earticle

논문검색

Research on the Security based on Utility Theory in Cloud Computing Environment

초록

영어

This paper focuses on the research of optimizing the safety and utility, proposing safety policy optimized model in cloud computing environment based on stochastic programming theory, building mathematical models which are on the basis of ensured data security to enhance the users’ utility, model analysis and optimization, and ultimately get the best optimized configuration of security policy in the cloud computing environment to guide the formulation and dynamic adjustment of access control policy in cloud computing environment, and to meet the users’ requirements, such as response time, resources availability and other utility requirements.

목차

Abstract
 1. Introduction
 2. The Security Situation in the Cloud Computing Environment
 3. Dynamic Access Control Model based on the Certificate
  3.1 User access control management in cloud computing: when an access request is online,
  3.2 Simulation experiments:
 4. User Utility Analysis in Cloud Computing Environment based on Risk
  4.1. The user utility function:
  4.2. Simulation analysis:
 5. Conclusion
 Acknowledgements
 References

저자정보

  • JieHui Ju Zhejiang University of Science & Technology, Hangzhou 310023, China, University of Colorado Boulder, Colorado 80309-0xxx, USA
  • ZhongYou Wang Zhejiang Communications Industry Services Co,Ltd.,Hangzhou 310050, China
  • WenJuan Li Key Lab of E-business Market Application Technology of Guangdong Province, Guangzhou 510320, China,Key Lab of E-Business, Hangzhou Normal University, Hangzhou 310036, China
  • WeiZheng Bao Surveying and Mapping Management Office, Jinhua Planning Bureau, Jinhua Zhejiang 321000, China
  • Ya Wang The Second Surveying and Mapping Institute of Zhejiang Province, Hangzhou 310012, China

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.