Research on the security model of cloud computing based on trust

Source: Internet
Author: User
Keywords Cloud computing access control

Research on the security model of cloud computing based on trust

Zhang Yandong of Shandong Normal University

Cloud security is always a cloud service provider cannot but face the soft rib, it and cloud computing development foreground is closely related. It can be said that, out of the security, cloud computing applications and promotion is not possible to talk about. Although the traditional security solution solves the security problem in cloud computing to some extent, it is absolutely not available to transplant this package to the cloud platform completely. New features such as the high level of virtualization of cloud computing, the complexity of deployment, and high scalability have prompted us to study the security mechanisms that apply to cloud computing. The trust problem is one of the biggest obstacles for cloud computing, and whether cloud users and cloud providers can trust each other. To address the above problems, this paper puts forward the corresponding solution, the main research contents are summarized as follows: 1. It analyzes the cloud computing platform and its characteristics, analyzes its development advantages, service forms, discusses the special security threats faced by cloud computing, analyzes the virtualization technology, trusted computing and Access control, and so on a series of core technologies. In addition, the definition, characteristics and calculation of trust are expounded in detail, the Trust value calculation method of classical trust model is analyzed, and the necessity of introducing trust mechanism into cloud environment is analyzed emphatically. 2. For the dynamic nature of the cloud computing environment, many tenants and high scalability features such as security risks, with the help of fuzzy logic, this paper puts forward a cloud computing evaluation model based on fuzzy Trust, uses fuzzy comprehensive evaluation method to compute the trust degree of Izumo service, and TBMEF the fuzzy control rules by cloud service providers. The fuzzy decision is given to the cloud users, and the time factor is introduced in the calculation of the trust degree, so that it can better meet the dynamic access control requirements in the cloud computing environment. By establishing two-way trust evaluation, the security of cloud computing platform is improved effectively. 3. With a huge deployment scale for cloud computing platforms and a wide range of service offerings, in practical applications, many services may belong to different autonomous domains, cloud users in many cases need to mobilize multiple resources to complete a task, this paper designed a single sign-on mode to simplify the user's operating experience, Switch between different autonomous domains, do not need to enter the authentication information multiple times, passively wait for the autonomous domain to return the authenticated message, and then apply for the required services.


Research on the security model of cloud computing based on trust

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.