Please wait a minute...
New Technology of Library and Information Service  2014, Vol. 30 Issue (3): 35-41    DOI: 10.11925/infotech.1003-3513.2014.03.06
Current Issue | Archive | Adv Search |
Design and Implementation of Trustworthiness Validation in Cloud Library Virtualized Environment
Wu Kun1, Xie Xiaqing2, Wu Xu2,3
1 Ministry of Culture Foundation, Changchun Finance College, Changchun 130028, China;
2 Beijing University of Posts and Telecommunications Library, Beijing 100876, China;
3 Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education, Beijing 100876, China
Export: BibTeX | EndNote (RIS)      

[Objective] To ensure the trustworthiness of cloud library virtualized environment which contains users' resources and services by trustworthiness validation. [Methods] By establishing a validation model in which the Third Trusted Party respectively validates the cloud library platform providers and users, this paper designs and implements the trustworthiness validation process of cloud library virtualized environment. [Results] This paper can ensure the trustworthiness in process of request, allocation and startup of virtual machine with little overhead, and ensure that the virtual machine assigned to users is trusted. [Limitations] The overhead of validation in virtual machine's usage and migration needs to be verified. [Conclusions] The research can ensure trustworthiness of virtual machine to build the trustworthiness between cloud library users and platform providers.

Key wordsCloud library      Virtualized environment      Trustworthiness validation     
Received: 10 November 2013      Published: 15 April 2014
:  G250.76  

Cite this article:

Wu Kun, Xie Xiaqing, Wu Xu. Design and Implementation of Trustworthiness Validation in Cloud Library Virtualized Environment. New Technology of Library and Information Service, 2014, 30(3): 35-41.

URL:     OR

[1] 陈臣, 高军. 云计算环境下数字图书馆虚拟机安全部署策略研究 [J]. 现代情报, 2013, 33(7): 64-66.(Chen Chen, Gao Jun. Study for Virtual Machine Security Deployment Policy for Digital Library in Cloud Computing [J]. Modern Information,2013,33(7):64-66.)

[2] 陈臣, 马晓亭. 云计算环境下数字图书馆虚拟机资源分配及部署策略研究 [J]. 图书馆工作与研究, 2013(6): 46-48. (Chen Chen, Ma Xiaoting. Study on Virtual Resources' Allocation and Deployment Strategies of Digital Library in Cloud Computing Environment [J]. Library Work and Study, 2013(6): 46-48.)

[3] 袁援, 凌卉. 云计算技术驱动下构建数字图书馆虚拟化环境的探讨 [J]. 情报理论与实践, 2010, 33(12): 119-123, 128.(Yuan Yuan, Ling Hui. Exploration of Constructing the Virtualized Environment of Digital Library Driven by the Cloud Computing Technology [J]. Information Studies: Theory & Application, 2010,33(12): 119-123, 128.)

[4] 马晓亭, 陈臣. 云安全 2.0 技术体系下数字图书馆信息资源安全威胁与对策研究 [J]. 现代情报, 2011,31(3): 62-66.(Ma Xiaoting, Chen Chen. Research on Information Security Threats and Security Strategy of Digital Library under the Cloud Security 2.0 System Environment [J]. Modern Information, 2011,31(3):62-66.)

[5] 马晓亭, 陈臣. 云计算环境下数字图书馆信息资源安全威胁与对策研究 [J]. 情报资料工作, 2011(2): 55-59.(Ma Xiaoting, Chen Chen. On the Threat to the Security of Digital Library Information Resource and Its Tactics: Under the Environment of Cloud Computing [J]. Information and Documentation Services, 2011(2): 55-59.)

[6] 张叶红. 数字图书馆云计算安全架构及其管理策略 [J]. 图书馆学研究, 2010(11): 30-34. (Zhang Yehong. Cloud Computing Security Architecture and Policies of Digital Library [J]. Research on Library Science, 2010 (11): 30-34.)

[7] 林晓群. 可信技术在图书馆信息安全防护体系的应用研究 [J]. 农业图书情报学刊, 2010, 22(10): 62-64.(Lin Xiaoqun. Study on the Application of Trusted Computing in Library's Security Architecture [J].Jounal of Library and Information Sciences in Agriculture, 2010, 22(10): 62-64.)

[8] 王长全, 艾雰, 姚建文.云计算环境下数字图书馆信息资源安全策略研究 [J].情报杂志,2010,29(3):184-186,161.(Wang Changquan, Ai Fen, Yao Jianwen. Research on Information Security Strategy of Digital Library under the Cloud Computing Environment [J]. Journal of Intelligence, 2010, 29(3):184-186,161.)

[9] Tang K. Research on Security Strategies of Digital Library Based on Cloud Computing Platform [J]. Advanced Materials Research, 2013, 734-737: 3171-3174.

