Trust Management in Clouds: Agent Mining According to the History

Publish Year: 1393
نوع سند: مقاله کنفرانسی
زبان: English
View: 1,125

This Paper With 7 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

ITPF03_044

تاریخ نمایه سازی: 25 فروردین 1394

Abstract:

Over the last few years, due to a plethora of reasons,cloud computing has witnessed a gigantic shift towards itsadoption and becoming a trend in the information technology.Cloud computing holds the great amount of potential to eliminatethe high-cost computing for every type of computation. Then, forindividuals who are interested with the networking environmentand shared resources, cloud is a preferable platform for theirusage. Furthermore, the plausibility of exploit is an undeniableevent of cloud computing. Since datacenters may be located in anypart of the world beyond the reach and control, the security andprivacy challenges are required to be addressed and understood.It is understood that current enterprise IT security solutions arenot adequate to address security issues, therefore, to expand thecoverage of security, we will focus in Infrastructure-as-a-Service(IaaS), which is the first level of cloud computing model, tounravel the underestimated points. Since in cloud services,request dispatching security is one of the major impact of anxiety,datacenters are required to offer the most accurate branch ofresources, regarding availabilities, for the appropriatecomputation.In this paper, we will propose our method of security for trustmanagement, and tune the connectivity of capital nodes in eachregion, as what has been presented in our previous work, we willextend our security restriction to reach more isolated area fordispatcher tasks’ distribution. The proposed model is generic innature, not dependent on the type of application or clouddeployment. We have also shown using experimental data howsecurity services could be provided bonded in region trust.

Authors

Hamzeh Mohammadnia

Department of Information Technology Mashhad Branch, Islamic Azad University Mashhad, Iran

Hassan Shakeri

Department of Information Technology Mashhad Branch, Islamic Azad University Mashhad, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • G. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D, Katz, ...
  • Habib, S., Ries, S., and Mulhauser, M. 2011. Towards a ...
  • _ _ _ [24] _ _ [25] Prasad Saripalli, and ...
  • Peter Mell and Tim Grance, "The NIST Definition of Cloud ...
  • Weichao Wang., Zhiwei Li, :Secure and Efficient Access to Outsourced ...
  • _ _ _ _ [28] _ _ _ Computing. Berlin ...
  • نمایش کامل مراجع