登录 | 注册 | 充值 | 退出 | 公司首页 | 繁体中文 | 满意度调查
综合馆
云计算安全:架构、机制与模型评价
  • 摘要

    随着云计算服务的广泛使用,租户对云计算的安全性提出了越来越高的要求,云计算环境的动态性、随机性、复杂性和开放性使得原有安全方案难以适用,这也阻碍了云计算的进一步发展与应用.文中在分析云计算服务模式特点以及安全挑战的基础上,针对云计算安全架构、机制以及模型评价三个方面展开研究与综述.文中指出云计算的安全架构不仅需要可信根、可信链路以及上层可信服务的安全保证,还需要实现可管、可控的动态安全管理与可度量的安全评价优化过程.文中对已有云计算安全机制和模型评价方法进行了比较分析,最后提出了基于多队列多服务器的云计算安全建模与分析思路.

  • 作者

    林闯  苏文博  孟坤  刘渠  刘卫东  LIN Chuang  SU Wen-Bo  MENG Kun  LIU Qu  LIU Wei-Dong 

  • 作者单位

    清华大学计算机科学与技术系 北京 100084

  • 刊期

    2013年9期 ISTIC EI PKU

  • 关键词

    云计算  安全架构  安全机制  安全模型  安全度量  cloud computing  security architecture  security mechanism  security model  security measurement 

