[1] 王斌锋, 苏金树, 陈琳. 云计算数据中心网络设计综述[J]. 计算机研究与发展, 2016, 53(9):2085-2106. (WANG B F, SU J S, CHEN L. Review of the design of data center network for cloud computing[J]. Journal of Computer Research and Development, 2016, 53(9):2085-2106.) [2] 张晏,岑荣伟,沈宇超,等.云计算环境下密码资源池系统的应用[J]. 信息安全研究, 2016, 2(6):558-561.(ZHANG Y, QIN R W, SHEN Y C, et al. The application of cryptography resource system in cloud computing[J]. Journal of Information Security Research, 2016, 2(6):558-561.) [3] WANG M, LIU L. CRYPTO as a service[EB/OL].[2017-06-20]. http://atlantis-press.com/php/download_paper.php?id=9894. [4] AWS Support Center. AWS CloudHSM User Guide[EB/OL].[2017-09-29].https://docs.aws.amazon.com/cloudhsm/latest/userguide/cloudhsm-user-guide.pdf. [5] 阿里云开发者中心. 阿里云-加密服务使用手册[EB/OL].[2017-09-29]. https://help.aliyun.com/document_detail/28357.html?spm=5176.product28341.2.1.8LMnOC.(Developer of Ali Cloud. Ali cloud:usage manual of encryption service[2017-09-29]. https://help.aliyun.com/document_detail/28357.html?spm=5176.product28341.2.1.8LMnOC.) [6] 孙磊, 戴紫珊. 安全服务云框架研究[J]. 计算机应用, 2012, 32(1):13-15.(SUN L, DAI Z S. Research on framework of security service cloud computing[J]. Journal of Computer Applications, 2012, 32(1):13-15.) [7] VAN H N, TRAN F D, MENAUD J M. SLA-aware virtual resource management for cloud infrastructures[C]//Proceedings of the 9th IEEE International Conference on Computer and Information Technology. Washington, DC:IEEE Computer Society, 2009:357-362. [8] 冯登国, 张敏, 张妍,等. 云计算安全研究[J]. 软件学报, 2011, 22(1):71-83.(FENG D G, ZHANG M, ZHANG Y, et al. Study on cloud computing security[J]. Journal of Software, 2011, 22(1):71-83.) [9] ZHANG W, HAN S, HE H, et al. Network-aware virtual machine migration in an overcommitted cloud[J]. Future Generation Computer Systems, 2016, 76:428-442. [10] DUGGAN M, DUGGAN J, HOWLEY E, et al. A network aware approach for the scheduling of virtual machine migration during peak loads[J]. Cluster Computing, 2017(4):1-12. [11] 罗刚毅, 钱柱中, 陆桑璐. 一种基于网络感知的虚拟机再调度算法[J]. 计算机学报, 2015, 38(5):932-943.(LUO G Y, QIAN Z Z, LU S L. A network-aware VM re-scheduling algorithm[J]. Chinese Journal of Computers, 2015,38(5):932-943.) [12] AROCA J A, MOSTEIRO M A, THRAVES C, et al. Power-efficient assignment of virtual machines to physical machines[J]. Future Generation Computer Systems, 2016, 54(C):82-94. [13] DUAN H C, CHEN C, MIN G Y, et al. Energy-aware scheduling of virtual machines in heterogeneous cloud computing systems[J]. Future Generation Computer Systems, 2017, 74:142-150. [14] MAIO V D, KECSKEMETI G, KECSKEMETI G, et al. Modelling energy consumption of network transfers and virtual machine migration[J]. Future Generation Computer Systems, 2016, 56(C):388-406. [15] 薛涛, 马腾. 基于资源权重最大资源利用率的动态资源调度算法[J]. 计算机应用研究, 2016, 33(5):1374-1378.(XUE T, MA T. Dynamic resource scheduling algorithm based on maximum resource utilization[J]. Application Research of Computers, 2016, 33(5):1374-1378.) [16] MAGULURI S T, SRIKANT R, YING L. Stochastic models of load balancing and scheduling in cloud computing clusters[C]//Proceedings of the 31st Annual IEEE International Conference on Computer Communications. Piscataway, NJ:IEEE, 2012:702-710. [17] 罗树, 沈记全. 基于优化AHP的虚拟机部署与调度策略[J]. 计算机工程与设计, 2015,36(12):3375-3379.(LUO S, SHEN J Q. Deployment and scheduling of virtual machines based on AHP optimization algorithm[J]. Computer Engineering and Design, 2015,36(12):3375-3379.) [18] 吴希. 三种权重赋权法的比较分析[J]. 中国集体经济, 2016(34):73-74.(WU X. Comparison and analysis of three weight weighting methods[J]. China Collective Economy, 2016(34):73-74.) [19] 粟登银, 徐开勇, 高杨. 基于熵权法的密码模块安全保障能力评估[J]. 计算机应用, 2012, 32(1):115-118.(LI D Y, XU K Y, GAO Y. Security assurance capability assessment based on entropy weight method for cryptographic module[J]. Journal of Computer Applications, 2012, 32(1):115-118.) [20] 杨绍光, 张云勇. 一种云计算资源池系统及其实现方法:中国, CN103581324A[P]. 2014-02-12.(YANG S G, ZHANG Y Y. A cloud computing resource pool system and its implementation:CN, CN103581324A[P]. 2014-02-12.) [21] 王展, 曹政, 刘小丽,等. 基于单根I/O虚拟化的多根I/O资源池化方法[J]. 计算机研究与发展, 2015, 52(1):83-93. (WANG Z, CAO Z, LIU X L, et al. A multi-root I/O resource pooling method based on single-root I/O virtualization[J]. Journal of Computer Research and Development, 2015, 52(1):83-93.) [22] 崔泽永. 基于KVM的虚拟机调度方法研究[D]. 北京:北方工业大学, 2011.(CUI Z Y. Research on virtual machine scheduling method based on KVM[D]. Beijing:North China University of Technology, 2011.) [23] MATTHEW C, KEN B, MICHAEL B. AWS key management service cryptographic details[EB/OL].[2017-09-29]. https://d0.awsstatic.com/whitepapers/KMS-Cryptographic-Details.pdf. [24] VAN H N, TRAN F D, MENAUD J M. Autonomic virtual resource management for service hosting platforms[C]//Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing. Washington, DC:IEEE Computer Society, 2009:1-8. [25] 戢友. OpenStack开源云王者归来[M]. 北京:清华大学出版社, 2014:420-456.(YI Y. OpenStack:Open Source Cloud King Returned[M]. Beijing:Tsinghua University Press, 2014:420-456.) [26] HERMENIER F, LORCA X, MENAUD J M, et al. Entropy:a consolidation manager for clusters[C]//Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments. New York:ACM, 2009:41-50. [27] VANITHA M, MARIKKANNU P. Effective resource utilization in cloud environment through a dynamic well-organized load balancing algorithm for virtual machines[J]. Computers & Electrical Engineering, 2016, 57:199-208. [28] 曹洁, 曾国荪, 匡桂娟,等. 支持随机服务请求的云虚拟机按需物理资源分配方法[J]. 软件学报, 2017, 28(2):457-472. (CAO J, ZENG G S, KUANG G J, et al. On-demand physical resource allocation method for cloud virtual machine to support random service requests[J]. Journal of Software, 2017, 28(2):457-472.) [29] YANG T, PEN H, LI W, et al. An energy-efficient virtual machine placement and route scheduling scheme in data center networks[J]. Future Generation Computer Systems, 2017, 77:1-11. |