MACINTOS: Mutual Access Control in Trust Oriented Security Model in Cloud Computing

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-28 Number-2
Year of Publication : 2015
Authors : Abdul Fahad Rahman, Neethu V M, Ranjith T K, Radhika K, Ranjith Ashok, Nicy K S
  10.14445/22312803/IJCTT-V28P117

MLA

Abdul Fahad Rahman, Neethu V M, Ranjith T K, Radhika K, Ranjith Ashok, Nicy K S "MACINTOS: Mutual Access Control in Trust Oriented Security Model in Cloud Computing". International Journal of Computer Trends and Technology (IJCTT) V28(2):100-103, October 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
In this era, cloud computing can provide users with virtualized and scalable web services, while faced with major security demand, however. Access control is a security method to ensure that authorized users access the data and system. Although access control model and policies have been developed for different environments, in cloud computing only when the security and reliability of both user and cloud service nodes are ensured, data security can be effectively attained during interactions among users and the cloud. Therefore, creating a mutual trust relationship between users and cloud service node is the key to ensure new kinds of access control methods in cloud computing environment. United with Trust Management(TM), a mutual access control in trust oriented security model is introduced in this paper. This model takes both user's behaviour trust and cloud services node’s in account. Trust relationships between users and cloud service nodes are established using mutual trust mechanism. Security issues of access control are solved by developing Mutual Access Control In Trust Oriented Security model into cloud computing environment. Simulation experiments show that this model can provide the interaction among users and cloud service nodes.

References
[1] Marsh S P. Formalising Trust as a Computational Concept. Ph. N dissertation. University of Stirling, Scotland (1994).
[2] Jameel H, Hung L X, Kalim U. A Trust Model for Ubiquitous Systems Based on Vectors of Trust Values. In: Proc. of the 7th IEEE Int'I Symp. On Multimedia. Washington: IEEE Computer Society Press. 2005: 674-679.
[3] Sun Y, Yu W, Han Z, Liu KJR. Information Theoretic Framework of Trust Modeling and Evaluation for ad-hoc Networks. IEEE Journal on Selected Areas in Communications, Selected Areas in Communications, 2006, 249(2): 305-319.
[4] Wei Wang, Guosun Zeng. Trusted Dynamic Level Scheduling Based on Bayes Trust Model. Science in China Series F-Information Sciences, 2007, 50 (3): 456-469.
[5] Santos N, Gummadi K P, Rodrigues R. Towards Trusted cloud computing[C]// Proceedings of 2009 conference on Hot topics in cloud computing. 2009: 3-3.

Keywords
Cloud Computing, Access Control, Mutual Trust Mechanism, MACINTOS.