Trust Model in Cloud Computing Environment Based on Fuzzy Theory

Lichuan Gu, Chengji Wang, Youhua Zhang, Jinqin Zhong, Zhiwei Ni

Abstract


Recent years have witnessed the development of cloud computing. However,
there also come some security concerns in cloud computing environment, such
as emerging network attacks and intrusions, and instable cloud service provision due
to flexible cloud infrastructure and resources. To this end, we research on the trusted
computing in cloud computing environment. Specifically, in this paper, we propose
a trust model based on virtual machines, with two considerations. First, we introduce
timeliness strategy to ensure the response time and also minimize the idle time
of servers. Second, we extend the linear trust chain by differentiating the trust of
the platform domain and user domain. Besides, we develop a fuzzy theory based
method to calculate the trust value of cloud service providers. We also conduct some
experiments to evaluate our method.


Keywords


Trust model, fuzzy theory, cloud computing

Full Text:

PDF

References


Armbrust, Michael, et al. (2010); A view of cloud computing, Communications of the ACM, 53(4): 50–58.
http://dx.doi.org/10.1145/1721654.1721672

Mell P., Grance T. (2011); The NIST definition of cloud computing, http://csrc.nist.

Lin C., Pervan G. (2001); A review of IS/IT investment evaluation and benefits management issues, problems and processes, in Information technology evaluation methods and management, ISBN:1-878289-90-X, 2-24.

Brodkin J. (2008); Gartner: Seven cloud-computing security risks. Infoworld (2008): 1–3.

Zissis D., Lekkas D. (2012); Addressing cloud computing security issues. Future Generation

Lonea A.M., Popescu D.E., Tianfield H.(2012); Detecting DDoS Attacks in Cloud Computing

Popescu D.E, , Lonea A.M. (2013); An Hybrid Text-Image Based Authentication for Cloud

Pearson S., Balacheff B., eds. (2003); Trusted computing platforms: TCPA technology in

Mitchell C. ed.(2005), Trusted computing, Institution of Electrical Engineers.

Sumrall N., Novoa M. (2003); Trusted Computing Group (TCG) and the TPM 1.2 Specification.

Blaze M., Feigenbaum J., Lacy J. (1996); Decentralized trust management. Security and

Josang A. (2001); A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 9(3): 279–311.
http://dx.doi.org/10.1142/S0218488501000831

Knapskog, S. J.(1998); A metric for trusted systems, Proc. of the 21st National Security Conference, Available at http://folk.uio.no/josang/papers/JK1998-NSC.pdf, 1-14.

Josang A. (1999); Trust-based decision making for electronic transactions, Proc. of the Fourth Nordic Workshop on Secure Computer Systems, 1-21.

Beth T., Borcherding M., Klein B. (1994); Valuation of trust in open networks, Springer

Meyer J. F. (1980); On evaluating the performability of degradable computing systems. Computers, IEEE Transactions on, 100(8): 720–731.

Isermann R. (1984); Process fault detection based on modeling and estimation methods, a survey. Automatica, 20(4): 387–404.
http://dx.doi.org/10.1016/0005-1098(84)90098-0

Arlat J. et al.(1993); Fault injection and dependability evaluation of fault-tolerant systems, Computers, IEEE Transactions on, 42(8): 913–923.

Smith S. W. (2002); Outbound authentication for programmable secure coprocessors. Computer Security, ESORICS, 2002. Springer Berlin Heidelberg, 72–89.

Abadi M.,Wobber T. (2004); A logical account of NGSCB. Formal Techniques for Networked

Chen S., Wen Y., Zhao H. (2007); Formal analysis of secure bootstrap in trusted computing,

Dyer J. G., et al. (2001); Building the IBM 4758 secure coprocessor. Computer, 34(10): 57–66.
http://dx.doi.org/10.1109/2.955100

Lie, David, et al.(2000); Architectural support for copy and tamper resistant software, ACM

Suh G. E. et al. (2003); AEGIS: architecture for tamper-evident and tamper-resistant processing. Proc. of the 17th annual international conference on Supercomputing. ACM, 1-18.

Chen B., Morris R. (2003); Certifying Program Execution with Secure Processors, HotOS,

MacDonald R. et al. (2003); Bear: An open-source virtual secure coprocessor based on

Marchesini J. et al.(2003); Experimenting with TCPA/TCG hardware, or: How I learned to

Sailer R. et al. (2004); Design and Implementation of a TCG-based Integrity Measurement Architecture. USENIX Security Symposium, 13:223-238.

