Trust based service selection in cloud computing environment

被引:0
作者
Li X. [1 ]
Liang H. [2 ]
Zhang X. [1 ]
机构
[1] College of Electrical and Information Engineer, Liaoning University of Technology, Jinzhou, Liaoning
[2] Jinzhou 65631 Force, Jinzhou, Liaoning
来源
International Journal of Smart Home | 2016年 / 10卷 / 11期
关键词
AHP; Cloud computing; Service selection; Trust;
D O I
10.14257/ijsh.2016.10.11.04
中图分类号
学科分类号
摘要
In order to meet cloud user demand for managed service, we propose a scheme based on trust for cloud service selection. The scheme includes the service chosen and services delivered two parts, which can choose the cloud service through its trust value, to meet the safety requirements premise, and make trust decisions to achieve service controllability. First it make choice of the service in accordance with service attributes weight using AHP, then complete user data delivery rely on trust, which allowing users to combine with their own situation and trust in cloud services dynamically adjusting the cloud user data release granularity to reach the controllability of the service. Instance results show that the scheme is effective and can guarantee service selection under safe and controlled conditions. © 2016 SERSC.
引用
收藏
页码:39 / 50
页数:11
相关论文
共 14 条
  • [1] Liu Q., Wang G., Wu J., An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing, Proceedings of the 2009 International Conference on Computational Science and Engineering, pp. 715-720, (2009)
  • [2] Huang D., Zhang X., Kang M., Luo J., Mobicloud: Building secure cloud framework for mobile computing and communication, Proceedings of 5th IEEE International Symposium on Service-Oriented System Engineering, (2010)
  • [3] Wei H., Xiaolin G., Cloud environment supports encryption schemes to calculate the privacy, Computer Journal, 34, pp. 2391-2402, (2011)
  • [4] Wu E., Madden S., Zhang Y., Jones E., Curino C., Relational Cloud: The Case for a Database Service, (2010)
  • [5] Muntes-Mulero V., Nin J., Privacy and anonymization for very large datasets, Proceedings of the 18th ACM conference on Information and knowledge management, pp. 2117-2118, (2009)
  • [6] Deng F., Min Z., Yan Z., Zhen X., Cloud computing security research Software, (2011)
  • [7] Xiaochun Y., Yazhe W., Bin W., Ge I., Data released in the privacy of sensitive schemes for multi-attribute, The Computer Journal, 31, 4, pp. 574-587, (2008)
  • [8] Ciriam V., di Vimercati S.D.C., Foresti S., Jajodia S., Paraboschi S., Samarati P., Fragmentation and Encryption to Enforce Privacy in Data Storage, In ESORICS, 4734, pp. 171-186, (2007)
  • [9] Ciriani V., Di Vimercati S.C., Foresti S., Jajodia S., Paraboschi S., Samarati P., Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients, Proceedings of the 23rd Annual IFIP
  • [10] WG 11.3 Working Conference on Data and Applications Security XXIII, pp. 225-239, (2009)