A Cloud Security Framework Based on Trust Model and Mobile Agent

01/22/2020
by   Saddek Benabied, et al.
0

Cloud computing as a potential paradigm offers tremendous advantages to enterprises. With the cloud computing, the market's entrance time is reduced, computing capabilities is augmented and computing power is really limitless. Usually, to use the full power of cloud computing, cloud users has to rely on external cloud service provider for managing their data. Nevertheless, the management of data and services are probably not fully trustworthy. Hence, data owners are uncomfortable to place their sensitive data outside their own system .i.e., in the cloud. Bringing transparency, trustworthiness and security in the cloud model, in order to fulfill client's requirements are still ongoing. To achieve this goal, our paper introduces two levels security framework: Cloud Service Provider (CSP) and Cloud Service User (CSU). Each level is responsible for a particular task of the security. The CSU level includes a proxy agent and a trust agent, dealing with the first verification. Then a second verification is performed at the CSP level. The framework incorporates a trust model to monitor users' behaviors. The use of mobile agents will exploit their intrinsic features such as mobility, deliberate localization and secure communication channel provision. This model aims to protect user's sensitive information from other internal or external users and hackers. Moreover, it can detect policy breaches, where the users are notified in order to take necessary actions when malicious access or malicious activity would occur.

READ FULL TEXT
research
11/21/2019

Development of trust based access control models using fuzzy logic in cloud computing

Cloud computing is the technology that provides different types of servi...
research
03/04/2022

Network Services Anomalies in NFV: Survey, Taxonomy, and Verification Methods

Network Function Virtualization (NFV) has emerged as a disruptive networ...
research
10/23/2017

A JSON Token-Based Authentication and Access Management Schema for Cloud SaaS Applications

Cloud computing is significantly reshaping the computing industry built ...
research
01/05/2022

Handling Trust in A Cloud Based Multi Agent System

Cloud computing is an opened and distributed network that guarantees acc...
research
12/11/2022

OSC-MC: Online Secure Communication Model for Cloud Environment

A malicious cloud user may exploit outsourced data involved in online co...
research
08/08/2018

It Takes Two to #MeToo - Using Enclaves to Build Autonomous Trusted Systems

We provide enhanced security against insider attacks in services that ma...
research
02/17/2021

Efficient and Secure Mobile Cloud Networking

Mobile cloud computing is a very strong candidate for the title "Next Ge...

Please sign up or login with your details

Forgot password? Click here to reset