{"title":"云计算中的信任建模","authors":"Mary-Jane Sule, Maozhen Li, G. Taylor","doi":"10.1109/SOSE.2016.32","DOIUrl":null,"url":null,"abstract":"Though, cloud computing continues to gain popularity and has enormous economic gains, the perceived lack of trust from end-users accessing these resources continues to hinder its full deployment, usage and adoption. Tradition security and privacy controls continue to be implemented on cloud but due to its fluid and dynamic nature, research work in the area of end-user attestable trust evaluation of the cloud platform seem to be limited. With the nature of cloud, service level agreements are not enough, the user would want a transparent system with a traceability facility that allows the user to determine the relationship between varying trust relationships across the cloud layers, components, algorithms and applications especially at large scale. This paper presents some security mechanisms that enable cloud service end users to evaluate the trust level of various cloud services and resources. These mechanisms are evaluated based on fuzzy theory on a Eucalyptus cloud platform.","PeriodicalId":153118,"journal":{"name":"2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"Trust Modeling in Cloud Computing\",\"authors\":\"Mary-Jane Sule, Maozhen Li, G. Taylor\",\"doi\":\"10.1109/SOSE.2016.32\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Though, cloud computing continues to gain popularity and has enormous economic gains, the perceived lack of trust from end-users accessing these resources continues to hinder its full deployment, usage and adoption. Tradition security and privacy controls continue to be implemented on cloud but due to its fluid and dynamic nature, research work in the area of end-user attestable trust evaluation of the cloud platform seem to be limited. With the nature of cloud, service level agreements are not enough, the user would want a transparent system with a traceability facility that allows the user to determine the relationship between varying trust relationships across the cloud layers, components, algorithms and applications especially at large scale. This paper presents some security mechanisms that enable cloud service end users to evaluate the trust level of various cloud services and resources. These mechanisms are evaluated based on fuzzy theory on a Eucalyptus cloud platform.\",\"PeriodicalId\":153118,\"journal\":{\"name\":\"2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SOSE.2016.32\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE Symposium on Service-Oriented System Engineering (SOSE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SOSE.2016.32","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Though, cloud computing continues to gain popularity and has enormous economic gains, the perceived lack of trust from end-users accessing these resources continues to hinder its full deployment, usage and adoption. Tradition security and privacy controls continue to be implemented on cloud but due to its fluid and dynamic nature, research work in the area of end-user attestable trust evaluation of the cloud platform seem to be limited. With the nature of cloud, service level agreements are not enough, the user would want a transparent system with a traceability facility that allows the user to determine the relationship between varying trust relationships across the cloud layers, components, algorithms and applications especially at large scale. This paper presents some security mechanisms that enable cloud service end users to evaluate the trust level of various cloud services and resources. These mechanisms are evaluated based on fuzzy theory on a Eucalyptus cloud platform.