scispace - formally typeset
Book ChapterDOI

Analysis of Key Technologies of Cloud Computing Security Based on Trust Model

Fangfang Dang, +3 more
- pp 404-412
Reads0
Chats0
TLDR
Wang et al. as discussed by the authors proposed a subjective and objective TM based on the ideal point method for the trust problem in the cloud environment, and verifies the performance of the model through experiments.
Abstract
With the development of cloud computing, cloud computing provides more and more computing services. In today's fiercely competitive environment, the service flexibility and choice provided by this highly scalable technology are becoming more and more attractive to enterprises. However, behind the rapid development of cloud computing, its security and trust issues have become increasingly unignorable. The purpose of this paper is to analyze the key technologies of cloud computing security based on the trust model (TM). This paper first proposes a subjective and objective TM based on the ideal point method for the trust problem in the cloud environment, and verifies the performance of the model through experiments. This paper proposes a decentralized TM based on blockchain, and verifies the effectiveness of the model through experiments. This paper starts from the current problems of cloud computing, and on the basis of understanding the shortcomings of traditional security technologies, proposes a key technology of cloud computing security based on the TM. The solution proposed in this paper has a minimum average time consumption of 0.12 ms in the copy + label generation stage, while the minimum average time consumption of a traditional PDP is 16.3 ms. It is obvious that this solution has great advantages.

read more

Citations
More filters
Posted Content

Real-time single image depth perception in the wild with handheld devices

TL;DR: A thorough evaluation of real-time, depth-aware augmented reality networks highlights the ability of such fast networks to generalize well to new environments, a crucial feature required to tackle the extremely varied contexts faced in real applications.
References
More filters
Journal ArticleDOI

Cognition of agriculture waste and payments for a circular agriculture model in Central China.

TL;DR: This study explores farmers' environmental understanding and their willingness to pay (WTP) under a “polluter pays” principle and calls for the integration and cooperation of private, government, business, R&D and public welfare to value the combined rural traditions, religion, philosophy and belief, socio-psychological and altruistic values of local communities.
Posted Content

Real-time single image depth perception in the wild with handheld devices

TL;DR: A thorough evaluation of real-time, depth-aware augmented reality networks highlights the ability of such fast networks to generalize well to new environments, a crucial feature required to tackle the extremely varied contexts faced in real applications.
Journal ArticleDOI

speedTrust: a super peer-guaranteed trust model in hybrid P2P networks

TL;DR: A super peer-guaranteed trust model, speedTrust, for hybrid P2P networks that establishes a feedback guarantee relationship between the service requester and its super peer, as well as a service guarantee relationship before a transaction begins.
Journal ArticleDOI

A Study on Improving Secure Routing Performance Using Trust Model in MANET

TL;DR: The proposed trust-based model security routing technique can maintain stably the network performance even in the presence of malicious nodes because it ensures reliability evaluation for nodes and the path setting between nodes and secure data transmission.
Journal ArticleDOI

Credibility Dynamics: A belief-revision-based trust model with pairwise comparisons

TL;DR: In this paper, the authors propose a trust model where pairwise comparisons are used as ratings and where trust is expressed as a strict partial order induced over agents, which uses a belief revision technique that prevents contradictions that may arise when adding new information.