A Cloud Security Framework Based on Trust Model and Mobile Agent

被引:0
|
作者
Benabied, Saddek [1 ]
Zitouni, Abdelhafid [1 ]
Djoudi, Mahieddine [2 ]
机构
[1] Univ Constantine 2, LIRE Labs, Constantine, Algeria
[2] Univ Poitiers, XLIM SIC Labs, Futuroscope, France
关键词
Cloud computing; Cloud Computing Security; Security and Privacy; Trust Model; Mobile Agent; Trust; cloud service provider;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing as a potential paradigm offers tremendous advantages to enterprises. With the cloud computing, the market's entrance time is reduced, computing capabilities is augmented and computing power is really limitless. Usually, to use the full power of cloud computing, cloud users has to rely on external cloud service provider for managing their data. Nevertheless, the management of data and services are probably not fully trustworthy. Hence, data owners are uncomfortable to place their sensitive data outside their own system. i.e., in the cloud. Bringing transparency, trustworthiness and security in the cloud model, in order to fulfill client's requirements are still ongoing. To achieve this goal, our paper introduces two levels security framework: Cloud Service Provider (CSP) and Cloud Service User (CSU). Each level is responsible for a particular task of the security. The CSU level includes a proxy agent and a trust agent, dealing with the first verification. Then a second verification is performed at the CSP level. The framework incorporates a trust model to monitor users' behaviors. The use of mobile agents will exploit their intrinsic features such as mobility, deliberate localization and secure communication channel provision. This model aims to protect user's sensitive information from other internal or external users and hackers. Moreover, it can detect policy breaches, where the users are notified in order to take necessary actions when malicious access or malicious activity would occur.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [31] Research on Mobile User Dynamic Trust Model Based on Mobile Agent System
    Jiang, Weijin
    Xu, Yuhui
    HUMAN CENTERED COMPUTING, HCC 2017, 2018, 10745 : 538 - 549
  • [32] Security Schemes for a Mobile Agent Based Network and System Management Framework
    Ching-hang Fong
    Gerard Parr
    Philip Morrow
    Journal of Network and Systems Management, 2011, 19 : 230 - 256
  • [33] Security Schemes for a Mobile Agent Based Network and System Management Framework
    Fong, Ching-hang
    Parr, Gerard
    Morrow, Philip
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2011, 19 (02) : 230 - 256
  • [34] Wrapper-based security monitoring framework in mobile agent system
    Liu, S.P.
    Zhang, S.Y.
    Wu, C.R.
    Ruan Jian Xue Bao/Journal of Software, 2001, 12 (SUPPL.): : 107 - 112
  • [35] Security Framework for Mobile Agent Platforms (SFMAP)
    Kapnoullas, T
    Chang, E
    Dillon, TS
    Damiani, E
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2003: OTM 2003 WORKSHOPS, 2003, 2889 : 845 - 858
  • [36] A Flexible Security Framework for Mobile Agent Systems
    Patel, R. B.
    Garg, K.
    CONTROL AND INTELLIGENT SYSTEMS, 2005, 33 (03)
  • [37] A Brain-Inspired Trust Management Model to Assure Security in a Cloud Based IoT Framework for Neuroscience Applications
    Mahmud, Mufti
    Kaiser, M. Shamim
    Rahman, M. Mostafizur
    Rahman, M. Arifur
    Shabut, Antesar
    Al-Mamun, Shamim
    Hussain, Amir
    COGNITIVE COMPUTATION, 2018, 10 (05) : 864 - 873
  • [38] A Brain-Inspired Trust Management Model to Assure Security in a Cloud Based IoT Framework for Neuroscience Applications
    Mufti Mahmud
    M. Shamim Kaiser
    M. Mostafizur Rahman
    M. Arifur Rahman
    Antesar Shabut
    Shamim Al-Mamun
    Amir Hussain
    Cognitive Computation, 2018, 10 : 864 - 873
  • [39] A Trust-Based Model for Security Cooperating in Vehicular Cloud Computing
    Tang, Zhipeng
    Liu, Anfeng
    Li, Zhetao
    Choi, Young-june
    Sekiya, Hiroo
    Li, Jie
    MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [40] A Trust Model for Security and Privacy in Cloud Services
    Himanshu, Gupta
    Afewou, Kodjo Desire
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 443 - 450