网络与信息安全学报 ›› 2016, Vol. 2 ›› Issue (10): 36-47.doi: 10.11959/j.issn.2096-109x.2016.00102

• 学术论文 • 上一篇    下一篇

基于小云审大云的云平台可信评测体系结构与技术研究

刘川意1(),潘鹤中1,2,梁露露3,王国峰1,2,方滨兴1,2,4   

  1. 1 哈尔滨工业大学(深圳)计算机科学与技术学院,广东 深圳 518055
    2 北京邮电大学计算机学院,北京 100876
    3 中国信息安全测评中心,北京 100085
    4 东莞电子科技大学电子信息工程研究院,广东 东莞 523000
  • 修回日期:2016-07-08 出版日期:2016-10-01 发布日期:2020-03-17
  • 作者简介:刘川意(1982-),男,四川乐山人,博士,哈尔滨工业大学(深圳)副教授,主要研究方向为云计算与云安全、大规模存储系统、数据保护与数据安全。|潘鹤中(1991-),男,辽本本溪人,北京邮电大学博士生,主要研究方向为云安全、信息安全。|梁露露(1985-),男,湖北襄阳人,博士,中国信息安全测评中心副研究员,主要研究方向为云计算与大数据安全、无线网络安全。|王国峰(1988-),男,山东济宁人,北京邮电大学博士生,主要研究方向为云安全、信息安全、云安全技术、数据加密技术。|方滨兴(1960-),男,江西万年人,中国工程院院士,北京邮电大学教授、博士生导师,主要研究方向为大数据、计算机网络和信息安全。
  • 基金资助:
    国家高技术研究发展计划(“863”计划)基金资助项目(2015AA016001);广东省产学研合作基金资助项目(2016B090921001);山东省自主创新及成果转化专项基金资助项目(2014ZZCX03411)

Cloud Trustworthiness Evaluation as a cloud service:architecture,key technologies and implementations

Chuan-yi LIU1(),He-zhong PAN1,2,Lu-lu LIANG3,Guo-feng WANG1,2,Bin-xing FANG1,2,4   

  1. 1 School of Computer Science and Technology,Harbin Institute of Technology (Shenzhen),Shenzhen 518055,China
    2 School of Computer Science,Beijing University of Posts and Telecommunications,Beijing 100876,China
    3 China Information Technology Security Evaluation Center,Beijing 100085,China
    4 Dongguan University of Electronic Science and Technology Electronic and Information Engineering Institute,Dongguan 523000,China
  • Revised:2016-07-08 Online:2016-10-01 Published:2020-03-17
  • Supported by:
    The National High Technology Research Program of China (863 Program)(2015AA016001);Produc-tion-Study-Research Cooperation Project in Guangdong Province(2016B090921001);Innovation Project in Shandong Province(2014ZZCX03411)

摘要:

提出一种“小云审大云”的云平台可信评测架构,通过引入独立第三方对云平台的可信性进行动态、实时的远程可信数据收集、验证、审计和评价。采用数据流可视化、监控与脱敏技术保障租户数据权益,为租户提供选择可信云平台的依据,为云平台提供证明自身可信的凭据。并突破以下关键技术:1)基于独立第三方的数据采集、行为接入、API代理;2)持续、实时的远程数据收集和数据分析;3)非强侵入式证据收集。

关键词: 云计算, 可信评测, 权限管控, 数据脱敏

Abstract:

A "big clouds audited by a small cloud" scheme was proposed,by introducing an independent trusted third party (TTP) dealing with run-time data collection,verification,audit and evaluation remotely,in a continuous and data-driven model,compared with traditionally certification based audit.The TTP mainly adopts data flow visualization,data monitoring and encryption to protect the rights of users.It provides the basis for users to choose a trusted cloud platform and for cloud platform to prove own trusted credentials.In-depth study,the following key technologies were broken through:1) the introduction of an independent trusted third party as an intermediate layer between cloud platform and users as well as administrators; 2) continuous,real-time remote data collection and data analysis; 3) strong non-intrusive evidence gathering.

Key words: cloud computing, trusted reviews, permissions control, data encryption

中图分类号: 

No Suggested Reading articles found!