[10] McCune J M, Parno B, Perrig A, et al. How Low Can You Go? Recommendations for Hardware-supported Minimal TCB Code Execution [C]. In: Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, Seattle, USA. New York: ACM, 2008: 14-25.

[11] McCune J M, Parno B J, Perrig A, et al. Flicker: An Execution Infrastructure for TCB Minimization [C].In: Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008, Glasgow. New York: ACM,2008: 315-328.

[12] McCune J M, Li Y, Qu N, et al. TrustVisor: Efficient TCB Reduction and Attestation [C]. In: Proceedings of the 2010 IEEE Symposium on Security and Privacy. Washington D C: IEEE Computer Society, 2010:143-158.

[13] Schiffman J, Moyer T, Vijayakumar H, et al. Seeding Clouds with Trust Anchors [C]. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop (CCSW'10), Chicago,USA. New York: ACM,2010: 43-46.

[14] Bertholon B, Varrette S, Bouvry P. CertiCloud: A Novel TPM-based Approach to Ensure Cloud IaaS Security [C]. In: Proceedings of the 4th International Conference on Cloud Computing(CLOUD 2011). Washington D C: IEEE Computer Society, 2011: 121-130.

[15] Eucalyptus Systems,Inc. Eucalyptus-Open Source AWS Compatible Private Clouds [EB/OL]. [2013-11-20]. http://

[16] Trusted Computing Group. Trusted Platform Module [EB/OL]. [2013-11-20]. http://www.trustedcomputinggroup. org/developers/trusted_platform_module/.

[17] Berger S, Caceres R, Goldman K A, et al. vTPM: Virtualizing the Trusted Platform Module [C]. In: Proceedings of the 15th Conference on USENIX Security Symposium. USENIX Association Berkeley, 2006: Article No. 21.

[1] Guo Shaoqing,Le Xiaoqiu. Identifying Actual Value of Numerical Indicator from Scientific Paper[J]. 数据分析与知识发现, 2018, 2(1): 21-28.
[2] Sun Yi'nan, Ku Liping, Song Xiufang, Liu Jingjing, Jiang Xian. The Policy Research and Analysis of Subject Data Repository ——Cases Study of Life Sciences[J]. 现代图书情报技术, 2015, 31(12): 13-20.
[3] Zhu Guang. Copyright Protection Scheme of Color Images for Libraries, Museums and Archives Based on Zero-Watermarking[J]. 现代图书情报技术, 2015, 31(12): 89-94.
[4] Liu Dan. Personalized Book Recommender Service Deployment Using Apache Mahout[J]. 现代图书情报技术, 2015, 31(10): 102-108.
[5] Wang Ying, Wu Zhenxin, Xie Jing. Review on Semantic Retrieval System for Scientific Literature[J]. 现代图书情报技术, 2015, 31(5): 1-7.
[6] Wu Yue, Zhou Yigang, Cui Haiyuan, Nie Hua. Peking University Library Website Redesign Based on Usability Study[J]. 现代图书情报技术, 2014, 30(11): 88-94.
[7] Yao Xiaona, Zhu Zhongming, Lu Linong, Liu Wei, Zhang Wangqiang. Research on Data Synchronization of OAI Interoperability of Institutional Repository[J]. 现代图书情报技术, 2014, 30(3): 14-18.
[8] Zhang Wangqiang, Zhu Zhongming, Lu Linong. Comparative Analysis of Several Typical New Open Source Institutional Repository Software[J]. 现代图书情报技术, 2014, 30(2): 17-24.
[9] Wang Feng, Wei Feng, Liu Yi, Zhou Hong, Zhao De. Application of Open Source Search Engine Solr to Build Standards Information Management and Analysis Platform[J]. 现代图书情报技术, 2014, 30(2): 92-98.
[10] Yao Xiaona, Zhu Zhongming, Wang Sili. Research on Automatic Semantic Annotation for Geosciences[J]. 现代图书情报技术, 2013, (4): 48-53.
[11] Ma Ningning, Li Chao, Qu Yunpeng. Design and Implementation of an Automatic Obsolescence Management System for Digital Preservation[J]. 现代图书情报技术, 2013, (4): 69-76.
[12] Ma Yumeng, Zhu Zhongming. Research on Representative Semantic Models for Linking and Organizing Digital Objects[J]. 现代图书情报技术, 2013, 29(1): 1-7.
[13] Huang Yongwen, Qian Li. Research on Information Retrieval Service Towards Linked Data[J]. 现代图书情报技术, 2012, (12): 2-8.
[14] Li Chunwang, Fei Dayu, Zhou Qiang. Study on Mashup Workflow Engine[J]. 现代图书情报技术, 2012, (12): 27-31.
[15] Niu Yazhen, Zhu Zhongming. A Linked Data-driven Semantic User Modeling Framework for Personalization Service[J]. 现代图书情报技术, 2012, (10): 1-7.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938