A security architecture for cloud computing alliance

被引:1
|
作者
Jun Z. [1 ]
机构
[1] Department of Computer Science and Technology, Jiangsu Food and Pharmaceutical Science College, Huaian
来源
Jun, Zhao (hyzhaojun@126.com) | 2017年 / Bentham Science Publishers卷 / 10期
关键词
Architecture selfonganizations; Cloud computing alliance; Complex networks; Game theory; Offensive and defensive game; Security systems;
D O I
10.2174/2352096510666170601091846
中图分类号
学科分类号
摘要
Background: Credibility problems in the cloud service are very important issues in cloud computing alliance. Methods: By using the small world model in complex networks, a relationship model of cloud computing alliance can be established; defense game model is established under the cloud alliance by game theory; by combining the self-organization of small world model with self-constraint binding of game model, offensive and defensive game model of incomplete information is realized. Through the simulation experiments, they verify trusted resource management functions in the cloud computing alliance. Results: Moreover, by using unsupervised and supervised management conditions, access requesting nodes for cloud service and comparative analysis of respondents in the cloud service get a better resource management effect. © 2017 Bentham Science Publishers.
引用
收藏
页码:195 / 201
页数:6
相关论文
共 50 条
  • [1] Mobile cloud computing: Architecture and Security
    Wang, Suzhen
    Du, Zhijuan
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2274 - 2281
  • [2] Contribution to Cloud Computing Security Architecture
    Drozdova, M.
    Rusnak, S.
    Segec, P.
    Uramova, J.
    Moravcik, M.
    2017 15TH IEEE INTERNATIONAL CONFERENCE ON EMERGING ELEARNING TECHNOLOGIES AND APPLICATIONS (ICETA 2017), 2017, : 117 - 122
  • [3] An Architecture for Data Security in Cloud Computing
    Sugumaran, M.
    BalaMurugan, B.
    Kamalraj, D.
    2014 WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT 2014), 2014, : 252 - +
  • [4] Cloud computing security: Architecture, mechanism and modeling
    Lin, Chuang
    Su, Wen-Bo
    Meng, Kun
    Liu, Qu
    Liu, Wei-Dong
    Jisuanji Xuebao/Chinese Journal of Computers, 2013, 36 (09): : 1765 - 1784
  • [5] A NOVEL BASED SECURITY ARCHITECTURE OF CLOUD COMPUTING
    Gupta, Subham Kumar
    Rawat, Seema
    Kumar, Praveen
    2014 3RD INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2014,
  • [6] On-Demand Security Architecture for Cloud Computing
    Chen, Jianyong
    Wang, Yang
    Wang, Xiaomin
    COMPUTER, 2012, 45 (07) : 73 - 78
  • [7] Mobile Cloud Computing: Architecture, Advantages and Security Issues
    Fellah, Hadjer
    Mezioud, Chaker
    Batouche, Mohamed Chaouki
    3RD INTERNATIONAL CONFERENCE ON NETWORKING, INFORMATION SYSTEM & SECURITY (NISS'20), 2020,
  • [8] MetaCloudDataStorage Architecture for Big Data Security in Cloud Computing
    Manogaran, Gunasekaran
    Thota, Chandu
    Kumar, M. Vijay
    FOURTH INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTER SCIENCE & ENGINEERING (ICRTCSE 2016), 2016, 87 : 128 - 133
  • [9] Cloud Computing Security Architecture and Key Technologies Research
    Wu, Xianglong
    Wu, Shaobo
    INFORMATION, COMMUNICATION AND EDUCATION APPLICATION, VOL 11, 2013, 11 : 65 - 69
  • [10] Service Security Architecture and Access Control Model for Cloud Computing
    Yan Danfeng
    Yang Fangchun
    Yeap, Tet
    CHINA COMMUNICATIONS, 2011, 8 (06) : 44 - 50