Security, 2020, 20(9): 62-66. |
[7] | XU Yuwei, ZHAO Baokang, SHI Xiangquan, SU Jinshu. Low-latency Optimal Orchestration of Containerized Security Service Function Chain [J]. Netinfo Security, 2020, 20(7): 11-18. |
[8] | MENG Xiangru, XU Jiang, KANG Qiaoyan, HAN Xiaoyang. Secure Virtual Network Embedding Algorithm Based on Entropy Weight VIKOR [J]. Netinfo Security, 2020, 20(5): 21-28. |
[9] | WANG Xiao, ZHAO Jun, ZHANG Jianbiao. Research on Dynamic Monitoring Mechanism for Virtual Machine Based on Trusted Software Base [J]. Netinfo Security, 2020, 20(2): 7-13. |
[10] | Donghui MEI, Hongling LI. Research on Load Balancing of Virtual Machine Based on Multiple Objective Hybrid Particle Swarm Optimization [J]. Netinfo Security, 2018, 18(2): 78-83. |
[11] | Jian ZHANG, Cheng GAO, Liangyi GONG, Zhaojun GU. Research on Virtual Machine Introspection Technology [J]. Netinfo Security, 2017, 17(9): 63-68. |
[12] | ZHANG Xuebo, LIU Jinghao, FU Xiaomei. Design and Implementation of Anti Web DDoS Attack Model Based on Improved Logistic Regression Algorithm [J]. 信息网络安全, 2017, 17(6): 62-67. |
[13] | Wenxu WANG, Jian ZHANG, Qing CHANG, Zhaojun GU. Research on the Security Problem of Cloud Computing Virtualization Platform [J]. Netinfo Security, 2016, 16(9): 163-168. |
[14] | Xiaojun YU, Qiaoyan WEN, Yuqing ZHANG, Yabiao WU. Modeling for Credibility Concept of Cloud Computing [J]. Netinfo Security, 2016, 16(9): 223-227. |
[15] | Ziyuan LIAO, Mingzhi CHEN, Hui DENG. Research on the Model of Cloud Computing Trust Management Based on Evaluation Credibility [J]. Netinfo Security, 2016, 16(2): 33-39. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||