SATVPC: Secure-agent-based trustworthy virtual private cloud model in open computing environments

Xiao-long Xu , Qun Tu , Nik Bessis , Geng Yang , Xin-heng Wang

Journal of Central South University ›› 2014, Vol. 21 ›› Issue (8) : 3186 -3196.

PDF
Journal of Central South University ›› 2014, Vol. 21 ›› Issue (8) : 3186 -3196. DOI: 10.1007/s11771-014-2290-z
Article

SATVPC: Secure-agent-based trustworthy virtual private cloud model in open computing environments

Author information +
History +
PDF

Abstract

Private clouds and public clouds are turning mutually into the open integrated cloud computing environment, which can aggregate and utilize WAN and LAN networks computing, storage, information and other hardware and software resources sufficiently, but also bring a series of security, reliability and credibility problems. To solve these problems, a novel secure-agent-based trustworthy virtual private cloud model named SATVPC was proposed for the integrated and open cloud computing environment. Through the introduction of secure-agent technology, SATVPC provides an independent, safe and trustworthy computing virtual private platform for multi-tenant systems. In order to meet the needs of the credibility of SATVPC and mandate the trust relationship between each task execution agent and task executor node suitable for their security policies, a new dynamic composite credibility evaluation mechanism was presented, including the credit index computing algorithm and the credibility differentiation strategy. The experimental system shows that SATVPC and the credibility evaluation mechanism can ensure the security of open computing environments with feasibility. Experimental results and performance analysis also show that the credit indexes computing algorithm can evaluate the credibilities of task execution agents and task executor nodes quantitatively, correctly and operationally.

Keywords

cloud computing / trustworthy computing / virtualization / agent

Cite this article

Download citation ▾
Xiao-long Xu, Qun Tu, Nik Bessis, Geng Yang, Xin-heng Wang. SATVPC: Secure-agent-based trustworthy virtual private cloud model in open computing environments. Journal of Central South University, 2014, 21(8): 3186-3196 DOI:10.1007/s11771-014-2290-z

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

LuX-c, WangH-m, WangJ, XuJ, LiD-sheng. Internet-based virtual computing environment: Beyond the data center as a computer [J]. Future Generation Computer Systems, 2011, 29(1): 309-322

[2]

GoscinskiA, BrockM. Toward dynamic and attribute based publication, discovery and selection for cloud computing [J]. Future Generation Computer Systems, 2010, 26(7): 947-970

[3]

ChenK, ZhengW-min. Cloud computing: System instances and current research [J]. Journal of Software, 2009, 20(5): 1337-1348

[4]

SailarR, JaegerT, ValdezE, CaceresR, PerezR, BergerS, GriffinJ L, DoornL V. Building a MAC-based security architecture for the Xen open source Hypervisor [C]. Proceedings of the Annual Computer Security Applications Conference (ACSAC’ 05). IEEE Computer Society Washington, DC, USA: ACSAC, 2005276-285

[5]

GriffinJ L, JaegerT, PerezR, SailarR, DoornL V, CaceresR. Trusted virtual domains: toward secure distributed services [C]. Proceedings of the First Conference on Hot Topics in System Dependability (HotDep’05). USENIX Association Berkeley, 2005, CA, USA, USENIX Association Berkeley: 4-9

[6]

SailerR, ZhangX, JaegerT, DoornL V. Design and implementation of a TCG-based integrity measurement architecture [C]. Proceedings of the 13th Conference on USENIX Security Symposium(SSYM’04). USENIX Association Berkeley, CA, USA: USENIX Association Berkeley, 2004223-238

[7]

GarfinkelT, PfaffB, ChowJ, RosenblumM, BonehD. Terra: A virtual machine-based platform for trusted computing [C]. Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP2003), 2003193-206

[8]

JiangX-x, WangX-yuan. Out-of-the-box monitoring of VM-based high-interaction honeypots [C]. Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID’07), 2007, Queensland, Australia, RAID: 198-218

[9]

HuangJ W, NicolD. A Formal-semantics-based calculus of trust [J]. IEEE Internet Computing, 2010, 14(5): 38-46

[10]

WangY, LiLei. Two-dimensional trust rating aggregations in service-oriented applications [J]. IEEE Transactions on Services Computing, 2011, 4(4): 257-271

[11]

LiL, WangYan. The study of trust vector based trust rating aggregation in service-oriented environments [J]. World Wide Web Journal: Internet and Web Information System, 2012, 15(5/6): 547-579

[12]

MengS-c, LiuL, WangTing. State monitoring in cloud datacenters [J]. IEEE Transactions on Knowledge and Data Engineering, 2011, 23(9): 1328-1344

[13]

XuK, WangF, WangH-yan. Lightweight and informative traffic metrics for data center monitoring [J]. Journal of Network and Management, 2012, 20(2): 226-243

[14]

MiH-b, WangH-m, ZhouY-f, LyuM, CaiHua. Towards fine-grained, unsupervised, scalable performance diagnosis for production cloud computing systems [J]. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(6): 1245-1255

[15]

SebeF, Domingo-ferrerJ, Martinez-ballesteA, DeswarteY, QuisquaterJ J. Efficient remote data possession checking in critical information infrastructures [J]. IEEE Transactions on Knowledge and Data Engineering, 2008, 20(8): 1034-1038

[16]

HaoZ, ZhongS, YuN-hai. A privacy-preserving remote data integrity checking protocol with data dynamics and public verifiability [J]. IEEE Transactions on Knowledge and Data Engineering, 2011, 23(9): 1432-1437

AI Summary AI Mindmap
PDF

109

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/