参考文献
  • [1] 林闯,汪洋,李泉林. 网络安全的随机模型方法与评价技术. 计算机学报, 2005,12
  • [2] 樊亚军,刘久文. TPM安全芯片设计与实现. 信息安全与通信保密, 2007,6
  • [3] 林闯. Web服务器集群请求分配和选择的性能分析. 计算机学报, 2000,5
  • [4] B.B. Madan;K.S. Trivedi. Security modeling and quantification of intrusion tolerant systems using attack-response graph. Journal of high speed networks, 2004,4
  • [5] Leveson N.G.;Cha S.S.. Safety verification of Ada programs using software fault trees. IEEE Software, 1991,4
  • [6] Malhotra M.;Trivedi K.S.. Dependability modeling using Petri-nets. IEEE Transactions on Reliability, 1995,3
  • [7] Joanne Bechta Dugan;Kevin J. Sullivan;David Coppit. Developing a low-cost high-quality software tool for dynamic fault-tree analysis. IEEE Transactions on Reliability, 2000,1
  • [8] Detlef Schoder;Kai Fischbach. Peer-to-Peer Prospects. Communications of the ACM, 2003,2
  • [9] Kallepalli C.;Tian J.. Measuring and modeling usage and reliability for statistical Webtesting. IEEE Transactions on Software Engineering, 2001,11
  • [10] Ogle D.M.;Schwan K.. Application-dependent dynamic monitoring of distributed and parallel systems. IEEE Transactions on Parallel and Distributed Systems: A Publication of the IEEE Computer Society, 1993,7
  • [11] Frederic Besson;Thomas Jensen;Daniel Le Metayer. Model checking security properties of control flow graphs. Journal of computer security, 2001,3
  • [12] Yager RR. OWA trees and their role in security modeling using attack trees. Information Sciences: An International Journal, 2006,20
  • [13] IBM. IBM Point of View:Security and Cloud Computing. 2009
  • [14] Tsai W T;Huang Y;Shao Q. EasySaaS:A SaaS development framework. UC Irvine,USA, 2011
  • [15] Li X Y;Zhou L T;Shi Y. A trusted computing environment model in cloud architecture. 山东青岛, 2010
  • [16] Wailly A;Lacoste M;Debar H. Towards multi-layer autonomic isolation of cloud computing and networking resources. la Rochelle,France, 2011
  • [17] Bell M. SOA Modeling Patterns for Service Oriented Discovery and Analysis. Wiley Press, 2009
  • [18] Foster I;Kesselman C;Tuecke S. The anatomy of the grid:Enabling scalable virtual organizations. International Journal of High Performance Computing Applications, 2001,03
  • [19] 张旻晋;桂文明;苏涤生. 从终端到网络的可信计算技术. 信息技术快报, 2006,02
  • [20] Halfond W G J;Anand S;Orso A. Precise interface identification to improve testing and analysis of web applications. Chicago,USA, 2009
  • [21] Michael J B;Drusinsky D;Otani T W. Verification and validation for trustworthy software systems. IEEE Software, 2011,06
  • [22] Davila-Nicanor L;Mejia-Alvarez P. Reliability improvement of web-based software applications. Braunschweig,Germany, 2004
  • [23] Garg V K. Elements of Distributed Computing. Wiley-IEEE Press, 2002
  • [24] Subashini S;Kavitha V. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 2011,01
  • [25] Garfinkel T;Pfaff B;Chow J. Terra:A virtual machine-based platform for trusted computing. ACM SIGOPS Operating Systems Review, 2003,05
  • [26] Santos N;Gummadi K P;Rodrigues R. Towards trusted cloud computing. Berkeley,USA, 2009
  • [27] Bugiel S;Nürnberger S;Sadeghi A R. Twin clouds:An architecture for secure cloud computing. Zurich,Switzerland, 2011
  • [28] Tsai W T;Zhong P;Balasooriya J. An approach for service composition and testing for cloud computing. Chuo-ku,Japan, 2011
  • [29] Bowring J;Orso A;Harrold M J. Monitoring deployed software using software tomography. ACM SIGSOFT Software Engineering Notes, 2003,01
  • [30] Sigelman B H;Barroso L A;Burrows M. Dapper,a large-scale distributed systems tracing infrastructure. Google Research, 2010
  • [31] Chen M Y;Kiciman E;Fratkin E. Pinpoint:Problem determination in large,dynamic internet services. Washington DC USA, 2002
  • [32] Mell P;Grance T. The NIST definition of cloud computing (draft). NIST Special Publication, 2011
  • [33] Garfinkel T;Rosenblum M. A virtual machine introspection based architecture for intrusion detection. San Diego,California,USA, 2003
  • [34] Jones S T;Arpaci-Dusseau A C;Arpaci-Dusseau R H. VMM-based hidden process detection and identification using Lycosid. Seattle,USA, 2008
  • [35] Jiang X;Wang X. "Out-of-the-box" monitoring of VM-based high-interaction honeypots. Berlin Heidelberg:Springer-Verlag, 2007
  • [36] Seshadri A;Luk M;Shi E. Pioneer:Verifying code integrity and enforcing untampered code execution on legacy systems. ACM SIGOPS Operating Systems Review, 2005,05
  • [37] Whittaker J;Google V. Microsoft,and the Dev:Test Ratio Debate. 2008
  • [38] Payne B D;Carbone M;Sharif M. Lares:An architecture for secure active monitoring using virtualization. Oakland,USA, 2008
  • [39] Jones S T;Arpaci-Dusseau A C;Arpaci-Dusseau R H. Antfarm:Tracking processes in a virtual machine environment. Boston,USA, 2006
  • [40] Gu L;Cheung S C. Constructing and testing privacy-aware services in a cloud computing environment:Challenges and opportunities. 北京, 2009
