A security architecture for cloud computing alliance

被引:1
|
作者
Jun Z. [1 ]
机构
[1] Department of Computer Science and Technology, Jiangsu Food and Pharmaceutical Science College, Huaian
来源
Jun, Zhao (hyzhaojun@126.com) | 2017年 / Bentham Science Publishers卷 / 10期
关键词
Architecture selfonganizations; Cloud computing alliance; Complex networks; Game theory; Offensive and defensive game; Security systems;
D O I
10.2174/2352096510666170601091846
中图分类号
学科分类号
摘要
Background: Credibility problems in the cloud service are very important issues in cloud computing alliance. Methods: By using the small world model in complex networks, a relationship model of cloud computing alliance can be established; defense game model is established under the cloud alliance by game theory; by combining the self-organization of small world model with self-constraint binding of game model, offensive and defensive game model of incomplete information is realized. Through the simulation experiments, they verify trusted resource management functions in the cloud computing alliance. Results: Moreover, by using unsupervised and supervised management conditions, access requesting nodes for cloud service and comparative analysis of respondents in the cloud service get a better resource management effect. © 2017 Bentham Science Publishers.
引用
收藏
页码:195 / 201
页数:6
相关论文
共 50 条
  • [21] IP Based Security Architecture of Virtual Network in Cloud Computing System
    Yang, Jong-Sung
    Choi, Hyoung-Kee
    2012 8TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2012, : 709 - 715
  • [22] NetSecCC: A scalable and fault-tolerant architecture for cloud computing security
    Jin He
    Mianxiong Dong
    Kaoru Ota
    Minyu Fan
    Guangwei Wang
    Peer-to-Peer Networking and Applications, 2016, 9 : 67 - 81
  • [23] NSCC: Self-service Network Security Architecture for Cloud Computing
    He, Jin
    Dong, Mianxiong
    Ota, Kaoru
    Fan, Minyu
    Wang, Guangwei
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 444 - 449
  • [24] Security in Cloud Computing
    Rishitha
    Reshmi, T. R.
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING (ICRTAC-CPS 2018), 2018, : 14 - 20
  • [25] Security in Cloud Computing
    Sharma, Vani Dayal
    Agarwai, Somya
    Moin, Syeda Shira
    Qadeer, Mohammed Abdul
    2017 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2017, : 234 - 239
  • [26] Security in cloud computing
    Gritzalis, Stefanos
    Mitchell, Chris
    Thuraisingham, Bhavani
    Zhou, Jianying
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (02) : 95 - 96
  • [27] Cloud computing architecture
    Kim, Won
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2013, 9 (03) : 287 - 303
  • [28] Alliance Mechanism Based on Cloud Computing
    Xu, Jing
    Yang, Shuangqi
    Yu, Kui
    INFORMATION COMPUTING AND APPLICATIONS, PT 2, 2012, 308 : 514 - 520
  • [29] A Survey of Cloud Computing and Cloud Security
    Sui, Xin
    Sui, Yi
    PROCEEDINGS OF THE 2018 8TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION AND INFORMATION (MEICI 2018), 2018, 163 : 284 - 287
  • [30] Cloud computing and cloud security in China
    Zhang, Shaohe
    Jiang, Cuenyun
    Wang, Ruxin
    ADVANCES IN MATERIALS, MACHINERY, ELECTRONICS II, 2018, 1955