Font Size: a A A

Research And Implementation Of Trust Evaluation Technology For Mobile Cloud Resources

Posted on:2018-08-02Degree:MasterType:Thesis
Country:ChinaCandidate:L L ZengFull Text:PDF
GTID:2348330518493310Subject:Information security
Abstract/Summary:PDF Full Text Request
In the process of the development of China's Internet, PC Internet has become increasingly saturated, mobile Internet has shown a blowout development. Mobile devices are increasingly becoming an indispensable tool in our daily lives. Compared with traditional mobile phones and computers, users now prefer smartphones and tablets. Cloud computing is an Internet-based computing method, is the computer technology and information technology to a certain extent, the inevitable outcome. With the popularity of intelligent terminals and the explosive development of mobile Internet, cloud computing and mobile Internet integration of mobile cloud cloud computing has become an important part. However,due to the portable terminal's own portable features, as well as the large number of mobile terminals, cohabitation, mobile cloud resources,security is not guaranteed.In this paper, the security of mobile resources is divided into six aspects: availability, reliability, controllability, confidentiality, integrity and non-repudiation. Focusing on the availability, reliability and controllability is discussed. In this paper, based on the existing IVCE platform, this paper proposes a scheme of trust evaluation based on clustering of mobile cloud resources, which is based on the security,reliability and controllability of mobile resources in this platform project.,The program to achieve the mobile resource security quantification, while improving the mobile cloud resource security.The main research work and achievements are mainly reflected in the following aspects:(1) The method of FCM clustering algorithm is proposed to preprocess the mobile cloud resource before trust evaluation. The resource is divided into three categories: computing resource, network resource and storage type resource. In this way, different types of mobile cloud resource types can correspond to different weights to ensure the relevance and accuracy of the trust evaluation value in the capacity trust evaluation part of the mobile cloud resource in the subsequent trust evaluation. At the same time, Class part correspondence.(2) A Bayesian algorithm based trust assessment method is proposed,which includes two parts: ability trust assessment and behavior trust evaluation. This approach takes into account both the current availability of resources and the availability of history to enable more accurate quantification of resource security.(3) Based on the existing IVCE platform, this paper realizes the relevant modules of resource clustering and resource trust evaluation in the system. The reliability, controllability of mobile resource security in the platform is realized by the scheme of trust evaluation based on clustering.
Keywords/Search Tags:mobile cloud computing, resource clustering, trust evaluation
PDF Full Text Request
Related items