  • [41] King T M;Ganti A S. Migrating autonomic self-testing to the cloud. France:Paris, 2010
  • [42] Emig C;Brandt F;Kreuzer S. Identity as a service Towards a service-oriented identity management architecture. Berlin Heidelberg:Springer-Verlag, 2007
  • [43] Jiang X;Xu D. VIOLIN:Virtual internetworking on overlay infrastructure. Berlin Heidelberg:Springer-Verlag, 2005
  • [44] Bari M;Boutaba R;Esteves R. Data center network virtualization:A survey. IEEE Communication Surveys & Tutorials, 2012,02
  • [45] Badger L;Grance T;Patt-Corner R. Cloud computing synopsis and recommendations. NIST Special Publication, 2012
  • [46] Kruegel C;Kirda E;Mutz D. Automating mimicry attacks using static binary analysis. Baltimore,Maryland,USA, 2005
  • [47] Krebs R;Momm C;Kounev S. Metrics and techniques for quantifying performance isolation in cloud environments. Bertinoro,Italy, 2012
  • [48] Catteddu D. Cloud computing:Benefits,risks and recommendations for information security. Web Application Security, 2010
  • [49] Heddaya A;Heldal A. Reliability,availability,dependability and performability:A user-centered view. Computer Science Department,Boston University, 1996
  • [50] Huang J;Lin C;Kong X. Modeling and analysis of dependability attributes of service computing systems. Washington DC USA, 2011
  • [51] Chen Y;Paxson V;Katz R H. What' s new about cloud computing security? Report No.UCB/EECS 2010-5. Berkley:University of California, 2010-1
  • [52] Brall A;Hagen W;Tran H. Reliability block diagram modeling Comparisons of three software packages. Orlando(USA), 2007
  • [53] Abd-Allah A. Extending reliability block diagrams to software architectures. System, 1997,80
  • [54] Saini V;Duan Q;Paruchuri V. Threat modeling using attack trees. Journal of Computing Sciences in Colleges, 2008,04
  • [55] Jhala R;Majumdar R. Software model checking. ACM Computing Surveys, 2009,04
  • [56] Zech P. Risk-based security testing in cloud computing environments. Berlin,Germany, 2011
  • [57] Li D;Liu C;Wei Q. RBAC-based access control for SaaS systems. Zibo,China, 2010
  • [58] Ferraiolo D F;Kuhn D R. Role-based access controls. 2009
  • [59] Hsu F;Chen H;Ristenpart T. Back to the future:A framework for automatic malware removal and system repair. New Orleans,USA, 2006
  • [60] Goel A;Po K;Farhadi K. The taser intrusion recovery system. ACM SIGOPS Operating Systems Review, 2005,05
  • [61] Suh G E;Lee J W;Zhang D. Secure program execution via dynamic information flow tracking. ACM Sigplan Notices, 2004,11
  • [62] Provos N. Improving host security with system call policies. Washington DC USA, 2003
  • [63] Almorsy M;Grundy J;Müller I. An analysis of the cloud computing security problem. Sydney,Austrilia, 2010
  • [64] Bernstein L. Trustworthy software systems. ACM SIGSOFT Software Engineering Notes, 2005,01
  • [65] Avizienis A;Laprie J C;Randell B. Basic concepts and taxonomy of dependable and secure computing. IEEE Trans actions on Dependable and Secure Computing, 2004,01
  • [66] Martinez J;Muro P;Silva M. Modeling,validation and soft ware implementation of production systems using high level Petri nets. Raleigh,NC,USA, 1987
  • [67] Ristenpart T;Tromer E;Shacham H. Hey,you,get off of my cloud:exploring information leakage in third-party compute clouds. Chicago,USA, 2009
  • [68] Hong J E;Bae D H. Software modeling and analysis using a hierarchical object-oriented Petri net. Information Sciences, 2000,01
  • [69] Wang Y;Lin C;Li Q L. Performance analysis of email systems under three types of attacks. Performance Evaluation, 2010,06
  • [70] Madan B B;Go(s)eva-Popstojanova K;Vaidyanathan K. A method for modeling and quantifying the security attributes of intrusion tolerant systems. Performance Evaluation, 2004,01
  • [71] Fujimoto R;Okamura H;Dohi T. Security evaluation of an intrusion tolerant system with MRSPNs. Fukuoka,Japan, 2009
  • [72] Jensen K. A brief introduction to eoloured petri nets. Berlin Heidelberg:Springer-Verlag, 1997
  • [73] Bernardi S;Bobbio A;Donatelli S. Petri nets and dependability. Berlin Heidelberg:Springer-Verlag, 2004
  • [74] Prabhakaran V;Arpaci-Dusseau A C;Arpaci-Dusseau R H. Analysis and evolution of journaling file systems. Anaheim,USA, 2005
  • [75] Qin F;Tucek J;Sundaresan J. Rx:treating bugs as allergies A safe method to survive software failures. ACM SIGOPS Operating Systems Review, 2005,05
  • [76] Srinivasan S M;Kandula S;Andrews C R. Flashback:A lightweight extension for rollback and deterministic replay for software debugging. University of Illinois at Urbana,Champaign, 2004
  • [77] Dalton G C;Mills R F;Colombi J M. Analyzing attack trees using generalized stochastic Petri nets. New York,USA, 2006
  • [78] Hwang K;Kulkareni S;Hu Y. Cloud security with virtualized defense and reputation-based trust management. 四川成都, 2009
  • [79] Kaufman L M. Data security in the world of cloud computing. IEEESecurity& Privacy, 2009,04
查看更多︾
相似文献 查看更多>>
34.228.55.57