论文标题

基于信任模型和移动代理的云安全框架

A Cloud Security Framework Based on Trust Model and Mobile Agent

论文作者

Benabied, Saddek, Zitouni, Abdelhafid, Djoudi, Mahieddine

论文摘要

作为潜在范式的云计算为企业带来了巨大的优势。通过云计算,市场的入口时间减少了,计算功能得到了增强,计算能力确实是无限的。通常,要使用云计算的全部功能,云用户必须依靠外部云服务提供商来管理其数据。但是,数据和服务的管理可能并不完全值得信赖。因此,数据所有者不舒服将其敏感数据放在自己的系统之外。为了满足客户的要求,在云模型中带来透明度,可信赖性和安全性。为了实现此目标,我们的论文介绍了两个级别的安全框架:云服务提供商(CSP)和云服务用户(CSU)。每个级别负责安全的特定任务。 CSU级别包括代理代理和信托代理,并处理第一个验证。然后在CSP级别进行第二个验证。该框架结合了一个信任模型来监视用户的行为。移动代理的使用将利用其内在功能,例如移动性,故意本地化和安全通信渠道提供。该模型旨在保护用户的敏感信息免受其他内部或外部用户和黑客的侵害。此外,它可以检测策略违规,在此期间,通知用户,以便在发生恶意访问或恶意活动时采取必要的措施。

Cloud computing as a potential paradigm offers tremendous advantages to enterprises. With the cloud computing, the market's entrance time is reduced, computing capabilities is augmented and computing power is really limitless. Usually, to use the full power of cloud computing, cloud users has to rely on external cloud service provider for managing their data. Nevertheless, the management of data and services are probably not fully trustworthy. Hence, data owners are uncomfortable to place their sensitive data outside their own system .i.e., in the cloud. Bringing transparency, trustworthiness and security in the cloud model, in order to fulfill client's requirements are still ongoing. To achieve this goal, our paper introduces two levels security framework: Cloud Service Provider (CSP) and Cloud Service User (CSU). Each level is responsible for a particular task of the security. The CSU level includes a proxy agent and a trust agent, dealing with the first verification. Then a second verification is performed at the CSP level. The framework incorporates a trust model to monitor users' behaviors. The use of mobile agents will exploit their intrinsic features such as mobility, deliberate localization and secure communication channel provision. This model aims to protect user's sensitive information from other internal or external users and hackers. Moreover, it can detect policy breaches, where the users are notified in order to take necessary actions when malicious access or malicious activity would occur.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源