Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-3-642-10665-1_7guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Trust Model to Enhance Security and Interoperability of Cloud Environment

Published: 22 November 2009 Publication History
  • Get Citation Alerts
  • Abstract

    Trust is one of the most important means to improve security and enable interoperability of current heterogeneous independent cloud platforms. This paper first analyzed several trust models used in large and distributed environment and then introduced a novel cloud trust model to solve security issues in cross-clouds environment in which cloud customer can choose different providers' services and resources in heterogeneous domains can cooperate. The model is domain-based. It divides one cloud provider's resource nodes into the same domain and sets trust agent. It distinguishes two different roles cloud customer and cloud server and designs different strategies for them. In our model, trust recommendation is treated as one type of cloud services just like computation or storage. The model achieves both identity authentication and behavior authentication. The results of emulation experiments show that the proposed model can efficiently and safely construct trust relationship in cross-clouds environment.

    References

    [1]
    Foster, I., Kesselman, C.: The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann, San Francisco (1999).
    [2]
    Chinacloud.cn, http://www.chinacloud.cn
    [3]
    Foster, I., Kesselman, C., Nick, J., Tuecke, S.: The Physiology of the Grid: an Open Grid Services Architecture for Distributed Systems Integration. Technical report, Global Grid Forum (2002).
    [4]
    Xu, Z., Feng, B., Li, W.: Cloud Computing Technology. Publishing House of Electronics Industry, Beijing (2004).
    [5]
    Gartner.: Security Issue of Cloud Computing, http://cio.ctocio.com.cn/12/8723012.shtml
    [6]
    Urquhart, J.: The Biggest Cloud-Computing Issue of 2009 is Trust (2009), http://news.cnet.com/8301-19413_3-10133487-240.html
    [7]
    Li, W., Wang, X., Fu, Y., Fu, Z.: Study on Several Trust Models in Grid Environment. Journal of Fuzhou University Natural Science Edition 34(2), 189-193 (2006).
    [8]
    Blaze, M., loannidis, J., Keromytis, A.D.: Experience with the KeyNote Trust Management System. Applications and Future Directions. In: iTrust 2008, pp. 284-300 (2003).
    [9]
    Meng, X., Zhang, G., Kang, J., Li, H., Li, D.: A New Subjective Trust Model Based on Cloud Model. In: ICNSC 2008, 5th IEEE International Conference on Networking, Sensing and Control Sanya China, April 6-8, pp. 1125-1130 (2008).
    [10]
    Xiao-Yong, L.I., Xiao-Lin, G.U.I.: Research on Dynamic Trust Model for Large Scale Distributed Environment. Journal of Software 18(6), 1510-1521 (2007).
    [11]
    Song, S., Hwang, K., Macwan, M.: Fuzzy Trust Integration for Security Enforcement in Grid Computing. In: Jin, H., Gao, G.R., Xu, Z., Chen, H. (eds.) NPC 2004. LNCS, vol. 3222, pp. 9-21. Springer, Heidelberg (2004).
    [12]
    Altman, J.: PKI Security for JXTA Overlay Network, Technical Report, TR-I2-03-06, Palo Alto; Sun Microsystem (2003).
    [13]
    Perlman, R.: An Overview of PKI Trust Models. IEEE Network 13, 38-43 (1999).
    [14]
    Dou, W., Wang, H., Jia, Y., Zou, P.: A Recommendation-Based Peer-to-Peer Trust Model. Software Journal 15(4), 571-583 (2004).
    [15]
    Gan, Z., Zeng, G.: A Trust Evaluation Model Based on Behavior in Grid Environment. Computer Application and Software 22(2), 63-64 (2005).
    [16]
    Zhu, J., Yang, S., Fan, J., Chen, M.: A Grid&P2P Trust Model Based on Recommendation Evidence Reasoning. Journal of Computer Research and Development 42(5), 797-803 (2005).
    [17]
    Li, X., Michael, R., Liu, J.: A Trust Model Based Routing Protocol for Secure Ad Hoc Network. In: Proceedings of the 2004 IEEE Aerospace Conference, vol. 2, pp. 1286-1295 (2004).
    [18]
    Lin, C., Varadharajan, V., Wang, Y.: Enhancing Grid Security with Trust Management. In: Proceedings of the 2004 IEEE International Conference on Service Computing, pp. 303-310 (2004).
    [19]
    Azzendin, F., Maheswaran, M.: Evolving and Managing Trust in Grid Computing Systems. In: Proceedings of the 2002 IEEE Canadian Conference on Electrical & Computer Engineering, vol. 3, pp. 1424-1429 (2002).
    [20]
    Abdul-Rahman, A., Hailes, S.: Supporting Trust in Virtual Communities. In: Proceedings of the 33rd Hawaii International Conference on System Sciences, Hawaii, vol. 1 (2000).
    [21]
    Wang, L., Yang, S.: A Trust Model in Grid Environment. Journal of Computer Engineering and Application 40(23), 50-53 (2004).
    [22]
    Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A Security Architecture for Computational Grids. In: The 5th ACM Conference on Computer and Communication Security, pp. 83-92 (1998).
    [23]
    Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud Computing and Grid Computing 360-Degree Compared. In: Grid Computing Environments Workshop, GCE 2008. IEEE, Los Alamitos (2008).

