A method for trust management in cloud computing: Data coloring by cloud watermarking

被引:27
作者
Liu Y.-C. [1 ,2 ]
Ma Y.-T. [2 ,3 ]
Zhang H.-S. [4 ]
Li D.-Y. [1 ]
Chen G.-S. [2 ]
机构
[1] Department of Computer Science and Technology, Tsinghua University
[2] Institute of Electronic System Engineering
[3] State Key Lab of Software Engineering, Wuhan University
[4] School of Command Automation, PLA University of Science and Technology
基金
中国博士后科学基金;
关键词
Cloud computing; cloud security; cloud watermarking; data coloring; trust management;
D O I
10.1007/s11633-011-0583-3
中图分类号
学科分类号
摘要
With the development of Internet technology and human computing, the computing environment has changed dramatically over the last three decades. Cloud computing emerges as a paradigm of Internet computing in which dynamical, scalable and often virtualized resources are provided as services. With virtualization technology, cloud computing offers diverse services (such as virtual computing, virtual storage, virtual bandwidth, etc.) for the public by means of multi-tenancy mode. Although users are enjoying the capabilities of super-computing and mass storage supplied by cloud computing, cloud security still remains as a hot spot problem, which is in essence the trust management between data owners and storage service providers. In this paper, we propose a data coloring method based on cloud watermarking to recognize and ensure mutual reputations. The experimental results show that the robustness of reverse cloud generator can guarantee users' embedded social reputation identifications. Hence, our work provides a reference solution to the critical problem of cloud security. © 2011 Institute of Automation, Chinese Academy of Sciences and Springer-Verlag Berlin Heidelberg.
引用
收藏
页码:280 / 285
页数:5
相关论文
共 50 条
[21]   Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source [J].
Habib, Sheikh Mahbub ;
Ries, Sebastian ;
Muehlhaeuser, Max ;
Varikkattu, Prabhu .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) :2185-2200
[22]   Literature Review of Trust Models for Cloud Computing [J].
Georgiopoulou, Zafeiroula ;
Lambrinoudakis, Costas .
2016 15TH INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED COMPUTING (ISPDC), 2016, :208-213
[23]   Establishing Trust in Hybrid Cloud Computing Environments [J].
Abawajy, Jemal .
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, :118-125
[24]   Trust management on user behavioral patterns for a mobile cloud computing [J].
Mucheol Kim ;
Sang Oh Park .
Cluster Computing, 2013, 16 :725-731
[25]   Trust management on user behavioral patterns for a mobile cloud computing [J].
Kim, Mucheol ;
Park, Sang Oh .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04) :725-731
[26]   Maternity Data Management Utilizing Cloud Computing [J].
San, Oh Ying ;
Husain, Wahidah .
2014 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCOINS), 2014,
[27]   Cloud Computing: The Future of Big Data Management [J].
Ouf, Shimaa ;
Nasr, Mona .
INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2015, 5 (02) :53-61
[28]   Encrypted Data Management with Deduplication in Cloud Computing [J].
Yan, Zheng ;
Wang, Mingjun ;
Li, Yuxiang ;
Vasilakos, Athanasios V. .
IEEE CLOUD COMPUTING, 2016, 3 (02) :28-35
[29]   "Big" Data Management in Cloud Computing Environment [J].
Agarwal, Mohit ;
Srivastava, Gur Mauj Saran .
HARMONY SEARCH AND NATURE INSPIRED OPTIMIZATION ALGORITHMS, 2019, 741 :707-716
[30]   Achieving Trust in Cloud Computing Using Secure Data Provenance [J].
Saad, Mohd Izuan Mohd ;
Jalil, Kamarularifin Abd ;
Manaf, Mazani .
2014 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS), 2014, :84-88