Access control of cloud users credible behavior based on IPv6

Cloud computing security issues become increasingly serious. Trust is a trust relationship entity acts in accordance with its past experience and interactions built up, may be direct or indirect interaction through a third party recommended interactions. User behavior trust evaluation using AHP, access to users by collecting historical behavior information behavior trust evidence, according to the characteristics of trust evidence will be divided into different trust property among the recalculation by users through analytic hierarchy process and the relative weight of each trust property behavior trust value. Combined with IPv6 protocol, the use of IPv6 extension headers, will assess the value placed header, transmission and validation, so that the program is practical.

[1]  Yang Li,et al.  Fog-Based Evaluation Approach for Trustworthy Communication in Sensor-Cloud System , 2017, IEEE Communications Letters.

[2]  Shanshan Song,et al.  Fuzzy Trust Integration for Security Enforcement in Grid Computing , 2004, NPC.

[3]  Xiaohua Tian,et al.  AMCloud: Toward a Secure Autonomic Mobile Ad Hoc Cloud Computing System , 2017, IEEE Wireless Communications.

[4]  Roger Smith,et al.  Computing in the Cloud , 2009 .

[5]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[6]  Prashant Pandey,et al.  Cloud computing , 2010, ICWET.

[7]  Xiaolei Dong,et al.  Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.

[8]  Liang Xiao,et al.  Cloud-Based Malware Detection Game for Mobile Devices with Offloading , 2017, IEEE Transactions on Mobile Computing.

[9]  Tarunpreet Bhatia,et al.  Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues , 2017, The Journal of Supercomputing.

[10]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[11]  Robert H. Deng,et al.  Cryptography and Data Security in Cloud Computing , 2017, Inf. Sci..

[12]  Nan Jiang,et al.  Quantum Point Cloud and its Compression , 2017 .

[13]  Jérôme Darmont,et al.  Secret sharing for cloud data security: a survey , 2017, The VLDB Journal.

[14]  Young-Koo Lee,et al.  A trust model for ubiquitous systems based on vectors of trust values , 2005, Seventh IEEE International Symposium on Multimedia (ISM'05).

[15]  Cheong Youn,et al.  Mobile Payment Based on Transaction Certificate Using Cloud Self‐Proxy Server , 2017 .

[16]  Jungwoo Ryoo,et al.  A security evaluation framework for cloud security auditing , 2017, The Journal of Supercomputing.

[17]  Audun Jøsang,et al.  The right type of trust for distributed systems , 1996, NSPW '96.

[18]  Tao Zhang,et al.  Fog Computing for Smart Living , 2017, Computer.