Font Size: a A A

Trustworthiness Evaluation Model For Distributed Computing Nodes

Posted on:2020-12-02Degree:MasterType:Thesis
Country:ChinaCandidate:Y LinFull Text:PDF
GTID:2428330623456482Subject:Engineering
Abstract/Summary:PDF Full Text Request
With the rapid development of Internet technology,the centralized system architecture is far from meeting the needs of people's daily life and work,both from the perspective of storage capabilities and the provision of massive network service capabilities.Therefore,research based on distributed system architecture is more in line with the needs of modern network services and more in line with the development trend of the entire Internet.However,research on trusted research in the distributed field,especially based on the Trusted 3.0 idea,is relatively rare.Therefore,this paper will be based on the distributed system architecture,drawing on the idea of the Trusted 3.0 theory to carry out detailed and in-depth research.First of all,this paper has carried out preliminary research and analysis on the distributed system architecture.Secondly,this paper makes a detailed study based on the research ideas of Trusted 3.0,especially for the triple protection framework of active immunization.This paper has filled in and deeply studied the content of its architecture.In addition,this paper also studies the characteristics of the distributed system architecture,and organically combines it with the idea of Trusted 3.0.Ultimately,it is used in the credible assessment of data source trustworthiness assessment and software behavior of distributed nodes.In the main part of this paper,this paper focuses on the credible evaluation of data under the distributed system architecture and the credible evaluation of the software of distributed nodes.In the credible evaluation of data sources,this paper uses a credible evidence-based approach to evaluate data sources.It includes detailed research and analysis on the definition,collection,extraction,evaluation and storage of credible evidence,and finally a scientific evaluation scheme based on credible evidence.In the trusted evaluation part of software behavior of distributed nodes,this paper uses logbased method to record and monitor the software's behaviors such as software resource consumption(I/O),transaction submission,and exceptions and warnings.By comparing with standard sample samples,this paper can make a credible assessment of the evidence of data sources in the production environment and the software behavior of distributed nodes.Finally,this paper conducts a credible evaluation and identification of the software behavior of distributed nodes in the production environment through simulation experiments.The results show that the software behaviors with credible problems can be evaluated more accurately,and some active immunization measures are also preliminary researched in this paper,which provides a way of thinking for research in this field.In this paper,this paper not only studies the theory of trusted computing and the data source of distributed environment and the credible evaluation of software behavior of distributed nodes.This paper also combines the popular distributed middleware technology and data processing framework to combine theoretical research with practical engineering,and provides certain technical reference and practice for the specific trusted scheme landing.
Keywords/Search Tags:Distributed Computing, Trusted Node, Trusted 3.0, Data Source Trusted, Software Behavior, Evaluation Model
PDF Full Text Request
Related items