天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

當(dāng)前位置:主頁(yè) > 科技論文 > 搜索引擎論文 >

基于數(shù)據(jù)流的云服務(wù)安全性評(píng)估技術(shù)研究

發(fā)布時(shí)間:2018-03-16 19:31

  本文選題:數(shù)據(jù)流 切入點(diǎn):云計(jì)算 出處:《哈爾濱工業(yè)大學(xué)》2012年碩士論文 論文類型:學(xué)位論文


【摘要】:“網(wǎng)絡(luò)即計(jì)算機(jī)”的想法早在80年代就被Sun公司(Sun Microsystems)提出過(guò),可謂是云計(jì)算思想的鼻祖,而直到2006年Google的CEO施密特才在搜索引擎大會(huì)(SES San Jose2006)上正式提出了“云計(jì)算”的概念,使其迅速成為了計(jì)算機(jī)領(lǐng)域最火的關(guān)鍵詞。云計(jì)算徹底改變了電子信息產(chǎn)業(yè)的經(jīng)營(yíng)模式和發(fā)展方向,它使用規(guī)模龐大的服務(wù)器集群組成資源池提供給用戶幾近無(wú)限量的計(jì)算和存儲(chǔ)能力,它不僅為云的開(kāi)發(fā)者帶來(lái)了巨大的經(jīng)濟(jì)效益,而且改變了眾多中小企業(yè)的經(jīng)營(yíng)模式,同時(shí)它節(jié)能環(huán)保的特點(diǎn)也非常符合當(dāng)今經(jīng)濟(jì)發(fā)展的需求。 在云計(jì)算給人們帶來(lái)便捷服務(wù)和經(jīng)濟(jì)利益的同時(shí),云計(jì)算所帶來(lái)的新的安全威脅也在深深的困擾著用戶和企業(yè),由于云計(jì)算的組織架構(gòu)和服務(wù)模式較傳統(tǒng)的主機(jī)和服務(wù)器有著天壤之別,云中的安全風(fēng)險(xiǎn)來(lái)自各方各面,因而傳統(tǒng)的安全措施和風(fēng)險(xiǎn)管理技術(shù)在云平臺(tái)上存在各方面的局限性,而各大IT公司為云計(jì)算所開(kāi)發(fā)的安全工具一般都只能針對(duì)某個(gè)特定“云”的特定問(wèn)題,而沒(méi)有一個(gè)通用而有效的解決方案。而且現(xiàn)有的針對(duì)云計(jì)算的風(fēng)險(xiǎn)評(píng)估只能針對(duì)整個(gè)云平臺(tái)來(lái)進(jìn)行,不能細(xì)化到云平臺(tái)上單個(gè)服務(wù)的安全狀態(tài)。因此本文提出一種針對(duì)云上服務(wù)的風(fēng)險(xiǎn)評(píng)估方法,通過(guò)分析服務(wù)的歷史行為量化評(píng)估威脅出現(xiàn)的可能性。 本文提出的方法通過(guò)跟蹤和監(jiān)控服務(wù)的行為,從中提取出代表服務(wù)行為的數(shù)據(jù)流,,并通過(guò)與服務(wù)正常行為即服務(wù)模式的對(duì)比,識(shí)別出其中隱藏的威脅與風(fēng)險(xiǎn),并用歷史行為中出現(xiàn)威脅的概率來(lái)量化評(píng)估威脅的程度。因?yàn)榛跀?shù)據(jù)流的方法監(jiān)控?cái)?shù)據(jù)在不同服務(wù)與進(jìn)程間的流動(dòng),所以此方法能夠同時(shí)評(píng)估來(lái)自云平臺(tái)內(nèi)部和外部的威脅,包括來(lái)自云平臺(tái)的管理者、用戶和服務(wù)提供商的威脅,因此本文提出的方法適合于云計(jì)算環(huán)境中的風(fēng)險(xiǎn)評(píng)估。最后通過(guò)模擬云服務(wù),實(shí)驗(yàn)證明了此方法的可行性,為云計(jì)算中的風(fēng)險(xiǎn)評(píng)估提出了一種新的思路,提供一種通用的方法,為云計(jì)算安全管理研究提供了參考。
[Abstract]:The idea of "network as a computer" was put forward by Sun as early as 80s. It can be said that it is the originator of cloud computing. It was not until 2006 that CEO Schmidt of Google formally put forward the concept of "cloud computing" at the search engine conference SES San Jose2006. Cloud computing has completely changed the business model and development direction of the electronic information industry. It uses a large server cluster to form a pool of resources to provide users with almost unlimited computing and storage capabilities. It not only brings tremendous economic benefits to cloud developers, but also changes the business model of many small and medium-sized enterprises. At the same time, its energy-saving and environmental protection features are also very in line with the needs of today's economic development. Cloud computing brings people convenient services and economic benefits, at the same time, cloud computing brings new security threats also deeply perplexing users and enterprises. Because the organizational structure and service mode of cloud computing are different from the traditional hosts and servers, the security risks in the cloud come from all sides, so the traditional security measures and risk management technology have various limitations on the cloud platform. The security tools developed by major IT companies for cloud computing are generally limited to a specific "cloud" issue. There is no universal and effective solution. And the existing risk assessment for cloud computing can only be done for the entire cloud platform, The security status of a single service on a cloud platform cannot be refined. Therefore, this paper proposes a risk assessment method for services on the cloud, which quantifies the possibility of threat by analyzing the historical behavior of the service. The method proposed in this paper extracts the data stream representing the service behavior by tracking and monitoring the behavior of the service, and identifies the hidden threats and risks by comparing with the normal service behavior namely the service pattern. Because a data-flow based approach monitors the flow of data between services and processes, this method can assess threats from both inside and outside the cloud platform at the same time. The method proposed in this paper is suitable for risk assessment in cloud computing environment. Finally, the feasibility of this method is proved by simulating cloud services. This paper provides a new idea for risk assessment in cloud computing, a general method and a reference for the research of cloud computing security management.
【學(xué)位授予單位】:哈爾濱工業(yè)大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2012
【分類號(hào)】:TP309