    Cited By

    View all
    • (2023)Do You Need a Distributed Ledger Technology Interoperability Solution?Distributed Ledger Technologies: Research and Practice10.1145/35645322:1(1-37)Online publication date: 14-Mar-2023
    • (2019)A Comprehensive Review of Access Control Mechanism Based on Attribute Based Encryption Scheme for Cloud ComputingInternational Journal of Advanced Pervasive and Ubiquitous Computing10.4018/IJAPUC.201907010311:3(33-52)Online publication date: 1-Jul-2019
    • (2019)A detailed analysis of trust models in cloud environmentProceedings of the Second International Conference on Data Science, E-Learning and Information Systems10.1145/3368691.3368740(1-5)Online publication date: 2-Dec-2019
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    CloudCom '09: Proceedings of the 1st International Conference on Cloud Computing
    November 2009
    704 pages
    ISBN:9783642106644
    • Editors:
    • Martin Gilje Jaatun,
    • Gansen Zhao,
    • Chunming Rong

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 22 November 2009

    Author Tags

    1. cloud computing
    2. heterogeneous domain
    3. role
    4. trust model
    5. trust recommendation

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 12 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Do You Need a Distributed Ledger Technology Interoperability Solution?Distributed Ledger Technologies: Research and Practice10.1145/35645322:1(1-37)Online publication date: 14-Mar-2023
    • (2019)A Comprehensive Review of Access Control Mechanism Based on Attribute Based Encryption Scheme for Cloud ComputingInternational Journal of Advanced Pervasive and Ubiquitous Computing10.4018/IJAPUC.201907010311:3(33-52)Online publication date: 1-Jul-2019
    • (2019)A detailed analysis of trust models in cloud environmentProceedings of the Second International Conference on Data Science, E-Learning and Information Systems10.1145/3368691.3368740(1-5)Online publication date: 2-Dec-2019
    • (2019)TSLAMACM Transactions on Autonomous and Adaptive Systems10.1145/331760413:4(1-41)Online publication date: 25-Jul-2019
    • (2019)Trust Evaluation in Cross-Cloud FederationACM Computing Surveys10.1145/329249952:1(1-37)Online publication date: 13-Feb-2019
    • (2019)RETRACTED ARTICLE: A trust based security framework with anonymous authentication system using multiple attributes in decentralized cloudCluster Computing10.1007/s10586-018-2478-322:Suppl 2(3883-3892)Online publication date: 1-Mar-2019
    • (2018)Securely Communicating with an Optimal Cloud for Intelligently Enhancing a Cloud's ElasticityInternational Journal of Intelligent Information Technologies10.4018/IJIIT.201804010314:2(43-58)Online publication date: 1-Apr-2018
    • (2018)Comprehensive three-layer trust management model for public cloud environmentInternational Journal of Business Information Systems10.1504/IJBIS.2018.09253128:3(371-391)Online publication date: 1-Jan-2018
    • (2018)Modelling trust and risk for cloud servicesJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-018-0114-77:1(1-16)Online publication date: 1-Dec-2018
    • (2018)A framework with data-centric accountability and auditability for cloud storageThe Journal of Supercomputing10.1007/s11227-018-2504-574:11(5903-5926)Online publication date: 1-Nov-2018
    • Show More Cited By

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media