Font Size: a A A

Research On Behavior Trust Model For Cloud Computing Environment

Posted on:2012-12-10Degree:MasterType:Thesis
Country:ChinaCandidate:E G FangFull Text:PDF
GTID:2248330395962379Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
As the computer software, hardware and communication technology continue to develop, a new "human-centered" computing model—cloud computing is being formed. In the cloud computing environment, it is universal access to get the cloud services with a variety of ways, which requires the cloud center to provide appropriate security mechanisms to protect the service interaction and service resources of safety. Trust mechanism as traditional security network services effective alternative solution has been effectively solved the Grid Computing. Pervasive Computing, Ad hoc and other distributed computing security issues. At present. how to build a trust model which is adaptable to cloud computing environment and proposes the corresponding methods and theory will be one of the hot and difficult spots in the academic research field of cloud computing security.During the research of the trust model for cloud computing, there has been an urgent need to address two problems:First, cloud computing continues to evolve and develop with technology and products of some large IT companies on cloud computing, but industrial sector, academia and IT have not formed a unified definition of cloud computing and there is now no trust mechanism in the cloud computing technologies and products to protect the safety of the process of cloud services, in this case, how to combine the current technology and concept of cloud computing to propose the corresponding cloud computing definition, architecture, and the introduction of the trust mechanism of cloud computing architecture. Second, there are a lot of uncertainty cloud users and cloud providers in the process of the cloud service, how to build a good trust model to describe the trust relationship between the cloud users and cloud providers, and ensure the security of cloud services.This paper focuses on the study of these two issues gradually, which includes:Firstly, for present there is no single concept of cloud computing, we present the definition of cloud computing by combining the definition of cloud computing of some scholars both at home and abroad and the trust model of cloud computing which is studied in this paper. On this basis and the analysis of key technologies of cloud computing, we propose a producer-manager-consumer model of cloud computing architecture. Then, we analyze and study the basic concepts of trust, focusing on the results of behavior-based trust relationship and trust models, and introduced the trust model into the Service Resources Manager Layer of cloud computing architecture.Secondly, in order to solve the dynamic, uncertain security trading services in the cloud computing environment, we study and design a behavior trust model based on the evidence theory. In this model, using the extended evidence theory introduced on the trust relationship between the time factor of expression, the trust is changed over time, enhance the validity of the model; To further address the dynamic nature of trust relationships, we propose a transaction confidence in the target entity feedback update method.In the aspect of trust update, the model proposes a classification before the trust evidence. and then depending on the target entity using the corresponding feedback on the evidence of the trust update to prevent false evidence to increase.but real evidence to loss.Finally,in the view of emulation.we take the trust model applying to the resource scheduling system on the platform of cloud CloudSim.In this process.CloudSim is expanded by introducing the factors of trust expression,trust update and trust decision into the CloudSim resource access control module.The experiments show that the resource scheduling system with trust model can effectively identify the user’s behavioral intention and protect the security of service interactions and resources.
Keywords/Search Tags:Cloud Computer, Cloud Security, Trust Model, Evidence Theory, CloudSim
PDF Full Text Request
Related items