【參考文獻(xiàn)】

相關(guān)期刊論文 前10條

1 閆強(qiáng),陳鐘,段云所,王立福;信息系統(tǒng)安全度量與評(píng)估模型[J];電子學(xué)報(bào);2003年09期

2 謝曉蘭;劉亮;趙鵬;;面向云計(jì)算基于雙層激勵(lì)和欺騙檢測(cè)的信任模型[J];電子與信息學(xué)報(bào);2012年04期

3 網(wǎng)界;;公有云vs私有云 到底誰(shuí)更安全?[J];中國(guó)數(shù)字電視;2011年12期

4 劉宇芳;;云計(jì)算及其實(shí)質(zhì)的探究[J];惠州學(xué)院學(xué)報(bào)(自然科學(xué)版);2010年06期

5 高云璐;沈備軍;孔華鋒;;基于SLA與用戶評(píng)價(jià)的云計(jì)算信任模型[J];計(jì)算機(jī)工程;2012年07期

6 黃汝維;桂小林;余思;莊威;;云環(huán)境中支持隱私保護(hù)的可計(jì)算加密方法[J];計(jì)算機(jī)學(xué)報(bào);2011年12期

7 朱國(guó)強(qiáng),劉真,李宗伯;對(duì)計(jì)算機(jī)系統(tǒng)中程序行為的分析和研究[J];計(jì)算機(jī)應(yīng)用;2005年12期

8 張建勛;古志民;鄭超;;云計(jì)算研究進(jìn)展綜述[J];計(jì)算機(jī)應(yīng)用研究;2010年02期

9 馮本明;唐卓;李肯立;;云環(huán)境中存儲(chǔ)資源的風(fēng)險(xiǎn)計(jì)算模型[J];計(jì)算機(jī)工程;2011年11期

10 胡慧;王輝;;云計(jì)算技術(shù)現(xiàn)狀與發(fā)展趨勢(shì)分析[J];軟件導(dǎo)刊;2009年09期

相關(guān)博士學(xué)位論文 前1條

1 葉建偉;云計(jì)算系統(tǒng)中作業(yè)安全技術(shù)研究[D];哈爾濱工業(yè)大學(xué);2011年



本文編號(hào):1621368

資料下載
論文發(fā)表

本文鏈接:http://www.sikaile.net/kejilunwen/sousuoyinqinglunwen/1621368.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶b2bee***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com