RESEARCH AND IMPLEMENTATION OF A ROLE-BASED TRUSTWORTHINESS MECHANISM FOR IAAS

被引:0
|
作者
Wu, Xu [1 ,2 ,3 ]
Xie, Xiaqing [1 ,2 ]
Li, Chunwen [1 ,2 ]
机构
[1] Key Lab Trustworthy Distributed Comp & Serv BUPT, Minist Educ, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Comp Sci, Beijing 100876, Peoples R China
[3] Beijing Univ Posts & Telecommun Lib, Beijing 100876, Peoples R China
关键词
trustworthiness mechanism; trusted computing; cloud computing;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Despite the advantages brought by cloud computing, security issues have emerged as one of the most significant barrier to faster and more widespread adoption of it. Therefore, this paper focused on the trustworthiness of infrastructure as a service (IaaS) and proposed a role-based trustworthiness mechanism to ensure that the different roles in IaaS architecture are trusted. What's more, this paper also considered the interactions between different roles in cloud environment and designed relevant validation protocols. Our experiments also show that this trustworthiness mechanism is practical in terms of performance.
引用
收藏
页码:313 / 317
页数:5
相关论文
共 50 条
  • [31] Research and realization of the role-based system access control management
    Cai, Hong
    Chen, Rong-Yao
    Ling, Hu-Jia
    Journal of Donghua University (English Edition), 2010, 27 (02) : 267 - 269
  • [32] Research and Realization of the Role-Based System Access Control Management
    蔡红
    陈荣耀
    令狐佳
    JournalofDonghuaUniversity(EnglishEdition), 2010, 27 (02) : 267 - 269
  • [33] Research on Visualized Design for Role-Based Online Learning Analytics
    Wang, Lamei
    Xiao, Jun
    Qi, Yuanyi
    Yu, Ye
    CURRENT DEVELOPMENTS IN WEB BASED LEARNING, ICWL 2015, 2016, 9584 : 173 - 185
  • [34] The Modeling and Analysis of Context and Cardinality Constraints Role-Based Authorization Mechanism
    Liu, Limin
    Liu, Yujun
    Cheng, Wei
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2012, 2012, 7405 : 337 - 345
  • [35] The Implementation of Rights Management of Network Teaching Platform with Role-Based Access Control
    Han, Guiying
    Li, Xizuo
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1603 - +
  • [36] Research on Mechanism of Deploying Virtual Machine in the Mode of IaaS
    He, Jian-min
    Cao, Wei-jie
    Min, Rui
    2013 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND MANAGEMENT SCIENCE (ICIEMS 2013), 2013, : 1187 - 1193
  • [37] Research on object-oriented role-based access control model
    Luo, JY
    He, DK
    PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT'2003, PROCEEDINGS, 2003, : 132 - 135
  • [38] A tool for role-based chatting
    Zhu, Haibin
    Alkins, Rob
    2007 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-8, 2007, : 2505 - 2510
  • [39] Role-based authentication protocol
    Yao, Hongyan
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (04) : 460 - 470
  • [40] Role-Based Graph Embeddings
    Ahmed, Nesreen K.
    Rossi, Ryan A.
    Lee, John Boaz
    Willke, Theodore L.
    Zhou, Rong
    Kong, Xiangnan
    Eldardiry, Hoda
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2022, 34 (05) : 2401 - 2415