{"title":"基于角色的IaaS信任机制的研究与实现","authors":"Xu Wu, Xiaqing Xie, Chunwen Li","doi":"10.1109/CCIS.2012.6664419","DOIUrl":null,"url":null,"abstract":"Despite the advantages brought by cloud computing, security issues have emerged as one of the most significant barrier to faster and more widespread adoption of it. Therefore, this paper focused on the trustworthiness of infrastructure as a service (IaaS) and proposed a role-based trustworthiness mechanism to ensure that the different roles in IaaS architecture are trusted. What's more, this paper also considered the interactions between different roles in cloud environment and designed relevant validation protocols. Our experiments also show that this trustworthiness mechanism is practical in terms of performance.","PeriodicalId":392558,"journal":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Research and implementation of a role-based trustworthiness mechanism for IaaS\",\"authors\":\"Xu Wu, Xiaqing Xie, Chunwen Li\",\"doi\":\"10.1109/CCIS.2012.6664419\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Despite the advantages brought by cloud computing, security issues have emerged as one of the most significant barrier to faster and more widespread adoption of it. Therefore, this paper focused on the trustworthiness of infrastructure as a service (IaaS) and proposed a role-based trustworthiness mechanism to ensure that the different roles in IaaS architecture are trusted. What's more, this paper also considered the interactions between different roles in cloud environment and designed relevant validation protocols. Our experiments also show that this trustworthiness mechanism is practical in terms of performance.\",\"PeriodicalId\":392558,\"journal\":{\"name\":\"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCIS.2012.6664419\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCIS.2012.6664419","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Research and implementation of a role-based trustworthiness mechanism for IaaS
Despite the advantages brought by cloud computing, security issues have emerged as one of the most significant barrier to faster and more widespread adoption of it. Therefore, this paper focused on the trustworthiness of infrastructure as a service (IaaS) and proposed a role-based trustworthiness mechanism to ensure that the different roles in IaaS architecture are trusted. What's more, this paper also considered the interactions between different roles in cloud environment and designed relevant validation protocols. Our experiments also show that this trustworthiness mechanism is practical in terms of performance.