SATVPC: Secure-agent-based trustworthy virtual private cloud model in open computing environments

被引:1
作者
Xu Xiao-long [1 ,2 ]
Tu Qun [1 ]
Bessis, Nik [3 ]
Yang Geng [4 ]
Wang Xin-heng [5 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing 210003, Jiangsu, Peoples R China
[2] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210046, Jiangsu, Peoples R China
[3] Univ Derby, Sch Comp & Math, Derby DE22 1GB, England
[4] Nanjing Univ Posts & Telecommun, Jiangsu High Technol Res Key Lab WSNs, Nanjing 210003, Jiangsu, Peoples R China
[5] Univ West Scotland, Sch Comp, Paisley PA1 2BE, Renfrew, Scotland
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
cloud computing; trustworthy computing; virtualization; agent;
D O I
10.1007/s11771-014-2290-z
中图分类号
TF [冶金工业];
学科分类号
0806 ;
摘要
Private clouds and public clouds are turning mutually into the open integrated cloud computing environment, which can aggregate and utilize WAN and LAN networks computing, storage, information and other hardware and software resources sufficiently, but also bring a series of security, reliability and credibility problems. To solve these problems, a novel secure-agent-based trustworthy virtual private cloud model named SATVPC was proposed for the integrated and open cloud computing environment. Through the introduction of secure-agent technology, SATVPC provides an independent, safe and trustworthy computing virtual private platform for multi-tenant systems. In order to meet the needs of the credibility of SATVPC and mandate the trust relationship between each task execution agent and task executor node suitable for their security policies, a new dynamic composite credibility evaluation mechanism was presented, including the credit index computing algorithm and the credibility differentiation strategy. The experimental system shows that SATVPC and the credibility evaluation mechanism can ensure the security of open computing environments with feasibility. Experimental results and performance analysis also show that the credit indexes computing algorithm can evaluate the credibilities of task execution agents and task executor nodes quantitatively, correctly and operationally.
引用
收藏
页码:3186 / 3196
页数:11
相关论文
共 16 条
[1]  
[Anonymous], FUTURE GENERATION CO
[2]  
Chen Rang, 2009, Journal of Software, V20, P1337, DOI 10.3724/SP.J.1001.2009.03493
[3]  
Garfinkel T., 2003, Operating Systems Review, V37, P193, DOI 10.1145/1165389.945464
[4]   Toward dynamic and attribute based publication, discovery and selection for cloud computing [J].
Goscinski, Andrzej ;
Brock, Michael .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2010, 26 (07) :947-970
[5]  
Griffin JL, 2005, P 1 C HOT TOP SYST D, P4
[6]   A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability [J].
Hao, Zhuo ;
Zhong, Sheng ;
Yu, Nenghai .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2011, 23 (09) :1432-1437
[7]   A Formal-Semantics-Based Calculus of Trust [J].
Huang, Jingwei ;
Nicol, David M. .
IEEE INTERNET COMPUTING, 2010, 14 (05) :38-46
[8]  
Jiang XX, 2007, LECT NOTES COMPUT SC, V4637, P198
[9]   The study of trust vector based trust rating aggregation in service-oriented environments [J].
Li, Lei ;
Wang, Yan .
WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2012, 15 (5-6) :547-579
[10]   State Monitoring in Cloud Datacenters [J].
Meng, Shicong ;
Liu, Ling ;
Wang, Ting .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2011, 23 (09) :1328-1344