Garfinkel T. et al.(2003); Terra: A virtual machine-based platform for trusted computing,

Berger S. et al. (2006); vTPM: virtualizing the trusted platform module, Proc. 15th Conf. on USENIX Security Symposium, 305-320.

Fullér R., Majlender P. (2001); An analytic approach for obtaining maximal entropy OWA

Saure D. et al. (2010); Time-of-use pricing policies for offering cloud computing as a service, Service Operations and Logistics and Informatics (SOLI), 2010 IEEE International Conference on, 300-305.

Bo Z. et al.(2010); The system architecture and security structure of trusted PDA, Chinese Journal of Computers, 33(1): 82–92.
http://dx.doi.org/10.3724/SP.J.1016.2010.00082

Calheiros R. N. et al.(2011); CloudSim: a toolkit for modeling and simulation of cloud computing

Wang W. et al. (2012); Dynamic trust evaluation and scheduling framework for cloud computing.




DOI: https://doi.org/10.15837/ijccc.2014.5.1276



Copyright (c) 2017 Lichuan Gu, Chengji Wang, Youhua Zhang, Jinqin Zhong, Zhiwei Ni

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

CC-BY-NC  License for Website User

Articles published in IJCCC user license are protected by copyright.

Users can access, download, copy, translate the IJCCC articles for non-commercial purposes provided that users, but cannot redistribute, display or adapt:

  • Cite the article using an appropriate bibliographic citation: author(s), article title, journal, volume, issue, page numbers, year of publication, DOI, and the link to the definitive published version on IJCCC website;
  • Maintain the integrity of the IJCCC article;
  • Retain the copyright notices and links to these terms and conditions so it is clear to other users what can and what cannot be done with the  article;
  • Ensure that, for any content in the IJCCC article that is identified as belonging to a third party, any re-use complies with the copyright policies of that third party;
  • Any translations must prominently display the statement: "This is an unofficial translation of an article that appeared in IJCCC. Agora University  has not endorsed this translation."

This is a non commercial license where the use of published articles for commercial purposes is forbiden. 

Commercial purposes include: 

  • Copying or downloading IJCCC articles, or linking to such postings, for further redistribution, sale or licensing, for a fee;
  • Copying, downloading or posting by a site or service that incorporates advertising with such content;
  • The inclusion or incorporation of article content in other works or services (other than normal quotations with an appropriate citation) that is then available for sale or licensing, for a fee;
  • Use of IJCCC articles or article content (other than normal quotations with appropriate citation) by for-profit organizations for promotional purposes, whether for a fee or otherwise;
  • Use for the purposes of monetary reward by means of sale, resale, license, loan, transfer or other form of commercial exploitation;

    The licensor cannot revoke these freedoms as long as you follow the license terms.

[End of CC-BY-NC  License for Website User]


INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL (IJCCC), With Emphasis on the Integration of Three Technologies (C & C & C),  ISSN 1841-9836.

IJCCC was founded in 2006,  at Agora University, by  Ioan DZITAC (Editor-in-Chief),  Florin Gheorghe FILIP (Editor-in-Chief), and  Misu-Jan MANOLESCU (Managing Editor).

Ethics: This journal is a member of, and subscribes to the principles of, the Committee on Publication Ethics (COPE).

Ioan  DZITAC (Editor-in-Chief) at COPE European Seminar, Bruxelles, 2015:

IJCCC is covered/indexed/abstracted in Science Citation Index Expanded (since vol.1(S),  2006); JCR2018: IF=1.585..

IJCCC is indexed in Scopus from 2008 (CiteScore2018 = 1.56):

Nomination by Elsevier for Journal Excellence Award Romania 2015 (SNIP2014 = 1.029): Elsevier/ Scopus

IJCCC was nominated by Elsevier for Journal Excellence Award - "Scopus Awards Romania 2015" (SNIP2014 = 1.029).

IJCCC is in Top 3 of 157 Romanian journals indexed by Scopus (in all fields) and No.1 in Computer Science field by Elsevier/ Scopus.

 

 Impact Factor in JCR2018 (Clarivate Analytics/SCI Expanded/ISI Web of Science): IF=1.585 (Q3). Scopus: CiteScore2018=1.56 (Q2);

SCImago Journal & Country Rank

Editors-in-Chief: Ioan DZITAC & Florin Gheorghe FILIP.