A Trust-Based Defensive System Model for Cloud Computing

被引:0
|
作者
Zhou, Qian [1 ]
Yu, Jiong [1 ]
Yu, Feiran [2 ]
机构
[1] Xin Jiang Univ, Coll Informat Sci & Engn, Urumqi, Xin Jiang, Peoples R China
[2] N China Elect Power Univ, Control & Comp Technol Sch, Beijing, Peoples R China
来源
关键词
cloud security; trusted cloud; trust; behavioral evidence; fuzzy AHP; multiple detection engines;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Because of the dynamic and open characteristics of the cloud computing, continuing malicious attacks happen frequently. Combining the idea of trusted cloud, a trust-based defensive system model for cloud computing has been constructed to guarantee the cloud security. Through real-timely monitoring, users' behavior evidences have been obtained and standardized; a new method for users' trust evaluation based on fuzzy AHP (Analytic Hierarchy Process, AHP) has been presented, it gradually determines the weights of behavior evidences, achieves quantitative assessment of behavioral trust; to provide great security defense for users, multiple detection engines have been used to conduct a comprehensive inspection of suspicious files and integrated decisions have been made. Experimental results show the system model can effectively eliminate the malicious behaviors from undesirable users, reduce users' damages caused by virus and achieve a two-way defense for both cloud and client.
引用
收藏
页码:146 / +
页数:2
相关论文
共 50 条
  • [41] Trust-based Protocol for Permanent Monitoring of File Integrity in the Cloud
    Pinheiro, Alexandre
    de Sousa, Rafael Timoteo, Jr.
    Albuquerque, Robson de Oliveira
    Canedo, Edna Dias
    2016 11TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2016,
  • [42] Trust-Based IoT Cloud Participatory Sensing of Air Quality
    Jia Guo
    Ing-Ray Chen
    Ding-Chau Wang
    Jeffrey J. P. Tsai
    Hamid Al-Hamadi
    Wireless Personal Communications, 2019, 105 : 1461 - 1474
  • [43] Distributed Trust-Based Monitoring Approach for Fog/Cloud Networks
    Ben Daoud, Wided
    Meddeb-Makhlouf, Amel
    Zarai, Faouzi
    Obaidat, Mohammad S.
    EMERGING RESEARCH IN DATA ENGINEERING SYSTEMS AND COMPUTER COMMUNICATIONS, CCODE 2019, 2020, 1054 : 55 - 65
  • [44] Trust-based scheduling strategy for workflow applications in Cloud environment
    Yang, Yuli
    Peng, Xinguang
    2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 316 - 320
  • [45] Research on trust-based access control in medical cloud environment
    Hu, Xiaohan
    Jiang, Rong
    Shi, Mingyue
    Shang, Jingwei
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 125 : 14 - 14
  • [46] An efficient trust-based scheduling of tasks on grid computing systems
    Ji, P
    Luo, JZ
    CCCT 2003, VOL 3, PROCEEDINGS, 2003, : 132 - 137
  • [47] Trust-Based Service Management for Mobile Cloud IoT Systems
    Chen, Ing-Ray
    Guo, Jia
    Wang, Ding-Chau
    Tsai, Jeffrey J. P.
    Al-Hamadi, Hamid
    You, Ilsun
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (01): : 246 - 263
  • [48] Trust-Based IoT Cloud Participatory Sensing of Air Quality
    Guo, Jia
    Chen, Ing-Ray
    Wang, Ding-Chau
    Tsai, Jeffrey J. P.
    Al-Hamadi, Hamid
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 105 (04) : 1461 - 1474
  • [49] A trust-based noise injection strategy for privacy protection in cloud
    Zhang, Gaofeng
    Yang, Yun
    Yuan, Dong
    Chen, Jinjun
    SOFTWARE-PRACTICE & EXPERIENCE, 2012, 42 (04): : 431 - 445
  • [50] Trust Management Model of Cloud Computing Based on Multi-agent
    Xie, Xiaolan
    Li, Yang
    2015 INTERNATIONAL CONFERENCE ON NETWORK AND INFORMATION SYSTEMS FOR COMPUTERS (ICNISC), 2015, : 370 - 372