Abstract
Because of the dynamic and open characteristics of the cloud computing, continuing malicious attacks happen frequently. Combining the idea of trusted cloud, a trust-based defensive system model for cloud computing has been constructed to guarantee the cloud security. Through real-timely monitoring, users’ behavior evidences have been obtained and standardized; a new method for users’ trust evaluation based on fuzzy AHP (Analytic Hierarchy Process, AHP) has been presented, it gradually determines the weights of behavior evidences, achieves quantitative assessment of behavioral trust; to provide great security defense for users, multiple detection engines have been used to conduct a comprehensive inspection of suspicious files and integrated decisions have been made. Experimental results show the system model can effectively eliminate the malicious behaviors from undesirable users, reduce users’ damages caused by virus and achieve a two-way defense for both cloud and client.
Chapter PDF
Similar content being viewed by others
References
Li, H., Li, H.: The key technology and realization of trusted cloud security. Posts & Telecom press, Beijing (2010)
Lin, C., Peng, X.-h.: Research on trustworthy networks. Chinese Journal of Computer 28(5), 751–758 (2005)
Song, S.S., Hwang, K., Macwan, M.: Fuzzy trust integration for security enforcement in grid computing. In: Jin, H., Gao, G.R., Xu, Z., Chen, H. (eds.) NPC 2004. LNCS, vol. 3222, pp. 9–21. Springer, Heidelberg (2004)
Zhou, R.-F., Hwang, K.: Power-Trust: A robust and scalable reputation system for trusted Peer-to-Peer computing. IEEE Transactions on Parallel and Distributed Systems 18(4), 460–473 (2007)
Jameel, H.: A trust model for ubiquitous systems based on vectors of trust values. In: The 7th IEEE Int’1 Symp. on Multimedia, pp. 674–679. IEEE Computer Society Press, Washington (2005)
Li, X.-y., Gui, X.-l.: Trust quantitative model with multiple decision factors in trusted network. Chinese Journal of Computer 32(3), 405–415 (2009)
A white paper of the network defense solutions of Secure Cloud from Trend Micro, http://www.chinacloud.cn/show.aspx?id=339&cid=29
Lin, C., Tian, L.-q., Wang, Y.-z.: Research on user behavior trust in trustworthy network. Journal of Computer Research and Development 45(12), 2033–2043 (2008)
Ji, T.-g., Tian, L.-q., Hu, Z.-x.: AHP-based user behavior evaluation method in trustworthy network. Computer Engineering and Applications 43(19), 123–126 (2007)
Wang, L.-f., Xu, S.-b.: The introduction of AHP. China Renmin University press, Beijing (1990)
Liu, L., Wang, H.-q., Liang, Y.: Evaluation method of service-level network security situation based on fuzzy analytic hierarchy process. Journal of Computer Applications 29(9), 2327–2331 (2009)
A test report of anti-virus softwares, http://www.av-comparatives.org/images/stories/test/ondret/avc_od_aug2010cns.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 IFIP International Federation for Information Processing
About this paper
Cite this paper
Zhou, Q., Yu, J., Yu, F. (2011). A Trust-Based Defensive System Model for Cloud Computing. In: Altman, E., Shi, W. (eds) Network and Parallel Computing. NPC 2011. Lecture Notes in Computer Science, vol 6985. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24403-2_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-24403-2_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24402-5
Online ISBN: 978-3-642-24403-2
eBook Packages: Computer ScienceComputer Science (R0)