期刊文献+

基于OpenFlow的云计算监控架构

Monitoring Framework Based on OpenFlow in Clouds
下载PDF
导出
摘要 云计算中网络的监控任务是一件重要和复杂的工作.在云计算网络中的安全设备不仅要监控外网流量,还要监控内网流量.现有使用SDN和OpenFlow对网络流量监控的研究都基于每种设备仅存在一台的前提,受限于安全设备的数量,性能和效率受到限制.本文在OpenFlow上提出了一种云计算网络流量监控架构和算法,支持多台同类型的设备同时工作,可以在云计算网络中,实现灵活高效的网络流量监控. Monitoring networks in cloud is important and complex. In the cloud computing, network security equipment does not only monitor external network traffic, but also review the traffic within the network to resist attacks. There are some researches that introduce SDN and Open Flow to route the traffic to security device. However, these methods are limited by the number of devices of the same type, and their performance is hence affected. In this paper, we propose a new flexible cloud computing monitoring framework based on Open Flow. And we also propose the corresponding algorithm to improve the performance and efficiency.By doing so,we can monitor the network traffic efficiently and flexibly.
出处 《计算机系统应用》 2017年第11期271-276,共6页 Computer Systems & Applications
关键词 云计算 网络 监控 OpenFlow 算法 cloud computing network monitoring OpenFlow algorithm
  • 相关文献

参考文献1

二级参考文献24

  • 1罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 2Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 3Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 4Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 5Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 6Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].
  • 8Yu S, Ren K, Lou W, Li J. Defending against key abuse attacks in KP-ABE enabled broadcast systems. In: Bao F, ed. Proc. of the 5th Int'l Conf. on Security and Privacy in Communication Networks. Singapore: Springer-Verlag, http://www.linkpdf.com/ ebook-viewer.php?url=http://www.ualr.edu/sxyul/file/SecureCommO9_AFKP_ABE.pdf.
  • 9Ibraimi L, Petkovic M, Nikova S, Hartel P, Jonker W. Ciphertext-Policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Technical Report, Centre for Telematics and Information Technology, University of Twente, 2009.
  • 10Roy S, Chuah M. Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) system for the DTNs. Technical Report, 2009.

共引文献1071

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部