Research on the Trusted Service Supervision Model of Cloud Library and Its Key Technology

  • Hao Shibo ,
  • Zhu Xuefang
Expand
  • School of Information Management, Nanjing University, Nanjing 210093

Received date: 2014-05-12

  Revised date: 2014-06-03

  Online published: 2014-07-05

Abstract

This paper analyzed the connotation and the current threats of the cloud library, and summarized the application of safe practice in libraries. The trusted service supervision system is trying to be established by means of trust management. The paper established a trusted service supervision model, and discussed the key issues involved in the dynamic trust evaluation. Aiming at the trust information sharing problem, the paper built the conceptual model CLTM-Ont of cloud library service, and designed the algorithm of computing feedback trust degree and trust context matching degree. It is a useful exploration for promoting the formation of cloud library credible service environment and protecting digital resources and personal privacy security.

Cite this article

Hao Shibo , Zhu Xuefang . Research on the Trusted Service Supervision Model of Cloud Library and Its Key Technology[J]. Library and Information Service, 2014 , 58(13) : 113 -117,106 . DOI: 10.13266/j.issn.0252-3116.2014.13.019

References

[1] 殷红, 刘炜. 新一代图书馆服务系统:功能评价与愿景展望[J].中国图书馆学报2013,39(5):26-32,33.

[2] 朱学芳. 图博档信息资源数字化建设及服务融合探讨[J].情报资料工作, 2011(5): 57-60.

[3] 韩翠峰. 大数据时代图书馆的服务创新与发展[J].图书馆, 2013(1): 121-122.

[4] 姜山, 王刚. 大数据对图书馆的启示[J].图书馆工作与研究, 2013(4): 52-54.

[5] 王天泥. 知识咨询:大数据时代图书馆的知识服务增长点[J].图书与情报, 2013(2): 74-77.

[6] Malpas C. Cloud-sourcing research collections: Managing print in the mass-digitized library environment[J/OL].[2014-04-15].http://open.bu.edu/xmlui/bitstream/handle/2144/1391/2011-01.pdf?sequence=1.

[7] 赵伯兴, 方向明. 云图书馆环境下低利用率文献合作储存对策研究[J].中国图书馆学报, 2013, 39(3): 40-48.

[8] 胡新平. 云图书馆构想[J].情报理论与实践, 2010, 33(6): 29-32.

[9] 马晓亭, 陈臣. 云计算环境下数字图书馆信息资源安全威胁与对策研究[J].情报资料工作, 2011(2): 55-59.

[10] 李晨晖, 张兴旺, 崔建明,等. 云图书馆:面向网络化服务的资源组合新模式[J].情报理论与实践, 2012, 35(11): 39-43.

[11] Si Wei. Research on copyright management of digital library[C]//Qu Xilong,Yang Yuhang.Information and Business Intelligence.Berlin:Springer, 2012: 707-712.

[12] 廖璠, 黄丹珠. 国外图书馆用户隐私保护理论与实践研究进展[J].情报理论与实践, 2012,35(4): 120-123.

[13] 邱均平, 朱少强. 数字图书馆版权保护技术及其规避行为的法律对策[J].情报科学, 2006, 24(1): 1-7.

[14] 董丽, 郑晓惠, 姜爱蓉. OCLC SiteSearch系统资源访问控制机制的研究与实现[J].现代图书情报技术, 2004(1): 63-66.

[15] 熊金波, 姚志强, 马建峰. 基于行为的结构化文档多级访问控制[J].计算机研究与发展, 2013, 50(7): 1399-1408.

[16] Cheung S C S, Sun Y L, Aberer K, et al. Special issue on privacy and trust management in cloud and distributed systems[J].IEEE Transaction on Information Forensics and Security, 2013, 8(6): 835-837.

[17] Blaze M, Feigenbaum J, Lacy J. Decentralized trust management[C]//Dale J, Dinolt G. Proceedings of the 17th Symposium on Security and Privacy. Washington,DC: IEEE Computer Society Press, 1996: 164-173.

[18] Blaze M, Feigenbaum J, Keromytis A D. Keynote:Trust management for public-key infrastructures[C]//Christianson B, Crispo B, William S.Security Protocols. Berlin: Springer-Verglag, 1999: 59-63.

[19] Chu Yanghua, Feigenbaum J, LaMacchia B, et al. REFEREE: Trust management for Web applications[J].World Wide Web Journal, 1997, 2(2): 127-139.

[20] 李小勇,桂小林. 大规模分布式环境下动态信任模型研究[J].软件学报, 2007, 18(6): 1510-1521.

[21] Anand P M R, Bhaskar V. A unified trust management strategy for content sharing in peer-to-peer networks[J].Applied Mathematical Modelling, 2013, 37(4): 1992-2007.

[22] Zhao Huanyu, Yang Xin, Li Xiaolin. cTrust: Trust management in cyclic mobile ad hoc networks[J].IEEE Transactions on Vehicular Technology, 2013, 62(6): 2792-2806.

[23] 张兴旺, 麦范金, 秦晓珠,等. 挑战与创新:重新审视云图书馆构建的技术走向[J].情报资料工作, 2012(4): 37-41.

[24] 明均仁, 何超. 基于语义关联挖掘的数字图书馆跨媒体检索方法研究[J].图书情报工作, 2013, 57(7): 101-105.

[25] 廖俊, 张宏, 蒋黎明. 一种基于经验共享的服务系统本体信任模型[J].计算机应用研究, 2011, 28(7): 2754-2757.

Outlines

/