A Trust-Based Defensive System Model for Cloud Computing

被引:0
|
作者
Zhou, Qian [1 ]
Yu, Jiong [1 ]
Yu, Feiran [2 ]
机构
[1] Xin Jiang Univ, Coll Informat Sci & Engn, Urumqi, Xin Jiang, Peoples R China
[2] N China Elect Power Univ, Control & Comp Technol Sch, Beijing, Peoples R China
来源
关键词
cloud security; trusted cloud; trust; behavioral evidence; fuzzy AHP; multiple detection engines;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Because of the dynamic and open characteristics of the cloud computing, continuing malicious attacks happen frequently. Combining the idea of trusted cloud, a trust-based defensive system model for cloud computing has been constructed to guarantee the cloud security. Through real-timely monitoring, users' behavior evidences have been obtained and standardized; a new method for users' trust evaluation based on fuzzy AHP (Analytic Hierarchy Process, AHP) has been presented, it gradually determines the weights of behavior evidences, achieves quantitative assessment of behavioral trust; to provide great security defense for users, multiple detection engines have been used to conduct a comprehensive inspection of suspicious files and integrated decisions have been made. Experimental results show the system model can effectively eliminate the malicious behaviors from undesirable users, reduce users' damages caused by virus and achieve a two-way defense for both cloud and client.
引用
收藏
页码:146 / +
页数:2
相关论文
共 50 条
  • [21] A trust model of cloud computing based on Quality of Service
    Manuel, Paul
    ANNALS OF OPERATIONS RESEARCH, 2015, 233 (01) : 281 - 292
  • [22] Actor and Trust-based dynamic access control model in universal Computing Environment
    Hu, Hua
    Luo, Ande
    2008 INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY APPLICATION, VOL II, PROCEEDINGS, 2008, : 683 - 687
  • [23] Trust-Based Scheduling Strategy for Cloud Workflow Applications
    Yang, Yuli
    Peng, Xinguang
    Cao, Jianfang
    INFORMATICA, 2015, 26 (01) : 159 - 180
  • [24] Trust-based security architecture for Ubiquitous Computing systems
    Hung, Le Xuan
    Giang, Pho Duc
    Zhung, Yonil
    Van Phuong, Tran
    Lee, Sungyoung
    Lee, Young-Koo
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 753 - 754
  • [25] A Trust Model for Cloud Computing environment
    Branco, Teofilo Teixeira
    Santos, Henrique
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON CLOUD SECURITY AND MANAGEMENT (ICCSM-2015), 2015, : 1 - 15
  • [26] A trust evaluation model for cloud computing
    Wu, Xiaonian
    Zhang, Runlian
    Zeng, Bing
    Zhou, Shengyuan
    FIRST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT, 2013, 17 : 1170 - 1177
  • [27] A Trust Evaluation Model for Cloud Computing
    Kim, Hyukho
    Lee, Hana
    Kim, Woongsup
    Kim, Yangwoo
    GRID AND DISTRIBUTED COMPUTING, 2009, 63 : 184 - 192
  • [28] CCTM - Cloud Computing Trust Model
    Kaja, Nevrus
    Shaout, Adnan
    2018 19TH INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2018, : 109 - 114
  • [29] Trust Model for Computing Security of Cloud
    Rathi, Snehal R.
    Kolekar, Vikas K.
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [30] Trust Model Engines in cloud computing
    Farcasescu, Marcela Roxana
    14TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2012), 2012, : 465 - 470