A trust management framework for clouds

Abstract In today’s cloud computing platforms, more and more users are now working or collaborating in the multi-cloud environment, in which collaborators, clouds, computing nodes may belong to different institutions or organizations. Those different organizations might have their policies. Security is still a big concern in cloud computing. To help cloud vendors and customers to detect and prevent from being affected by potential attacks, we propose a trust management framework. We consider link/flow’s level trust, node’s level trust, and task/mission’s level trust. We introduced a new security metric trustability (trust–reliability) and a new algorithm to calculate it. Trustability measures how much a system can be trusted under a specific attack vector. Trustability can be used to explore the design space of resource configuration in order be able to choose the right trade-off between trustability and cost of redundancy. We show that our trust management framework can guide the administrators and customers to make decisions. For example, based on the real-time trust information, cloud administrators can migrate tasks from suspect nodes to trustworthy nodes, dynamically allocate a resource, and manage the trade-off between the degree of redundancy and the cost of the resource.

[1]  Ronald L. Krutz,et al.  Cloud Security: A Comprehensive Guide to Secure Cloud Computing , 2010 .

[2]  Gunasekaran Manogaran,et al.  Centralized Fog Computing Security Platform for IoT and Cloud in Healthcare System , 2018 .

[3]  Minqiang Li,et al.  An information systems security risk assessment model under uncertain environment , 2011, Appl. Soft Comput..

[4]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[5]  Arjan Durresi,et al.  Using Twitter trust network for stock market analysis , 2018, Knowl. Based Syst..

[6]  Antonio Pescapè,et al.  Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..

[7]  Douglas C. Montgomery,et al.  Applied Statistics and Probability for Engineers, Third edition , 1994 .

[8]  Elisa Bertino,et al.  Interdependent Security Risk Analysis of Hosts and Flows , 2015, IEEE Transactions on Information Forensics and Security.

[9]  Muhammad Naeem Ahmed Khan,et al.  A Review of Trust Aspects in Cloud Computing Security , 2013, CloudCom 2013.

[10]  Gail-Joon Ahn,et al.  Detecting and Resolving Firewall Policy Anomalies , 2012, IEEE Transactions on Dependable and Secure Computing.

[11]  Arjan Durresi,et al.  A Trust Management Framework for Cloud Computing Platforms , 2017, 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA).

[12]  Wei-Yang Lin,et al.  Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..

[13]  Martin Gilje Jaatun,et al.  Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..

[14]  Ali Feizollah,et al.  Evaluation of machine learning classifiers for mobile malware detection , 2014, Soft Computing.

[15]  Victor R. Prybutok,et al.  Sharing and storage behavior via cloud computing: Security and privacy in research and practice , 2018, Comput. Hum. Behav..

[16]  Young-Sik Jeong,et al.  A survey on cloud computing security: Issues, threats, and solutions , 2016, J. Netw. Comput. Appl..

[17]  Paul Resnick,et al.  Reputation systems , 2000, CACM.

[18]  Athanasios V. Vasilakos,et al.  Flexible Data Access Control Based on Trust and Reputation in Cloud Computing , 2017, IEEE Transactions on Cloud Computing.

[19]  Arjan Durresi,et al.  Exploring Trust Propagation Behaviors in Online Communities , 2014, 2014 17th International Conference on Network-Based Information Systems.

[20]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[21]  Arjan Durresi,et al.  Trust Management Framework for Internet of Things , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).

[22]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..

[23]  Munindar P. Singh,et al.  Formal Trust Model for Multiagent Systems , 2007, IJCAI.

[24]  M. Anwar Hasan,et al.  Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems , 2013, IEEE Transactions on Parallel and Distributed Systems.

[25]  James A. Thom,et al.  Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.

[26]  Khaled M. Khan,et al.  Establishing Trust in Cloud Computing , 2010, IT Professional.

[27]  Radu State,et al.  RiskRank: Security risk ranking for IP flow records , 2010, 2010 International Conference on Network and Service Management.

[28]  Jianfeng Ma,et al.  On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services , 2018, IEEE Systems Journal.

[29]  Arjan Durresi,et al.  A survey of trust management systems for online social communities - Trust modeling, trust inference and attacks , 2016, Knowl. Based Syst..

[30]  Arjan Durresi,et al.  Measurement Theory-Based Trust Management Framework for Online Social Communities , 2017, ACM Trans. Internet Techn..

[31]  Sui Song,et al.  Flow-based Statistical Aggregation Schemes for Network Anomaly Detection , 2006, 2006 IEEE International Conference on Networking, Sensing and Control.

[32]  Siani Pearson,et al.  Privacy, Security and Trust in Cloud Computing , 2013 .

[33]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..