形式化方法在云计算中的应用研究
发布时间:2018-11-12 14:17
【摘要】:为推进云计算的发展,本文利用形式化方法对云计算系统的形式语义进行了刻画,并在其基础之上,对云计算中的变化影响分析问题和数据安全性评测问题进行了较为深入地研究,主要工作如下: 1)利用抽象源对云计算系统的形式语义进行了刻画。基于在本体中引入动态语义的思想提出了一种新的知识表示方法——抽象源,,利用抽象源从云的共性和特性两个角度对云计算系统的形式语义进行了刻画,并通过云服务的一个实例SCSKP对该方法的有效性进行了说明。 2)对云计算系统中“变化”的影响进行了分析。构建了一种包含云中“变化”信息的变化传播模型,定义了一种能对该模型进行形式化表示的编码CTMC,并基于变化传播模型和CTMC编码给出了一种可以对云中常见的“变化”影响进行分析的方法。 3)利用tabular表达式通用模型对云计算系统进行了描述。在tabular表达式通用模型中扩展了一些新的表类型,给出了一种以抽象源为媒介用tabular表达式对云计算系统进行描述的方法,增强了抽象源的适用性。 4)对SCSKP中数据的安全性进行了分析评测。基于SCSKP的抽象源描述分析了SCSKP的安全防护能力,利用马尔可夫模型对SCSKP中各种非法入侵发生的概率进行了分析,基于分析结果计算了非法入侵的损失期望。
[Abstract]:In order to promote the development of cloud computing, the formal method is used to describe the formal semantics of cloud computing system. The change impact analysis and data security evaluation in cloud computing are studied in depth. The main work is as follows: 1) the formal semantics of cloud computing systems are described by abstract sources. Based on the idea of introducing dynamic semantics into ontology, a new knowledge representation method, abstract source, is proposed. The formal semantics of cloud computing system is described from two aspects: generality and characteristic of cloud. The effectiveness of this method is illustrated by an example of cloud service SCSKP. 2) analyze the influence of "change" in cloud computing system. A change propagation model containing "change" information in the cloud is constructed, and a coded CTMC, is defined to formalize the model. Based on the change propagation model and CTMC coding, a method to analyze the influence of "change" is presented. 3) the general model of tabular expression is used to describe cloud computing system. Some new table types are extended in the general model of tabular expressions, and a method of describing cloud computing systems using tabular expressions as the medium of abstract source is presented, which enhances the applicability of abstract sources. 4) the data security in SCSKP is analyzed and evaluated. Based on the abstract source description of SCSKP, the security protection ability of SCSKP is analyzed. The probability of various illegal intrusions in SCSKP is analyzed by Markov model, and the loss expectation of illegal intrusion is calculated based on the analysis results.
【学位授予单位】:吉林大学
【学位级别】:博士
【学位授予年份】:2014
【分类号】:TP393.09;TP309.2
[Abstract]:In order to promote the development of cloud computing, the formal method is used to describe the formal semantics of cloud computing system. The change impact analysis and data security evaluation in cloud computing are studied in depth. The main work is as follows: 1) the formal semantics of cloud computing systems are described by abstract sources. Based on the idea of introducing dynamic semantics into ontology, a new knowledge representation method, abstract source, is proposed. The formal semantics of cloud computing system is described from two aspects: generality and characteristic of cloud. The effectiveness of this method is illustrated by an example of cloud service SCSKP. 2) analyze the influence of "change" in cloud computing system. A change propagation model containing "change" information in the cloud is constructed, and a coded CTMC, is defined to formalize the model. Based on the change propagation model and CTMC coding, a method to analyze the influence of "change" is presented. 3) the general model of tabular expression is used to describe cloud computing system. Some new table types are extended in the general model of tabular expressions, and a method of describing cloud computing systems using tabular expressions as the medium of abstract source is presented, which enhances the applicability of abstract sources. 4) the data security in SCSKP is analyzed and evaluated. Based on the abstract source description of SCSKP, the security protection ability of SCSKP is analyzed. The probability of various illegal intrusions in SCSKP is analyzed by Markov model, and the loss expectation of illegal intrusion is calculated based on the analysis results.
【学位授予单位】:吉林大学
【学位级别】:博士
【学位授予年份】:2014
【分类号】:TP393.09;TP309.2
【参考文献】
相关期刊论文 前10条
1 周宁;谢俊元;;基于定性多用户偏好的Web服务选择[J];电子学报;2011年04期
2 王鹏;孟丹;詹剑锋;涂碧波;;数据密集型计算编程模型研究进展[J];计算机研究与发展;2010年11期
3 张逢U
本文编号:2327355
本文链接:https://www.wllwen.com/guanlilunwen/ydhl/2327355.html