A Trust Based Approach for Increasing Security in Cloud Computing Infrastructure

被引:9
|
作者
Banirostam, Hamid [1 ]
Hedayati, Alireza [2 ]
Zadeh, Ahmad Khadem [3 ]
Shamsinezhad, Elham [1 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Sci & Res Branch Guilan, Rasht, Iran
[2] Islamic Azad Univ, Dept Comp Engn, Cent Tehran Branch, Tehran, Iran
[3] Informat & Commun Technol, Res Inst, Tehran, Iran
关键词
Eucalyptus; Live immigration; Trust; Virtual Machine;
D O I
10.1109/UKSim.2013.39
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Users of cloud computing do not have currently appropriate tools for their verification of confidentiality, privacy policy, computing accuracy, and data integrity. To deal with this problem, a new approach called Trusted Cloud Computing Infrastructure is proposed inspired by Trusted Cloud Computing Platform. Through presenting a User Trusted Entity (UTE) the proposed approach is supposed to make cloud computing infrastructures reliable in order to enable infrastructure service developers to provide a closed execution environment. One advantage of the proposed UTE is that managers of Infrastructure as a Service (IaaS) systems have no privilege within UTE. Therefore cloud computing managers cannot interfere in Trusted Coordinator functionality. It has been assumed UTE should be kept by a third agent without any incentives to collude with IaaS services and highly trusted to ensure confidential execution of guest virtual machines. In addition, UTE allows users to authenticate IaaS server and determine the security of cloud service before startup of virtual machine.
引用
收藏
页码:717 / 721
页数:5
相关论文
共 50 条
  • [1] A Layered Security Approach for Cloud Computing Infrastructure
    Yildiz, Mehmet
    Abawajy, Jemal
    Ercan, Tuncay
    Bernoth, Andrew
    [J]. 2009 10TH INTERNATIONAL SYMPOSIUM ON PERVASIVE SYSTEMS, ALGORITHMS, AND NETWORKS (ISPAN 2009), 2009, : 763 - +
  • [2] A Novel Approach to Cloud Computing: Infrastructure as a Service Security
    Jain, Sarika
    Tyagi, Prachi
    Kalra, Siddharth
    [J]. 2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2016, : 501 - 504
  • [3] The Cloud based Edge Computing with IoT Infrastructure and Security
    Velmurugadass, P.
    Dhanasekaran, S.
    Sasikala, S.
    [J]. 2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 30 - +
  • [4] Trust Model for Computing Security of Cloud
    Rathi, Snehal R.
    Kolekar, Vikas K.
    [J]. 2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [5] Trust Based Interoperability Security Protocol for Grid and Cloud Computing
    Rajagopal, R.
    Chitra, M.
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [6] Monitoring based security approach for cloud computing
    Yadav A.
    Ritika
    Garg M.L.
    [J]. Ingenierie des Systemes d'Information, 2019, 24 (06): : 611 - 617
  • [7] Safeguarding Cloud Computing Infrastructure: A Security Analysis
    Alenezi, Mamdouh
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 37 (02): : 159 - 167
  • [8] Special issue on trust and security in cloud computing
    Ko, Ryan K. L.
    Kirchberg, Markus
    Lee, Bu Sung
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2183 - 2184
  • [9] Trust Model to Enhance Security of Cloud Computing
    Mohsenzadeh, Ali
    [J]. JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE-JMCS, 2015, 14 (04): : 315 - 325
  • [10] A Trust-Based Model for Security Cooperating in Vehicular Cloud Computing
    Tang, Zhipeng
    Liu, Anfeng
    Li, Zhetao
    Choi, Young-june
    Sekiya, Hiroo
    Li, Jie
    [J]. MOBILE INFORMATION SYSTEMS, 2016, 2016