Cloud Trustworthiness Evaluation as a cloud service:architecture,key technologies and implementations
A "big clouds audited by a small cloud" scheme was proposed,by introducing an independent trusted third party (TTP) dealing with run-time data collection,verification,audit and evaluation remotely,in a continuous and data-driven model,compared with traditionally certification based audit.The TTP mai...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2016-10-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00102 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530326064562176 |
---|---|
author | Chuan-yi LIU He-zhong PAN Lu-lu LIANG Guo-feng WANG Bin-xing FANG |
author_facet | Chuan-yi LIU He-zhong PAN Lu-lu LIANG Guo-feng WANG Bin-xing FANG |
author_sort | Chuan-yi LIU |
collection | DOAJ |
description | A "big clouds audited by a small cloud" scheme was proposed,by introducing an independent trusted third party (TTP) dealing with run-time data collection,verification,audit and evaluation remotely,in a continuous and data-driven model,compared with traditionally certification based audit.The TTP mainly adopts data flow visualization,data monitoring and encryption to protect the rights of users.It provides the basis for users to choose a trusted cloud platform and for cloud platform to prove own trusted credentials.In-depth study,the following key technologies were broken through:1) the introduction of an independent trusted third party as an intermediate layer between cloud platform and users as well as administrators; 2) continuous,real-time remote data collection and data analysis; 3) strong non-intrusive evidence gathering. |
format | Article |
id | doaj-art-d54dcd1e2a3f41f8a240910e90d73a0d |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2016-10-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-d54dcd1e2a3f41f8a240910e90d73a0d2025-01-15T03:04:57ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2016-10-012364759548544Cloud Trustworthiness Evaluation as a cloud service:architecture,key technologies and implementationsChuan-yi LIUHe-zhong PANLu-lu LIANGGuo-feng WANGBin-xing FANGA "big clouds audited by a small cloud" scheme was proposed,by introducing an independent trusted third party (TTP) dealing with run-time data collection,verification,audit and evaluation remotely,in a continuous and data-driven model,compared with traditionally certification based audit.The TTP mainly adopts data flow visualization,data monitoring and encryption to protect the rights of users.It provides the basis for users to choose a trusted cloud platform and for cloud platform to prove own trusted credentials.In-depth study,the following key technologies were broken through:1) the introduction of an independent trusted third party as an intermediate layer between cloud platform and users as well as administrators; 2) continuous,real-time remote data collection and data analysis; 3) strong non-intrusive evidence gathering.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00102cloud computingtrusted reviewspermissions controldata encryption |
spellingShingle | Chuan-yi LIU He-zhong PAN Lu-lu LIANG Guo-feng WANG Bin-xing FANG Cloud Trustworthiness Evaluation as a cloud service:architecture,key technologies and implementations 网络与信息安全学报 cloud computing trusted reviews permissions control data encryption |
title | Cloud Trustworthiness Evaluation as a cloud service:architecture,key technologies and implementations |
title_full | Cloud Trustworthiness Evaluation as a cloud service:architecture,key technologies and implementations |
title_fullStr | Cloud Trustworthiness Evaluation as a cloud service:architecture,key technologies and implementations |
title_full_unstemmed | Cloud Trustworthiness Evaluation as a cloud service:architecture,key technologies and implementations |
title_short | Cloud Trustworthiness Evaluation as a cloud service:architecture,key technologies and implementations |
title_sort | cloud trustworthiness evaluation as a cloud service architecture key technologies and implementations |
topic | cloud computing trusted reviews permissions control data encryption |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00102 |
work_keys_str_mv | AT chuanyiliu cloudtrustworthinessevaluationasacloudservicearchitecturekeytechnologiesandimplementations AT hezhongpan cloudtrustworthinessevaluationasacloudservicearchitecturekeytechnologiesandimplementations AT lululiang cloudtrustworthinessevaluationasacloudservicearchitecturekeytechnologiesandimplementations AT guofengwang cloudtrustworthinessevaluationasacloudservicearchitecturekeytechnologiesandimplementations AT binxingfang cloudtrustworthinessevaluationasacloudservicearchitecturekeytechnologiesandimplementations |