Study on Cloud Security Based on Trust Spanning Tree Protocol

被引:0
|
作者
Yingxu Lai
Zenghui Liu
Qiuyue Pan
Jing Liu
机构
[1] Beijing University of Technology,College of Computer Science
[2] Beijing Polytechnic,Automation Engineering Institute
来源
International Journal of Theoretical Physics | 2015年 / 54卷
关键词
STP; Cloud security; Trust evaluation; Trusted network;
D O I
暂无
中图分类号
学科分类号
摘要
Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.
引用
收藏
页码:3311 / 3330
页数:19
相关论文
共 50 条
  • [1] Study on Cloud Security Based on Trust Spanning Tree Protocol
    Lai, Yingxu
    Liu, Zenghui
    Pan, Qiuyue
    Liu, Jing
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2015, 54 (09) : 3311 - 3330
  • [2] Trust-based Security for the Spanning Tree Protocol
    Lai, Yingxu
    Liu, Zenghui
    Pan, Qiuyue
    Chen, Yinong
    Zhou, Zhizheng
    PROCEEDINGS OF 2014 IEEE INTERNATIONAL PARALLEL & DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW), 2014, : 1339 - 1344
  • [3] Trust Based Interoperability Security Protocol for Grid and Cloud Computing
    Rajagopal, R.
    Chitra, M.
    2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [4] A STUDY OF PROTOCOL SECURITY -CLOUD ARCHITECTURE
    Sabapathi
    Muniyappan
    Senthil, Danu
    IIOAB JOURNAL, 2016, 7 (09) : 163 - 170
  • [5] A Study of Computational Trust Models in Cloud Security
    Thakare, Vaishali Ravindra
    Singh, John K.
    INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING, 2021, 13 (03) : 1 - 11
  • [6] Security, Privacy and Trust in Cloud Computing: A Comparative Study
    Alouane, Meryeme
    El Bakkali, Hanan
    2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 23 - 30
  • [7] Tree-based protocol for automated trust negotiation
    Yao, Hui
    Gao, Chengshi
    Dai, Qing
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 1112 - +
  • [8] A Security Routing Protocol Based On Convergence Degree and Trust
    Su Zhenzhen
    Sun Erkun
    Qi Xiaogang
    Nie Ying
    Lin Weihong
    Xie Mande
    COMPUTER AND INFORMATION TECHNOLOGY, 2014, 519-520 : 155 - +
  • [9] Trust-based security for the OLSR routing protocol
    Adnane, Asma
    Bidan, Christophe
    de Sousa Junior, Rafael Timoteo
    COMPUTER COMMUNICATIONS, 2013, 36 (10-11) : 1159 - 1171
  • [10] A security routing protocol based on convergence degree and trust
    Chen L.
    Qi X.
    Liu L.
    Zheng G.
    Qi, Xiaogang (xgqi@xidian.edu.cn), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (08): : 38 - 45