Design of Trust Model based on Cloud Computing

Ping HE, Jing QIU, Yan YI, Jianchun CAI, Zucheng DAI

Abstract

Cloud computing is a kind of burgeoning new business models and infrastructure, but the characteristic of openness, flexibility, and the public availability, to the application security has brought about many challenges. In this paper, by analyzing the current cloud computing, trust and trust management, and other technology, corresponding to the level of trust model based on behavior of cloud computing environment was given. According to user's behavior dynamically and trustworthiness of value, to determine the user's confidence level, further to control the corresponding behavior of users and permissions, it can guarantee the safety and reliability of the cloud computing system in order to standardize management and guide users.

References

  1. Zhang Yunyong, Chen Qingjin, Pan Songbai, Wei Jin wu. Cloud computing security key technology analysis [J]. Journal of telecom science, 2010 (9)
  2. Gao Yunlu, Shen Bei army, Kong Huafeng. Cloud computing trust model based on SLA and user evaluation [J]. Computer engineering 36 (7), 2012 (4)
  3. T.Dimitrakos. System Models, E-risk and E-trust towards Bridging the Gap?In:Towards the ESociety: EBusiness, E-Commerce,and E-Government, eds. B.Schmid, K. Stanoevska-Slabeva, V. Tschammer. Kluwer Academic Publishers. (2001).
  4. D.H. McKnight, N.L. Chervany, Conceptualizing Trust: A Typology and E-Commerce Customer Relationships Model, 34thAnnual Hawaii InternationalConference on System Sciences (HICSS-34)-Volume 7,01 03- 01,2001,pp.7022-7031.40
  5. T.Grandison& M.Sloman. A Survey of Trust in Internet Applications.IEEE Commtmications Survey and Tutorials. 2000.
  6. R.C.Mayer, J.H.Davis, D.F.Schoorman. An Integrative Model of Organizational Trust [J]. The Academyof Management Review, 1995, 20(3):709-734.
  7. Sun Y L, Yu W, Han Z, et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks[J]. Selected Areas in Communications, IEEE Journal on, 2006, 24(2): 305-317.
  8. Blaze M, Feigenbaum J, Lacy J. Decentralized trust management[C]//Security and Privacy, 1996. Proceedings., 1996 IEEE Symposium on. IEEE, 1996: 164-173.
  9. Kaelbling L P, Littman M L, Moore A W. Reinforcement learning: A sur\ey[J].arXiv preprint cs/789605103. 1996.
  10. Yi Tieguo, Tian Liqin, Hu Zhixing,Sun Jinxia. Trusted network a user behavior assessment based on AHP method [J]. Computer engineering and application, 2007 lancet (19) : 123-126.
  11. Lv Shenjuan zhang yongsheng, LouYinghong, Zhang Yandong, Tian Ming. Credible technology research based on cloud theory [J]. Computer application technology, 2013, 30 (8) : 2523-2526.
  12. Liu Liang ,Zhou Dejian ,Xie Xiaolan etc. Service trust evaluation model based on cloud computing [J]. Journal of software Tribune, 2011, 10 (5) : 75-77.
  13. li feng-hua, Wang Wei, Ma Jian-feng,etc. The access control model based on behavior and its behavior management [J]. Journal of electronics, 2008, 3 (10) : 1881-1890.
Download


Paper Citation


in Harvard Style

HE P., QIU J., YI Y., CAI J. and DAI Z. (2015). Design of Trust Model based on Cloud Computing . In Proceedings of the Information Science and Management Engineering III - Volume 1: ISME, ISBN 978-989-758-163-2, pages 100-104. DOI: 10.5220/0006019801000104


in Bibtex Style

@conference{isme15,
author={Ping HE and Jing QIU and Yan YI and Jianchun CAI and Zucheng DAI},
title={Design of Trust Model based on Cloud Computing},
booktitle={Proceedings of the Information Science and Management Engineering III - Volume 1: ISME,},
year={2015},
pages={100-104},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006019801000104},
isbn={978-989-758-163-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Information Science and Management Engineering III - Volume 1: ISME,
TI - Design of Trust Model based on Cloud Computing
SN - 978-989-758-163-2
AU - HE P.
AU - QIU J.
AU - YI Y.
AU - CAI J.
AU - DAI Z.
PY - 2015
SP - 100
EP - 104
DO - 10.5220/0006019801000104