Study on Cloud Security Based on Trust Spanning Tree Protocol

被引:0
|
作者
Yingxu Lai
Zenghui Liu
Qiuyue Pan
Jing Liu
机构
[1] Beijing University of Technology,College of Computer Science
[2] Beijing Polytechnic,Automation Engineering Institute
来源
International Journal of Theoretical Physics | 2015年 / 54卷
关键词
STP; Cloud security; Trust evaluation; Trusted network;
D O I
暂无
中图分类号
学科分类号
摘要
Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.
引用
收藏
页码:3311 / 3330
页数:19
相关论文
共 50 条
  • [21] Establishing Trust in Cloud Services via Integration of Cloud Trust Protocol with a Trust Label System
    Emeakaroha, Vincent C.
    O'Meara, Eoin
    Lee, Brian
    Lynn, Theo
    Morrison, John P.
    CLOSER: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2017, : 590 - 597
  • [22] Data fusaggregation algorithm based on dynamic minimal spanning tree routing protocol
    Peng Hai-Xia
    Zhao Hai
    Li Da-Zhou
    Lin Chuan
    ACTA PHYSICA SINICA, 2014, 63 (09)
  • [23] A wireless sensor networks route protocol based on hierarchical minimum spanning tree
    Zhou, Zude
    Xu, Chao
    Liu, Quan
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 666 - +
  • [24] Cloud-based global online marketplaces review on trust and security
    Ghazali O.
    Leow C.Y.
    Qaiser S.
    Pattabiraman N.
    Vasuthevan S.
    Abdusalam E.M.
    Barakat M.M.
    International Journal of Interactive Mobile Technologies, 2019, 13 (04): : 96 - 116
  • [25] Fuzzy logic Approach Based on User behavior Trust in Cloud Security
    Alruwaythi, Maryam
    Nygard, Kendall E.
    2019 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2019,
  • [26] A Trust-Based Model for Security Cooperating in Vehicular Cloud Computing
    Tang, Zhipeng
    Liu, Anfeng
    Li, Zhetao
    Choi, Young-june
    Sekiya, Hiroo
    Li, Jie
    MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [27] Cloud Security with Virtualized Defense and Reputation-based Trust Management
    Hwang, Kai
    Kulkarni, Sameer
    Hu, Yue
    EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 717 - +
  • [28] Cyber-security trust model through adaptive cloud authentication protocol for web application
    Alsuwat, Hatim
    JOURNAL OF ELECTRONIC IMAGING, 2023, 32 (04)
  • [29] Security enhancement on an RFID ownership transfer protocol based on cloud
    Lee, Cheng-Chi
    Chen, Shun-Der
    Li, Chun-Ta
    Cheng, Chung-Lun
    Lai, Yan-Ming
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 266 - 277
  • [30] TTP based Vivid Protocol Design for Authentication and Security for Cloud
    Bhardwaj, Akhilesh Kumar
    Mahajan, Rajiv
    Surender
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 3275 - 3278