RESEARCH AND IMPLEMENTATION OF A ROLE-BASED TRUSTWORTHINESS MECHANISM FOR IAAS

被引:0
|
作者
Wu, Xu [1 ,2 ,3 ]
Xie, Xiaqing [1 ,2 ]
Li, Chunwen [1 ,2 ]
机构
[1] Key Lab Trustworthy Distributed Comp & Serv BUPT, Minist Educ, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Comp Sci, Beijing 100876, Peoples R China
[3] Beijing Univ Posts & Telecommun Lib, Beijing 100876, Peoples R China
关键词
trustworthiness mechanism; trusted computing; cloud computing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Despite the advantages brought by cloud computing, security issues have emerged as one of the most significant barrier to faster and more widespread adoption of it. Therefore, this paper focused on the trustworthiness of infrastructure as a service (IaaS) and proposed a role-based trustworthiness mechanism to ensure that the different roles in IaaS architecture are trusted. What's more, this paper also considered the interactions between different roles in cloud environment and designed relevant validation protocols. Our experiments also show that this trustworthiness mechanism is practical in terms of performance.
引用
收藏
页码:313 / 317
页数:5
相关论文
共 50 条
  • [21] Application Research of the CAN on Role-based Access Control
    Qin, Shi-Hong
    Zhao, Qing
    Ge, Zhou
    Li, Huanhuan
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4668 - +
  • [22] A Scalable Role-based Group Key Agreement and Role Identification Mechanism
    Bian, Jiang
    Seker, Remzi
    Topaloglu, Umit
    Bayrak, Coskun
    2011 IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON 2011), 2011, : 278 - 281
  • [23] The Research for Spatial Role-Based Access Control Model
    Zou, Zhiwen
    Chen, Changqian
    Ju, Shiguang
    Chen, Jiming
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 4, PROCEEDINGS, 2010, 6019 : 296 - 308
  • [24] The Research of a Role-Based Project Knowledge Management System
    Liu, Lieli
    Liu, Qinghong
    INFORMATION SYSTEMS IN THE CHANGING ERA: THEORY AND PRACTICE, 2009, : 291 - 297
  • [25] Research and Application of an Extended Role-Based Access Control
    Zhao, Jingsheng
    Zhang, Wei
    Zhang, Peng
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2654 - 2656
  • [26] Role-based administration of user-role assignment and its oracle implementation
    Han, Lilong
    Liu, Qingtan
    Yang, Zongkai
    INTEGRATION AND INNOVATION ORIENT TO E-SOCIETY, VOL 2, 2007, 252 : 437 - +
  • [27] Implementation and Performance Analysis of the Role-Based Trust Management System, RTC
    Hobbs, Tyler L.
    Winsborough, William H.
    TRUST MANAGEMENT IV, 2010, 321 : 184 - +
  • [28] A role-based statistical mechanism for DDoS attack detection in SDN
    Phan The Duy
    Do Thi Thu Hien
    Van-Hau Pham
    PROCEEDINGS OF 2018 5TH NAFOSTED CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS 2018), 2018, : 177 - 182
  • [29] Implementation of a Role-Based Decision Support System in an Integrated Petrochemical Enterprise
    Buhulaiga, E. A.
    Telukdarie, A.
    2017 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2017, : 568 - 572
  • [30] A role-based hierarchical group collaborative awareness model and its implementation
    Zhu, Jun
    Tang, Yong
    PROCEEDINGS OF THE 2007 1ST INTERNATIONAL SYMPOSIUM ON INFORMATION TECHNOLOGIES AND APPLICATIONS IN EDUCATION (ISITAE 2007), 2007, : 12 - 16