CIVILICA We Respect the Science
(ناشر تخصصی کنفرانسهای کشور / شماره مجوز انتشارات از وزارت فرهنگ و ارشاد اسلامی: ۸۹۷۱)

Trust Management in Clouds: Agent Mining According to the History

عنوان مقاله: Trust Management in Clouds: Agent Mining According to the History
شناسه ملی مقاله: ITPF03_044
منتشر شده در سومین کنفرانس الکترونیکی بین المللی فن آوری اطلاعات،حال و آینده در سال 1393
مشخصات نویسندگان مقاله:

Hamzeh Mohammadnia - Department of Information Technology Mashhad Branch, Islamic Azad University Mashhad, Iran
Hassan Shakeri - Department of Information Technology Mashhad Branch, Islamic Azad University Mashhad, Iran

خلاصه مقاله:
Over the last few years, due to a plethora of reasons,cloud computing has witnessed a gigantic shift towards itsadoption and becoming a trend in the information technology.Cloud computing holds the great amount of potential to eliminatethe high-cost computing for every type of computation. Then, forindividuals who are interested with the networking environmentand shared resources, cloud is a preferable platform for theirusage. Furthermore, the plausibility of exploit is an undeniableevent of cloud computing. Since datacenters may be located in anypart of the world beyond the reach and control, the security andprivacy challenges are required to be addressed and understood.It is understood that current enterprise IT security solutions arenot adequate to address security issues, therefore, to expand thecoverage of security, we will focus in Infrastructure-as-a-Service(IaaS), which is the first level of cloud computing model, tounravel the underestimated points. Since in cloud services,request dispatching security is one of the major impact of anxiety,datacenters are required to offer the most accurate branch ofresources, regarding availabilities, for the appropriatecomputation.In this paper, we will propose our method of security for trustmanagement, and tune the connectivity of capital nodes in eachregion, as what has been presented in our previous work, we willextend our security restriction to reach more isolated area fordispatcher tasks’ distribution. The proposed model is generic innature, not dependent on the type of application or clouddeployment. We have also shown using experimental data howsecurity services could be provided bonded in region trust.

کلمات کلیدی:
cloud computing; security; IaaS; dispatcher; exploit

صفحه اختصاصی مقاله و دریافت فایل کامل: https://civilica.com/doc/342829/