期刊文献+

基于Eucalyptus的基础设施即服务云框架协议设计 被引量:8

The Protocol Design of a Eucalyptus-based Infrastructure-as-a-Service(IaaS) Cloud Framework
在线阅读 下载PDF
导出
摘要 云计算中的基础设施即服务(IaaS)免去用户自主管理计算机硬件的麻烦,随时随地按需向用户提供计算和存储资源。Eucalyptus是一个被学术研究关注的开源IaaS实现,然而没有文献描述完整的利用Eucalyptus的所有模块来提供安全的基础设施服务。该文针对IaaS的安全需求,提出一个可信的IaaS框架。框架将基础设施服务提供过程细化为5个环节,并基于可信平台模块(TPM)设计相应安全协议实现这些环节。协议的设计过程严格遵守TPM的操作规范,并加入可信第三方以制约服务提供商的权力。协议的安全性均通过Scyther自动化分析工具的检测,从而保证整个框架满足IaaS的安全需求。 Infrastructure-as-a-Service (IaaS) frees users from the trouble of self-management of computer hardware, and provides users with anytime, anywhere on demand computing and storage resources. Eucalyptus is an open source IaaS framework implementation which is used for research. However, there is no paper describes how to use all the modules of Eucalyptus to supply security infrastructure service. In accordance with the security requirements of IaaS, a trusted IaaS framework is provided. The framework provides infrastructure service in five steps, and designs protocols which based on Trusted Platform Module (TPM) to achieve these steps. During the designing process, the use of TPM is strictly standardized and trusted third party is concerned in order to restrict the power of service operator. All the protocols pass the security examination of automatic analysis tool-Scyther, so the conclusion that the framework meets the requirements of IaaS is generalized.
出处 《电子与信息学报》 EI CSCD 北大核心 2012年第7期1748-1754,共7页 Journal of Electronics & Information Technology
基金 国家863计划项目(2009AA012201) 现代通信实验室预研项目(9140C1103040902)资助课题
关键词 云计算 基础设施即服务(IaaS) EUCALYPTUS 可信计算 Cloud computing Infrastructure-as-a-Service (IaaS) Eucalyptus Trusted computing
作者简介 通信作者:崔巍mortimercui@gmait.com崔巍:男,1986年生,硕士生,研究方向为信息安全. 李益发:男,1964年生,副教授,硕士生导师,研究方向为信息安全. 斯雪明:男,1966年生,副研究员,研究方向为信息安全.
  • 相关文献

参考文献12

  • 1Luis V, Luis R, and Daniel M. Locking the sky: a survey on IaaS cloud security [J]. Computing, 2011, 91(1): 93-118.
  • 2Daniel D, Rich W, Chris G, et al.. The eucalyptus open- source cloud-computing system [C]. Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, Shanghai, China, 2009: 124-131.
  • 3Nuno S, Krishna G, and Rodrigo R. Towards trusted cloud computing [C]. Proceeding of the 2009 Conference on Hot Topics in Cloud Computing, San Diego, California, 2009: 22-27.
  • 4Khan I, Rehman H, and Anwar Z. Design and deployment of a trusted eucalyptus cloud [C]. 2011 IEEE International Conference on Cloud Computing (CLOUD), Washington DC, 2011:380 387.
  • 5ISO-IEC. 11889-1-2009 Information technology - trusted platform module-Part 2: design principles [S]. ISO, 2009.
  • 6Berthonlon B, Varrette S, and Bouvry P. Certicloud: a novel TPM-based approach to ensure cloud IaaS security [C]. 2011 IEEE International Conference on Cloud Computing(CLOUD), Washington DC, 2011:121 130.
  • 7Dhinesh B, Venkata K, Mohammed Z, et al.. An analysis of security related issues in cloud computing [J]. Communications in Computer and Information Science, 2011 168(2): 180-190.
  • 8Anupam D, Ante D, John M, et al.. Protocol Composition Logic (PCL) [J]. Electronic Notes in Theoretical Computer Science, 2007, 172: 311-358.
  • 9Canetti R. Universally composable security: a new paradigm for cryptographic protocols [C]. Proceeding of Foundations of Computer Science, NY, USA, 2001: 136-145.
  • 10Chaki S and Datta A. ASPIER: an automated framework for verifying security protocol implementations [C]. Computer Security Foundations Symposium, Port Jefferson NY, 2009: 172-185.

同被引文献83

  • 1吴吉义,沈千里,章剑林,沈忠华,平玲娣.云计算:从云安全到可信云[J].计算机研究与发展,2011,48(S1):229-233. 被引量:54
  • 2李梦君,李舟军,陈火旺.基于进程代数安全协议验证的研究综述[J].计算机研究与发展,2004,41(7):1097-1103. 被引量:25
  • 3龚静怡.居家养老—社区养老服务:符合中国国情的城镇养老模式[J].河海大学学报(哲学社会科学版),2004,6(4):72-74. 被引量:96
  • 4BRICKELL E, CAMENISCH J, CHEN L Q. Direct anonymous at- testation[A]. Proceedings of the llth ACM Conference on Computer and Communications security[C]. Washington, DC, USA, 2004.
  • 5Trusted Computing Group. TPM main specification version 1.2[EB/OL]. http://www.trustedcomputinggroup.org/, 2011.
  • 6REID J, NIETO J M G, DAWSON E, et al. Privacy and trusted com- puting[A]. Proceedings of the 14th International Workshop on Data- base and Expert Systems Applications[C]. Prague, Czech Republic, 2003.
  • 7PIRKER M, TOEGEL IL HEIN D, et al. A privacy CA for anonymityand trust[A]. Proceedings of the 2nd International Conference on Trusted Computing[C]. Oxford, UK, 2009.
  • 8CHEN L Q, WARINSCHI B. Security of the TCG privacy~CA solu- tion[A]. Proceedings of the 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous[C]. Hong Kong, China, 2010.
  • 9CHEN L Q, LEE M F, WARINSCHI B. Security of the enhanced TCG privacy-CA solution[A]. Proceedings of the 6th International Confer- ence on Trustworthy Global Computing[C]. Aachen, Germany, 2011.
  • 10WINKLER T, RINNER B. User-centric privacy awareness in video surveillance[J]. Multimedia Systems, 2012, 18(2): 99-121.

引证文献8

二级引证文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部