Font Size: a A A

The Trust Model Of Cloud Users Based On Chord Algorithm

Posted on:2014-08-13Degree:MasterType:Thesis
Country:ChinaCandidate:F JiangFull Text:PDF
GTID:2268330425969071Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
As a business model, since the cloud computing was first proposed, has receivedextensive attention from all walks of life. Based on Forrester forecasts, a well-known analysisorganization, the valuation of the market in cloud computing will reach to241billion dollarsin2020, which is much higher than the40billion dollars current market value of cloudcomputing. Nowadays, the concept of cloud services has become increasingly clear, Google,IBM, Amazon, Microsoft and other IT giants will be focused on cloud computing, andsequential launched their own cloud services development project. Cloud computing not onlyreduces the IT costs and thresholds for users, but also provides them with a solution to dealwith large amounts of data. However, the promotion of cloud computing face abottleneck-security in the cloud in spite of the advantages brought by cloud computing. Dueto the service model of cloud computing, cloud service providers and cloud users will losecontrol of piece of information, the core to solve the problem of cloud computing security isto solve the problem of trusted cloud.Cloud services providers place the services in the cloud, although there areauthentication and the digital signature or other control measures, that could prevent illegalaccessing of some cloud users and the information theft and tampering, but it could not reflectthe true degree of trust to verify the authentication of cloud user, and the excessiveverification standard will reduce the usage of cloud services, influence the extension of cloudcomputing, so it is still an unresolved problem whether cloud users can obtain the trust ofcloud services providers.This article outlines the concept of cloud computing and features, and the security issueof current environment, analyzes the trust evaluation of cloud users, also introduces the basicconcept and principle of Chord algorithm, and on this basis, build a trust model for cloudusers based on Chord algorithm, provide solutions for trust evaluation of cloud users. Theconcrete contents include:1) This paper describes some relevant concepts, cover cloud computing, Chord algorithmand trust, direct trust, indirect trust, etc, and study related representation and application oftrust in cloud computing condition, introduce a definition of rust-rating and service level forcloud users;2) Propose a method of delimiting the trust degree of users by providers based on users’behaviors, service cost and service time, indirect trust of decay factor and neutral initial trust.The evaluation of degree of the trust can be more accurate. Develop a trust model for cloudusers based on Chord algorithm, in order to evaluate cloud users, and cloud services couldproviders provide corresponding service based on the degree of the trust-rating;3) An emulate environment and a simulation system are established, and the simulationswere carried out for the trust model for cloud users based on Chord algorithm, this paper alsoanalyses the results of the experiment, and assess the availability of this trust model;What is novel about the trust model based on Chord algorithm is that a shortercomputing time and a higher computational accuracy of evaluation of degree of the trust, and it does not alter the speed of computing while join a series of weighting factor. Instead, andsince the Chord ring was established, it makes the query faster and more convenient.Compared to our existing trust model for cloud users, the trust model for cloud usersbased on Chord algorithm, who realize the storage and query of trusted information by Chordalgorithm, could speed up evaluation speed, save the resources of the network and shortensthe time to identify the degree of the trust-rating, it provides an efficient solution to the trustproblem of Chord algorithm.
Keywords/Search Tags:Cloud Computing, Chord Algorithm, Trust Value, Trust Model
PDF Full Text Request
Related items