A security architecture for cloud computing alliance

被引:1
作者
Jun Z. [1 ]
机构
[1] Department of Computer Science and Technology, Jiangsu Food and Pharmaceutical Science College, Huaian
关键词
Architecture selfonganizations; Cloud computing alliance; Complex networks; Game theory; Offensive and defensive game; Security systems;
D O I
10.2174/2352096510666170601091846
中图分类号
学科分类号
摘要
Background: Credibility problems in the cloud service are very important issues in cloud computing alliance. Methods: By using the small world model in complex networks, a relationship model of cloud computing alliance can be established; defense game model is established under the cloud alliance by game theory; by combining the self-organization of small world model with self-constraint binding of game model, offensive and defensive game model of incomplete information is realized. Through the simulation experiments, they verify trusted resource management functions in the cloud computing alliance. Results: Moreover, by using unsupervised and supervised management conditions, access requesting nodes for cloud service and comparative analysis of respondents in the cloud service get a better resource management effect. © 2017 Bentham Science Publishers.
引用
收藏
页码:195 / 201
页数:6
相关论文
共 16 条
[1]  
Xinfeng Y., Kecheng L., Research on the architecture of cloud computing alliance, Micro Comput. Applic., 3, pp. 23-25, (2012)
[2]  
Yum L.Q., Research on cloud resource scheduling Methodacross cloud computing federation, Wuhan Uni. Technol., 3, pp. 9-10, (2013)
[3]  
Yi M., Research and Implementation of Hadoop File Management System Based on the Access, (2013)
[4]  
Gang C., Pingpeng Y., Jinxiang D., Two layer collaborative application access control model of multi policy, Comput. Aided Des. Comput. Graphics, 4, pp. 420-426, (2014)
[5]  
Ardagna D., Casolari S., Colajanni M., Dual time-scale distributed capacity allocation andload redirect algorithms for cloud systems, J. Parallel Distribut.Comput., 34, pp. 796-808, (2012)
[6]  
Benedetto F., Izzo D., Performance improvements of power management in CDMA systems by adaptive modulation, 36Th IEEE Int. Conf. Telecommun. Signal Proces., (TSP 2013), pp. 2-4, (2013)
[7]  
Toporkova V., Toporkova A., Bobchenkov A., Resource selection algorithms for economic scheduling in distributed systems, Procedia Comput. Sci., 52, pp. 2267-2276, (2011)
[8]  
Liyun F., Sa100.11A Research and Development on Protocol Stack-Research and Implementation of Resource Allocation Key Technologies, (2010)
[9]  
Ping L.Z., Research on Resource Distribution Strategy in Cloud Computing, (2013)
[10]  
Benedetto F., Izzo D., A joint modulation, rate, and power control game theoretic approach for uplink CDMA communications, J. Commun. (Joc), 9, 3, pp. 271-278, (2013)