RESEARCH AND IMPLEMENTATION OF A ROLE-BASED TRUSTWORTHINESS MECHANISM FOR IAAS

被引:0
|
作者
Wu, Xu [1 ,2 ,3 ]
Xie, Xiaqing [1 ,2 ]
Li, Chunwen [1 ,2 ]
机构
[1] Key Lab Trustworthy Distributed Comp & Serv BUPT, Minist Educ, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Comp Sci, Beijing 100876, Peoples R China
[3] Beijing Univ Posts & Telecommun Lib, Beijing 100876, Peoples R China
关键词
trustworthiness mechanism; trusted computing; cloud computing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Despite the advantages brought by cloud computing, security issues have emerged as one of the most significant barrier to faster and more widespread adoption of it. Therefore, this paper focused on the trustworthiness of infrastructure as a service (IaaS) and proposed a role-based trustworthiness mechanism to ensure that the different roles in IaaS architecture are trusted. What's more, this paper also considered the interactions between different roles in cloud environment and designed relevant validation protocols. Our experiments also show that this trustworthiness mechanism is practical in terms of performance.
引用
收藏
页码:313 / 317
页数:5
相关论文
共 50 条
  • [1] Study on role-based IT strategy implementation mechanism
    Hao, XL
    Proceedings of the 2005 International Conference on Management Science & Engineering (12th), Vols 1- 3, 2005, : 187 - 191
  • [2] Research and implementation of role-based RBAC administration model
    Qiu, J
    Ma, CH
    Yin, JW
    Dong, JX
    Fifth International Conference on Computer and Information Technology - Proceedings, 2005, : 746 - 750
  • [3] Toward role-based provisioning and access control for infrastructure as a service (IaaS)
    Shin, Dongwan
    Akkan, Hakan
    Claycomb, William
    Kim, Kwanjoong
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2011, 2 : 243 - 255
  • [4] Research and Implementation of Role-based Access Control Model Based on Partition Number
    Chen Jinyu
    Tong, Zhang
    SECOND INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN, VOL 2, PROCEEDINGS, 2009, : 6 - 9
  • [5] The research on role-based access control mechanism for workflow management system
    Wang, BY
    Zhang, SM
    GRID AND COOPERATIVE COMPUTING GCC 2004, PROCEEDINGS, 2004, 3251 : 729 - 736
  • [6] Research on role-based learning technologies
    Slator, BM
    Clark, J
    Juell, P
    McClean, P
    Saini-Eidukat, B
    Schwert, DP
    White, AR
    IEEE INTERNATIONAL CONFERENCE ON ADVANCED LEARNING TECHNOLOGIES, PROCEEDINGS, 2001, : 37 - 40
  • [7] The implementation of role-based access control on the web
    Xu, CG
    Yan, H
    Liu, FG
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : D251 - D255
  • [8] Research on the role-based interorganizational workflow
    Zhao, Wei-Dong
    Dai, Wei-Hui
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2003, 25 (08):
  • [9] A role-based infrastructure management system: design and implementation
    Shin, D
    Ahn, GJ
    Cho, S
    Jin, S
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2004, 16 (11): : 1121 - 1141
  • [10] The Research on the Role-based Dynamic Workflow Model
    Wang Chengjun
    2009 SECOND INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING: KAM 2009, VOL 2, 2009, : 358 - 360