Study on Cloud Security Based on Trust Spanning Tree Protocol

被引:0
|
作者
Yingxu Lai
Zenghui Liu
Qiuyue Pan
Jing Liu
机构
[1] Beijing University of Technology,College of Computer Science
[2] Beijing Polytechnic,Automation Engineering Institute
来源
International Journal of Theoretical Physics | 2015年 / 54卷
关键词
STP; Cloud security; Trust evaluation; Trusted network;
D O I
暂无
中图分类号
学科分类号
摘要
Attacks executed on Spanning Tree Protocol (STP) expose the weakness of link layer protocols and put the higher layers in jeopardy. Although the problems have been studied for many years and various solutions have been proposed, many security issues remain. To enhance the security and credibility of layer-2 network, we propose a trust-based spanning tree protocol aiming at achieving a higher credibility of LAN switch with a simple and lightweight authentication mechanism. If correctly implemented in each trusted switch, the authentication of trust-based STP can guarantee the credibility of topology information that is announced to other switch in the LAN. To verify the enforcement of the trusted protocol, we present a new trust evaluation method of the STP using a specification-based state model. We implement a prototype of trust-based STP to investigate its practicality. Experiment shows that the trusted protocol can achieve security goals and effectively avoid STP attacks with a lower computation overhead and good convergence performance.
引用
收藏
页码:3311 / 3330
页数:19
相关论文
共 50 条
  • [41] Spanning Tree Protocol Simulation Based on Software Defined Network Using Mininet Emulator
    Irawati, Indrarini Dyah
    Nuruzzamanirridha, Mohammad
    INTELLIGENCE IN THE ERA OF BIG DATA, ICSIIT 2015, 2015, 516 : 395 - 403
  • [42] CMSTR: A Constrained Minimum Spanning Tree Based Routing Protocol for Wireless Sensor Networks
    Lin, Deyu
    Lin, Zihao
    Kong, Linghe
    Guan, Yong Liang
    AD HOC NETWORKS, 2023, 146
  • [43] Trust Enhanced Cloud Security for Healthcare Services
    Tupakula, Udaya
    Varadharajan, Vijay
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 344 - 351
  • [44] Special issue on trust and security in cloud computing
    Ko, Ryan K. L.
    Kirchberg, Markus
    Lee, Bu Sung
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2183 - 2184
  • [45] Trust Model to Enhance Security of Cloud Computing
    Mohsenzadeh, Ali
    JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE-JMCS, 2015, 14 (04): : 315 - 325
  • [46] A Trust Model for Security and Privacy in Cloud Services
    Himanshu, Gupta
    Afewou, Kodjo Desire
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 443 - 450
  • [47] Simple protocol enhancements of Rapid Spanning Tree Protocol over ring topologies
    Marchese, M.
    Mongelli, M.
    COMPUTER NETWORKS, 2012, 56 (04) : 1131 - 1151
  • [48] SDN/NFV-Based Security Service Function Tree for Cloud
    Luo, Jing-Lun
    Yu, Shun-Zheng
    Peng, Si-Jie
    IEEE ACCESS, 2020, 8 (08): : 38538 - 38545
  • [49] Simple Protocol Enhancements of Rapid Spanning Tree Protocol over Ring Topologies
    Marchese, M.
    Mongelli, M.
    Portomauro, G.
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [50] Distributed Trust Protocol for IaaS Cloud Computing
    Kashif, Ubaidullah Alias
    Memon, Zulfiqar Ali
    Balouch, Abdul Rasheed
    Chandio, Jamil Ahmed
    2015 12TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2015, : 275 - 279