A Two-Layer Hybrid Trust Mechanism Based on Agent Trust

Article Preview

Abstract:

Trust is the foundation of all kinds of Internet activity. As a more open resource sharing model, cloud computing environment consists of mass resource owners and users belonged to different control domain. Therefore, the establishment of the trust relationship among the participants and the guarantee of security and efficiency in the computing process are one of the most fundamental problems of cloud computing security. This paper proposes a two-Layer hybrid trust mechanism based on agent trust. In my proposition, trust relationship is relayed and secure computing environment is established among the different participants by the various existing trust methods.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

923-926

Citation:

Online since:

December 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Information on http: /blogs. idc. com/ie/?p=210.

Google Scholar

[2] Chow R, Golle P, Jakobsson M, et al, in: Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control, Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW '09, (2009).

DOI: 10.1145/1655008.1655020

Google Scholar

[3] Celesti A, Tusa F, Villari M, A Puliafito, in: Security and Cloud Computing: InterCloud Identity Management Infrastructure, Proceedings of the 19th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Larissa, Greece(2010).

DOI: 10.1109/wetice.2010.49

Google Scholar

[4] Santos N, Gummadi K P, Rodrigues R, in: TowardsTrusted Cloud Computing, Proceedings of the 2009 conference on Hot topics in cloud computing (2009).

Google Scholar

[5] Sadeghi A R, Schneider T, Winandy M, in: Token-Based Cloud Computing: Secure Outsourcing of Data and Arbitrary Computations with Lower Latency, Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, Berlin, Germany(2010).

DOI: 10.1007/978-3-642-13869-0_30

Google Scholar

[6] Shen Z D, Tong Q, in: The Security of Cloud Computing System Enabled by Trusted Computing Technology, Proceedings of the 2nd International Conference on Signal Processing Systems, Dalian China(2010).

DOI: 10.1109/icsps.2010.5555234

Google Scholar

[7] Saripalli P, Walters B, in: QUIRC: A Quantitative Impact and Risk Assessment Framework for Cloud Security, Proceedings of 3rd International Conference on Cloud Computing (2010).

DOI: 10.1109/cloud.2010.22

Google Scholar

[8] Li W, Ping L, in: Trust Model to Enhance Security and Interoperability of Cloud Environment, Proceedings of the 1st International Conference on Cloud Computing, Beijing China(2009).

DOI: 10.1007/978-3-642-10665-1_7

Google Scholar

[9] Hwang K, Kulkarni S, Hu Y, in: Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement, Proceedings of Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, Chendu China(2009).

DOI: 10.1109/dasc.2009.149

Google Scholar