A Trust-Based Defensive System Model for Cloud Computing

被引:0
|
作者
Zhou, Qian [1 ]
Yu, Jiong [1 ]
Yu, Feiran [2 ]
机构
[1] Xin Jiang Univ, Coll Informat Sci & Engn, Urumqi, Xin Jiang, Peoples R China
[2] N China Elect Power Univ, Control & Comp Technol Sch, Beijing, Peoples R China
来源
关键词
cloud security; trusted cloud; trust; behavioral evidence; fuzzy AHP; multiple detection engines;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Because of the dynamic and open characteristics of the cloud computing, continuing malicious attacks happen frequently. Combining the idea of trusted cloud, a trust-based defensive system model for cloud computing has been constructed to guarantee the cloud security. Through real-timely monitoring, users' behavior evidences have been obtained and standardized; a new method for users' trust evaluation based on fuzzy AHP (Analytic Hierarchy Process, AHP) has been presented, it gradually determines the weights of behavior evidences, achieves quantitative assessment of behavioral trust; to provide great security defense for users, multiple detection engines have been used to conduct a comprehensive inspection of suspicious files and integrated decisions have been made. Experimental results show the system model can effectively eliminate the malicious behaviors from undesirable users, reduce users' damages caused by virus and achieve a two-way defense for both cloud and client.
引用
收藏
页码:146 / +
页数:2
相关论文
共 50 条
  • [1] A trust-based cloud computing access control model
    Huang, Lanying
    Xiong, Zenggang
    Wang, Guangwei
    Ye, Conghuan
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2016, 20 (04) : 197 - 203
  • [2] A Trust-Based Model for Security Cooperating in Vehicular Cloud Computing
    Tang, Zhipeng
    Liu, Anfeng
    Li, Zhetao
    Choi, Young-june
    Sekiya, Hiroo
    Li, Jie
    MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [3] Psychological Dimensions in Trust-Based Models in Cloud Computing
    AlShammari, Maha M.
    2020 19TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS FOR BUSINESS ENGINEERING AND SCIENCE (DCABES 2020), 2020, : 87 - 91
  • [4] Review of Trust-based File Sharing in Cloud Computing
    Canedo, Edna Dias
    Albuquerque, Robson de Oliveira
    de Sousa Junior, Rafael Timoteo
    PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON ADVANCES IN MESH NETWORKS (MESH 2011), 2011, : 44 - 50
  • [5] A trust-based resource selection algorithm in Cloud Computing
    Liu, Xinran, 1600, Transport and Telecommunication Institute, Lomonosova street 1, Riga, LV-1019, Latvia (18):
  • [6] A Trust-Based Approach for a Competitive Cloud/Grid Computing Scenario
    Messina, Fabrizio
    Pappalardo, Giuseppe
    Rosaci, Domenico
    Santoro, Corrado
    Sarne, Giuseppe M. L.
    INTELLIGENT DISTRIBUTED COMPUTING VI, 2013, 446 : 129 - 138
  • [7] A Trust-Based Agent Learning Model for Service Composition in Mobile Cloud Computing Environments
    Li, Wenjuan
    Cao, Jian
    Hu, Keyong
    Xu, Jie
    Buyya, Rajkumar
    IEEE ACCESS, 2019, 7 : 34207 - 34226
  • [8] Trust-based dynamic authorization model for pervasive computing
    Guo, Yajun
    Wang, Liang
    Hong, Fan
    Han, Lansheng
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2007, 35 (08): : 70 - 73
  • [9] A Trust-Based Access Control Model for Pervasive Computing Applications
    Toahchoodee, Manachai
    Abdunabi, Ramadan
    Ray, Indrakshi
    Ray, Indrajit
    DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 307 - 314
  • [10] A trust-based security system for ubiquitous and pervasive computing environments
    Boukerche, Azzedine
    Ren, Yonglin
    COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4343 - 4351