A Cloud Security Framework Based on Trust Model and Mobile Agent

被引:0
|
作者
Benabied, Saddek [1 ]
Zitouni, Abdelhafid [1 ]
Djoudi, Mahieddine [2 ]
机构
[1] Univ Constantine 2, LIRE Labs, Constantine, Algeria
[2] Univ Poitiers, XLIM SIC Labs, Futuroscope, France
关键词
Cloud computing; Cloud Computing Security; Security and Privacy; Trust Model; Mobile Agent; Trust; cloud service provider;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing as a potential paradigm offers tremendous advantages to enterprises. With the cloud computing, the market's entrance time is reduced, computing capabilities is augmented and computing power is really limitless. Usually, to use the full power of cloud computing, cloud users has to rely on external cloud service provider for managing their data. Nevertheless, the management of data and services are probably not fully trustworthy. Hence, data owners are uncomfortable to place their sensitive data outside their own system. i.e., in the cloud. Bringing transparency, trustworthiness and security in the cloud model, in order to fulfill client's requirements are still ongoing. To achieve this goal, our paper introduces two levels security framework: Cloud Service Provider (CSP) and Cloud Service User (CSU). Each level is responsible for a particular task of the security. The CSU level includes a proxy agent and a trust agent, dealing with the first verification. Then a second verification is performed at the CSP level. The framework incorporates a trust model to monitor users' behaviors. The use of mobile agents will exploit their intrinsic features such as mobility, deliberate localization and secure communication channel provision. This model aims to protect user's sensitive information from other internal or external users and hackers. Moreover, it can detect policy breaches, where the users are notified in order to take necessary actions when malicious access or malicious activity would occur.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [1] Mobile Agent Security Based on Trust Model in MANET
    Chowdhury, Chandreyee
    Neogy, Sarmistha
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I, 2011, 190 : 129 - 140
  • [2] Mobile agent security based on trust model in MANET
    Dept. of Computer Science and Engineering, Jadavpur University, India
    Commun. Comput. Info. Sci., PART 1 (129-140):
  • [3] On the design of a new trust model for mobile agent security
    Lin, C
    Varadharajan, V
    Wang, Y
    Mu, Y
    TRUST AND PRIVACY IN DIGITAL BUSINESS, PROCEEDINGS, 2004, 3184 : 60 - 69
  • [4] Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing
    Jiang, Weijin
    Wang, Yang
    Jiang, Yirong
    Xu, Yuhui
    Chen, Jiahui
    Tan, Lina
    Liang, Guo
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 62 (01): : 123 - 136
  • [5] Mobile internet mobile agent system dynamic trust model for cloud computing
    Jiang W.-J.
    Lv S.-J.
    Kongzhi yu Juece/Control and Decision, 2022, 37 (02): : 499 - 505
  • [6] Security Framework for Agent-Based Cloud Computing
    Venkateshwaran, K.
    Malviya, Anu
    Dikshit, Utkarsha
    Venkatesan, S.
    INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2015, 3 (03): : 35 - 42
  • [7] Formal Security Framework For Agent Based Cloud Systems
    Masmoudi, Fatma
    Loulou, Monia
    Kacem, Ahmed Hadj
    2014 3RD INTERNATIONAL WORKSHOP ON ADVANCED INFORMATION SYSTEMS FOR ENTERPRISES (IWAISE'14), 2014, : 15 - 21
  • [8] Security and trust enhanced mobile agent based system design
    Foster, D
    Varadharajan, V
    Third International Conference on Information Technology and Applications, Vol 1, Proceedings, 2005, : 155 - 160
  • [9] Research on Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing
    Jiang, Weijin
    Wang, Yang
    Jiang, Yirong
    Chen, Jiahui
    Xu, Yuhui
    Tan, Lina
    CHINA COMMUNICATIONS, 2019, 16 (07) : 174 - 194
  • [10] Research on Mobile Internet Mobile Agent System Dynamic Trust Model for Cloud Computing
    Weijin Jiang
    Yang Wang
    Yirong Jiang
    Jiahui Chen
    Yuhui Xu
    Lina Tan
    China Communications, 2019, 16 (07) : 174 - 194