Open Access Open Access  Restricted Access Subscription or Fee Access

An Effective Trust Based Access Control Services for Adaptive Monitoring in Cloud Computing

L.V Sowmya Therese

Abstract


Cloud computing has now become a high demanded service due to its high computing power, cheap cost of services, high performance, scalability, accessibility and availability. This paper provides a trust based access control mechanism for adaptive monitoring in cloud computing. Firstly a basic cloud monitoring system is developed and then trust is introduced into this system. Different methodologies are used in order to calculate trust in inter domain and intra domain. Since the aspects to be considered in these domains to calculate trust are different. This system involves three major participants they are the cloud user, the cloud service provider (CSP) and the trusted third party (TTP). Where the CSP provides users the cloud resources, the cloud user are the customers who hire and use the resources and the TTP is the monitoring service which act as an intermediate between the CSP and the cloud user. Since it is an adaptive system the cloud user can specify what all resources has to be monitored by the cloud monitoring system.  

Keywords


Cloud Monitoring; Access Control Services; Trust; Multi-Domain

Full Text:

PDF

References


Apu Kapadia, Jalal Al-Muhtadi, R. Campbell, et al. “IRBAC 2000: secure interoperability using dynamic role translation,” University of Illinois, Technical Report: UI-UCDCS-R-2000-2162, 2000.

Beth T., Borcherding M., Klein B. “Valuation of trust in open networks,” Proceedings of the Third European Symposium on Research in Computer Security, Brighton: Springer-Verlag, pp. 3-18, 1994.

Bo Lang, “Access control oriented quantified trust degree representation model for distributed systems,” Journal on Communications, Dec. 2010.

Chen Jincui, Jiang Liqun, “Role-based access controlmodel of cloud computing,” Energy Procedia 13, pp. 1056-1061, 2011.

Dengguo Feng, Min Zhang, Yan Zhang, “Study on cloud computing security,” Chinese Journal of Software, vol. 22, no. 1, pp. 71-83, 2011.

Dongyan Jia, Fuzhi Zhang, Sai Liu, “A robust collaborative filtering recommendation algorithm based on multidimensional trust model,” Journal of Software, vol. 8, no. 1, pp. 11-18, Jan. 2013.

Jiyi Wu, Qianli Shen, Tong Wang, “Recent advances in cloud security,” Journal of Computers, vol. 6, no. 10, 2011.

Junchang Song, Cheng Su, “Using trust in access control mechanism,” Computer Engineering and Design, Oct. 2007.

Junzhou Luo, Xudong Ni, Jianming Yong, “A trust degree based access control in grid environments,” Information Sciences, pp. 2618–2628, 2009.

Jφsang A. “A logic for uncertain probabilities,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 9, no. 3, pp. 279-311, 2001.

Liangmin Guo, Yonglong Luo, Zhengzhen Zhou, Meijing Ji, “A recommendation trust method based on fuzzy clustering in P2P networks,” Journal of Software, vol. 8, no. 2, pp. 357-360, Feb. 2013.

Sadeghi AR, Schneider T, Winandy M. “Token-based cloud computing: secure outsourcing of data and arbitrary computations with lower latency,” In: Proc. Of the 3rd Int’1 Conf. on Trust and Trustworthy Computing. Berlin: Springer-Verlag, pp. 417-429, 2010.

Santos N, Gummadi KP, Rodrigues R. “Towards trusted cloud computing,”In: Sahu S, ed, USENIX Association Proc. of the Workshop on Hot Topics in Cloud Computing 2009. San Diego, 2009.

T. Grandison, M. Sloman, “A survey of trust in Internet applications,” IEEE Communications Surveys and Tutorials, 2000.

Weiliang Zhao, Varadharajan V, Bryan G. “General methodology for analysis and modeling of trust relationships in distributed computing. Journal of Computers, vol. 1, no. 2, pp. 42-53, 2006.

Wenhui Wang, Jing Han, Meina Song, Xiaohui Wang, “The design of a trust and role based access control model in cloud computing,” Information Technology and Artificial Intelligence Conference (ITAIC), 2011 6th IEEE Joint International.

Xuri Chen, Weimin Xu, Wenfeng Shen, “Trustworthiness-based dynamic access control for grid application,” Journal of Hunan University (Natural Sciences), vol. 35, no. 7, pp. 85-89, Jul. 2008.

Zhanjiang Tan, Zhuo Tang, Renfa Li, Ahmed Sallam, Liu Yang, “Research on trust-based access control model in cloud computing,” Proceedings of 6th ICPCA, 2011.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.