A Two-Layer Hybrid Trust Mechanism Based on Agent Trust

2014 ◽  
Vol 701-702 ◽  
pp. 923-926
Author(s):  
Jian Wei Ye ◽  
Xu Lu Jiao ◽  
Zhi Kai Xu

Trust is the foundation of all kinds of Internet activity. As a more open resource sharing model, cloud computing environment consists of mass resource owners and users belonged to different control domain. Therefore, the establishment of the trust relationship among the participants and the guarantee of security and efficiency in the computing process are one of the most fundamental problems of cloud computing security. This paper proposes a two-Layer hybrid trust mechanism based on agent trust. In my proposition, trust relationship is relayed and secure computing environment is established among the different participants by the various existing trust methods.

Author(s):  
Prasanta K. Manohari ◽  
Niranjan K. Ray

Cloud computing is one of the emerging technology in the recent times which has varieties of applications at different fields. It is an Internet dependent technology and it store and maintain the data in a cloud data center. Cloud center usually supports more numbers of user, applications and data. In the same time, it also suffered with numerous challenges. Security is a key requirement for cloud data center. Different security mechanisms are proposed for cloud computing environment. In this chapter, we address the background of cloud computing, security risk, requirements, issues, and some of the security techniques are discussed. We discuss different security issues and focus on some existing solutions.


2016 ◽  
pp. 1053-1066 ◽  
Author(s):  
Nitin Nagar ◽  
Ugrasen Suman

Cloud computing is comprised of major demand from the every group of organization because of easy availability and cost effectiveness. The responsibilities of cloud service providers will become increasing more due to the great progression in every cloud computing deployment model (public, private and hybrid) and service models (SaaS, PaaS and IaaS). In this perspective, cloud computing faces multiple challenges, especially in cloud computing security at all levels (e.g., host, network, application and data levels). Authentication is the constantly the biggest concerned for IT industries to adopt cloud computing environment. The availability, performance, key logger attack, malicious insiders, outsider attacks and service disruptions explore (service hijacking) issues are the key research challenges in the cloud computing authentication level. In this aspect, traditional user name and password is not enough as a single factor (first factor). This paper has proposed a secure cloud computing framework which uses first factor as a crypt user name and password with the ATM pin as a second factor called M-pin. The proposed work focuses on a solution to the threats that are the major issues in the cloud adoption.


2013 ◽  
Vol 278-280 ◽  
pp. 1962-1965
Author(s):  
Song Fei ◽  
Xiao Jing Wang ◽  
Zhe Cui

Proposed a new trust model based on P2P technology in the cloud computing environment. The model takes into account more than one cloud computing platform, that is, considering the different cloud computing service provider provide the service of a cross-cloud platform. Such cross-platform cloud (Cross Cloud) can be called the composite cloud computing platform or cloud associated cloud computing platform.The nodes in the cloud computing environment are divided into two categories: customers and providers. According to the different roles of these two nodes, we designed a different trust mechanism, to divide the trust domain with independent single cloud, considered node independence and manageability of domain to process trust choice and trust update, and proposed a new kind of cloud computing service - trust recommendation service.


2011 ◽  
Vol 282-283 ◽  
pp. 433-436
Author(s):  
Hong Wei Zhao

Cloud computing technology is an efficient way to resolve the resource sharing and cooperative work in distributed environments. The resource discovery mechanism is a key problem in Cloud computing. In order to implement the quick discovery of service resource and the balanced distribution of resource on the Cloud computing system, a resource discovery mechanism in Cloud computing environment has been designed and implemented. Firstly, a Formula based on each node's loading has been proposed. Secondly, a comprehensive service distribution method has been designed in consideration about each node’s performance and current loading distribution. Finally, the result of the experiment indicates that the discovery mechanism can improve the efficiency of the resource and the utilization ratio of the service resource.


2019 ◽  
Vol 8 (S1) ◽  
pp. 80-83
Author(s):  
J. VimalRosy ◽  
S. Britto Ramesh Kumar

Day by day witnesses a wide development of information technology in the use of cloud computing, and its services shape its architecture. It is indeed, that replaces the former attempts to enrich the security strategy in cloud computing. Security is one of the major issues in the cloud computing environment. In this paper we investigate about security threads and possible solution for cloud. The paper is categorized as follows: Section I describes the cloud computing overview. Section II describes the security threats and challenges in cloud computing. Section III describes the Obstacles and vulnerabilities that can be carried out to cloud environments. Section IV describes the possible solution of the issues. Section V concludes the paper with a cloud computing security.


2014 ◽  
Vol 687-691 ◽  
pp. 2867-2870 ◽  
Author(s):  
Xiao Yong Zhao ◽  
Chun Rong Yang

The rise of Massive Open Online Course (MOOC) has enabled open courses to overcome the shortcomings of its traditional mode. Interactions and communications have become important elements in online open courses right now. Cloud computing is a new platform for MOOC development, which is extension of the distribution computing, the parallel computing and the grid computing, settling the problem of various resource sharing. In this paper, the design of cloud computing environments is showed with the cloud computing system structure, network security analysis of cloud computing, and map-reduce program mode, which forms the model of cloud computing environment.


2014 ◽  
Vol 687-691 ◽  
pp. 3019-3022 ◽  
Author(s):  
Jun Jun Liu

Cloud computing technology is emerging technology in the field of information technology, and its technical advantage has brought new opportunities and challenges for the development and service of digital library in the Internet era. Virtualization is the key technology of cloud computing, and the paper discusses the virtualization of digital library in the cloud computing environment from technical level. Firstly, the paper introduced cloud computing and virtualization technology; then created a virtualized environment for digital library based on the cloud computing technology, and described the function of various levels; finally, the capacity of virtual machines appointment scheduling can be calculated according to formulas. The paper has great significance in enhancing the efficiency and quality of library service, constructing resource sharing system of digital library.


2018 ◽  
pp. 27-53
Author(s):  
Prasanta K. Manohari ◽  
Niranjan K. Ray

Cloud computing is one of the emerging technology in the recent times which has varieties of applications at different fields. It is an Internet dependent technology and it store and maintain the data in a cloud data center. Cloud center usually supports more numbers of user, applications and data. In the same time, it also suffered with numerous challenges. Security is a key requirement for cloud data center. Different security mechanisms are proposed for cloud computing environment. In this chapter, we address the background of cloud computing, security risk, requirements, issues, and some of the security techniques are discussed. We discuss different security issues and focus on some existing solutions.


Sign in / Sign up

Export Citation Format

Share Document