DocumentCode :
3507817
Title :
Service Trustiness and Resource Legitimacy in Cloud Computing
Author :
Yoon, Jong P. ; Chen, Zhixiong
Author_Institution :
Dept of Math & Comput. Inf. Sci., Mercy Coll., Dobbs Ferry, NY, USA
fYear :
2010
fDate :
4-6 Nov. 2010
Firstpage :
250
Lastpage :
257
Abstract :
Cloud computing is emerging as a virtual model in support of “everything-as-a-service” (XaaS). Service providers in a cloud provide XasS of resources. There are numerous providers involved in a cloud such as feeders, owners, delegators and creators who are less likely the same agent. Consequently, without identifying the credential of their providers, cloud resources cannot be securely managed by traditional security models and services may be trustless. In this paper, we propose a new security technique to measure the trustiness of the cloud resources. Using the metadata of resources, the technique binds authorization policies to compute the trace ability between the resources and the provider´s credential. The contribution of this paper includes a mechanism of the privilege chains that can be used to verify the legitimacy of cloud resources and to measure the trustiness of cloud services.
Keywords :
cloud computing; security of data; cloud computing; cloud resource legitimacy; cloud service trustiness; everything-as-a-service; security technique; cloud computing; resource legitimacy; service trustiness;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2010 International Conference on
Conference_Location :
Fukuoka
Print_ISBN :
978-1-4244-8538-3
Electronic_ISBN :
978-0-7695-4237-9
Type :
conf
DOI :
10.1109/3PGCIC.2010.41
Filename :
5662781
Link To Document :
بازگشت