A security architecture for cloud computing alliance

被引:1
|
作者
Jun Z. [1 ]
机构
[1] Department of Computer Science and Technology, Jiangsu Food and Pharmaceutical Science College, Huaian
来源
Jun, Zhao (hyzhaojun@126.com) | 2017年 / Bentham Science Publishers卷 / 10期
关键词
Architecture selfonganizations; Cloud computing alliance; Complex networks; Game theory; Offensive and defensive game; Security systems;
D O I
10.2174/2352096510666170601091846
中图分类号
学科分类号
摘要
Background: Credibility problems in the cloud service are very important issues in cloud computing alliance. Methods: By using the small world model in complex networks, a relationship model of cloud computing alliance can be established; defense game model is established under the cloud alliance by game theory; by combining the self-organization of small world model with self-constraint binding of game model, offensive and defensive game model of incomplete information is realized. Through the simulation experiments, they verify trusted resource management functions in the cloud computing alliance. Results: Moreover, by using unsupervised and supervised management conditions, access requesting nodes for cloud service and comparative analysis of respondents in the cloud service get a better resource management effect. © 2017 Bentham Science Publishers.
引用
收藏
页码:195 / 201
页数:6
相关论文
共 50 条
  • [11] An Integrated Architecture for Maintaining Security in Cloud Computing Based on Blockchain
    Awadallah, Ruba
    Samsudin, Azman
    Teh, Je Sen
    Almazrooie, Mishal
    IEEE ACCESS, 2021, 9 : 69513 - 69526
  • [12] Security Architecture based on Defense in Depth for Cloud Computing Environment
    Mavroeidakos, Theodoros
    Michalas, Angelos
    Vergados, Dimitrios D.
    2016 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2016,
  • [13] CyberGuarder: A virtualization security assurance architecture for green cloud computing
    Li, Jianxin
    Li, Bo
    Wo, Tianyu
    Hu, Chunming
    Huai, Jinpeng
    Liu, Lu
    Lam, K. P.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2012, 28 (02): : 379 - 390
  • [14] A Cloud Computing Based Architecture for Cyber Security Situation Awareness
    Yu, Wei
    Xu, Guobin
    Chen, Zhijiang
    Moulema, Paul
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 488 - 492
  • [15] NetSecCC: A scalable and fault-tolerant architecture for cloud computing security
    He, Jin
    Dong, Mianxiong
    Ota, Kaoru
    Fan, Minyu
    Wang, Guangwei
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (01) : 67 - 81
  • [16] Security in cloud computing
    International Journal of Information Security, 2014, 13 : 95 - 96
  • [17] Smart Grid with Cloud Computing : Architecture, Security Issues and Defense Mechanism
    Kaur, Kuljeet
    Kumar, Neeraj
    2014 9TH INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS (ICIIS), 2014, : 599 - 604
  • [18] Security for Cloud Computing
    Nazeer, Shahrin A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (07): : 51 - 60
  • [19] On Cloud Computing Security
    Bai, Yun
    Policarpio, Sean
    RECENT TRENDS IN WIRELESS AND MOBILE NETWORKS, 2011, 162 : 388 - 396
  • [20] Cloud Computing Security
    Carlin, Sean
    Curran, Kevin
    INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2011, 3 (01) : 14 - 19