Font Size: a A A

Research On Entropy-based Security Service Mashup In Cloud Computing Environment

Posted on:2013-12-30Degree:MasterType:Thesis
Country:ChinaCandidate:L NieFull Text:PDF
GTID:2248330392457875Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Service Mashup, as an innovation model of polymerization and reuse of Internetapplication Services in the cloud computing environment, makes simple and easyimplementation for users to create the new application services by the open Serviceinterfaces. However, intrinsic characteristics of the cloud, such as the distribution andautonomy of cloud service providers and the dynamics, have put forward many newchallenges for security mashup in cloud environment. The existing researches have mainlyfocused on selecting mashup services based on Quality of Service (QoS), which haveconsidered little of the user’s security requirement. Therefore, the researches of a set ofsecurity mashup services to satisfy the functional and non-functional requirements, is ofgreat importance.Firstly, we propose an entropy-based security assessment method by detailed securityanalysis of service mashup in cloud computing environment. A formal analysis ofentropy-based security service mashup is presented by the introduction of the dissipativestructure. By hierarchically extracting the environment-service-user three-dimensionalfactors from the complexity security factors and the combination of analytic hierarchyprocess (AHP) and entropy weight method, a single service security entropy and servicemashup security entropy is established. Furthermore, a service mashup algorithm isdeveloped based on the template, which can generate templates meeting a particularfunction in the QoS and security entropy value multi-objective constraints. Through thetemplates, what the cloud users need to do is calling these templates without consideringthe combination of internal logic, which increases its reusability. Finally, we haveimplemented a simulation of service mashup and conducted extensive experiments usingsimulations of different sizes of services and security factors. Experimental results showthe feasibility and efficiency of the security service mashup method.
Keywords/Search Tags:cloud computing, service mashup, security entropy, Qos, users’ securityneeds
PDF Full Text Request
Related items