A method for trust management in cloud computing: Data coloring by cloud watermarking

被引:27
作者
Liu Y.-C. [1 ,2 ]
Ma Y.-T. [2 ,3 ]
Zhang H.-S. [4 ]
Li D.-Y. [1 ]
Chen G.-S. [2 ]
机构
[1] Department of Computer Science and Technology, Tsinghua University
[2] Institute of Electronic System Engineering
[3] State Key Lab of Software Engineering, Wuhan University
[4] School of Command Automation, PLA University of Science and Technology
基金
中国博士后科学基金;
关键词
Cloud computing; cloud security; cloud watermarking; data coloring; trust management;
D O I
10.1007/s11633-011-0583-3
中图分类号
学科分类号
摘要
With the development of Internet technology and human computing, the computing environment has changed dramatically over the last three decades. Cloud computing emerges as a paradigm of Internet computing in which dynamical, scalable and often virtualized resources are provided as services. With virtualization technology, cloud computing offers diverse services (such as virtual computing, virtual storage, virtual bandwidth, etc.) for the public by means of multi-tenancy mode. Although users are enjoying the capabilities of super-computing and mass storage supplied by cloud computing, cloud security still remains as a hot spot problem, which is in essence the trust management between data owners and storage service providers. In this paper, we propose a data coloring method based on cloud watermarking to recognize and ensure mutual reputations. The experimental results show that the robustness of reverse cloud generator can guarantee users' embedded social reputation identifications. Hence, our work provides a reference solution to the critical problem of cloud security. © 2011 Institute of Automation, Chinese Academy of Sciences and Springer-Verlag Berlin Heidelberg.
引用
收藏
页码:280 / 285
页数:5
相关论文
共 50 条
[31]   Trust Ticket Deployment: A Notion of a Data Owner's Trust in Cloud Computing [J].
Ahmed, Mahbub ;
Xiang, Yang .
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, :111-117
[32]   A new method for evaluating cloud computing user behavior trust [J].
Hosseini, Seyedeh Bahare ;
Shojaee, Aida ;
Agheli, Nafiseh .
2015 7TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), 2015,
[33]   Community trust driven service selection method for cloud computing [J].
Wang, Yan ;
Zhou, Jiantao .
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2015, 43 (05) :11-16
[34]   Trust as a Service: A Framework for Trust Management in Cloud Environments [J].
Noor, Talal H. ;
Sheng, Quan Z. .
WEB INFORMATION SYSTEMS ENGINEERING - WISE 2011, 2011, 6997 :314-321
[35]   Taxonomy for Trust Models in Cloud Computing [J].
Kanwal, Ayesha ;
Masood, Rahat ;
Shibli, Muhammad Awais ;
Mumtaz, Rafia .
COMPUTER JOURNAL, 2015, 58 (04) :601-626
[36]   A Trust Model for Cloud Computing environment [J].
Branco, Teofilo Teixeira ;
Santos, Henrique .
PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON CLOUD SECURITY AND MANAGEMENT (ICCSM-2015), 2015, :1-15
[37]   A trust evaluation model for cloud computing [J].
Wu, Xiaonian ;
Zhang, Runlian ;
Zeng, Bing ;
Zhou, Shengyuan .
FIRST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT, 2013, 17 :1170-1177
[38]   A Trust Evaluation Model for Cloud Computing [J].
Kim, Hyukho ;
Lee, Hana ;
Kim, Woongsup ;
Kim, Yangwoo .
GRID AND DISTRIBUTED COMPUTING, 2009, 63 :184-192
[39]   CCTM - Cloud Computing Trust Model [J].
Kaja, Nevrus ;
Shaout, Adnan .
2018 19TH INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2018, :109-114
[40]   Trust Model Engines in cloud computing [J].
Farcasescu, Marcela Roxana .
14TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2012), 2012, :465-470