Trust Model in Cloud Computing Environment Based on Fuzzy Theory
Keywords:
Trust model, fuzzy theory, cloud computingAbstract
Recent years have witnessed the development of cloud computing. However,
there also come some security concerns in cloud computing environment, such
as emerging network attacks and intrusions, and instable cloud service provision due
to flexible cloud infrastructure and resources. To this end, we research on the trusted
computing in cloud computing environment. Specifically, in this paper, we propose
a trust model based on virtual machines, with two considerations. First, we introduce
timeliness strategy to ensure the response time and also minimize the idle time
of servers. Second, we extend the linear trust chain by differentiating the trust of
the platform domain and user domain. Besides, we develop a fuzzy theory based
method to calculate the trust value of cloud service providers. We also conduct some
experiments to evaluate our method.
References
Armbrust, Michael, et al. (2010); A view of cloud computing, Communications of the ACM, 53(4): 50-58. http://dx.doi.org/10.1145/1721654.1721672
Mell P., Grance T. (2011); The NIST definition of cloud computing, http://csrc.nist.
Lin C., Pervan G. (2001); A review of IS/IT investment evaluation and benefits management issues, problems and processes, in Information technology evaluation methods and management, ISBN:1-878289-90-X, 2-24.
Brodkin J. (2008); Gartner: Seven cloud-computing security risks. Infoworld (2008): 1-3.
Zissis D., Lekkas D. (2012); Addressing cloud computing security issues. Future Generation
Lonea A.M., Popescu D.E., Tianfield H.(2012); Detecting DDoS Attacks in Cloud Computing
Popescu D.E, , Lonea A.M. (2013); An Hybrid Text-Image Based Authentication for Cloud
Pearson S., Balacheff B., eds. (2003); Trusted computing platforms: TCPA technology in
Mitchell C. ed.(2005), Trusted computing, Institution of Electrical Engineers.
Sumrall N., Novoa M. (2003); Trusted Computing Group (TCG) and the TPM 1.2 Specification.
Blaze M., Feigenbaum J., Lacy J. (1996); Decentralized trust management. Security and
Josang A. (2001); A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 9(3): 279-311. http://dx.doi.org/10.1142/S0218488501000831
Knapskog, S. J.(1998); A metric for trusted systems, Proc. of the 21st National Security Conference, Available at http://folk.uio.no/josang/papers/JK1998-NSC.pdf, 1-14.
Josang A. (1999); Trust-based decision making for electronic transactions, Proc. of the Fourth Nordic Workshop on Secure Computer Systems, 1-21.
Beth T., Borcherding M., Klein B. (1994); Valuation of trust in open networks, Springer
Meyer J. F. (1980); On evaluating the performability of degradable computing systems. Computers, IEEE Transactions on, 100(8): 720-731.
Isermann R. (1984); Process fault detection based on modeling and estimation methods, a survey. Automatica, 20(4): 387-404. http://dx.doi.org/10.1016/0005-1098(84)90098-0
Arlat J. et al.(1993); Fault injection and dependability evaluation of fault-tolerant systems, Computers, IEEE Transactions on, 42(8): 913-923.
Smith S. W. (2002); Outbound authentication for programmable secure coprocessors. Computer Security, ESORICS, 2002. Springer Berlin Heidelberg, 72-89.
Abadi M.,Wobber T. (2004); A logical account of NGSCB. Formal Techniques for Networked
Chen S., Wen Y., Zhao H. (2007); Formal analysis of secure bootstrap in trusted computing,
Dyer J. G., et al. (2001); Building the IBM 4758 secure coprocessor. Computer, 34(10): 57-66. http://dx.doi.org/10.1109/2.955100
Lie, David, et al.(2000); Architectural support for copy and tamper resistant software, ACM
Suh G. E. et al. (2003); AEGIS: architecture for tamper-evident and tamper-resistant processing. Proc. of the 17th annual international conference on Supercomputing. ACM, 1-18.
Chen B., Morris R. (2003); Certifying Program Execution with Secure Processors, HotOS,
MacDonald R. et al. (2003); Bear: An open-source virtual secure coprocessor based on
Marchesini J. et al.(2003); Experimenting with TCPA/TCG hardware, or: How I learned to
Sailer R. et al. (2004); Design and Implementation of a TCG-based Integrity Measurement Architecture. USENIX Security Symposium, 13:223-238.
Garfinkel T. et al.(2003); Terra: A virtual machine-based platform for trusted computing,
Berger S. et al. (2006); vTPM: virtualizing the trusted platform module, Proc. 15th Conf. on USENIX Security Symposium, 305-320.
Fullér R., Majlender P. (2001); An analytic approach for obtaining maximal entropy OWA
Saure D. et al. (2010); Time-of-use pricing policies for offering cloud computing as a service, Service Operations and Logistics and Informatics (SOLI), 2010 IEEE International Conference on, 300-305.
Bo Z. et al.(2010); The system architecture and security structure of trusted PDA, Chinese Journal of Computers, 33(1): 82-92. http://dx.doi.org/10.3724/SP.J.1016.2010.00082
Calheiros R. N. et al.(2011); CloudSim: a toolkit for modeling and simulation of cloud computing
Wang W. et al. (2012); Dynamic trust evaluation and scheduling framework for cloud computing.
Published
Issue
Section
License
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.