SlideShare une entreprise Scribd logo
1  sur  23
BNM INSTITUTE OF TECHNOLOGY
Technical seminar on
A Mutual Trust Based Access Control in Cloud
Computing
Presented by,
Sanju A.N.
Mtech CSE
Under the guidance of,
Mr. Prashanth J
Assistant Professor
Dept. of CSE, BNMIT
CONTENTS
1. Introduction.
2. Literature Survey.
3. Mutual Trust Between Cloud User And Cloud
Service Node.
4. Mutual Trust Based Access Control Model In
Cloud Computing Environment, MTBAC.
5. MTBAC Simulation and Experiment.
MTBAC 1
MTBAC 2
INTRODUCTION
Cloud computing is a service delivering mode based on the
Internet.
Cloud computing environment is a typical distributed environment.
Access control is one of the most important measures to ensure the
security of cloud computing..
MTBAC 4
LITERATURE SURVEY
 In 1994, Marsh put forward the concept of trust for the first time, and then
Baize introduced trust management into network security applications.
 Hassan proposed a novel trust evaluation method suitable for the pervasive
environment.
 According to algebraic theory of semi-rings, George presented a new trust
modeling method, which defined trust relationship as a directed graph path
problem.
MTBAC 5
Continued…
 Wang Wej built a trust model based on Bayesian theory and proposed a
trusted resource scheduling algorithm.
 Jong P. Yoon et al proposed a credible model for cloud resources based
on authorization chain.
 Santos et al proposed a trusted cloud computing platform (TCCP) on
which IaaS service providers could offer a closed box-type execution
environment.
MTBAC 6
Mutual Trust Between Cloud User And Cloud
Service Node
 The mutual trust mechanism of users and cloud service nodes has a two-
part structure.
i. Users' behavior trust model
a) Acquisition of user's behavior information.
b) The division of trust attributes.
c) Quantitative expression of user behavior trust.
The division of trust attributes
MTBAC 7
Fig.1 The division of trust attributes
MTBAC 8
Continued…..
ii. Trust model of cloud service nodes.
The behavior trust mechanism of cloud service nodes is based on
Ant colony algorithm.
a) Trust Degree
The tendency which entity the user would choose to interact. At time t,
trust degree of cloud service node c is expressed as Tc (t) E [0,1].
b) Direct trust
Direct trust relationship is built through direct experience of
interactions between the user and entity, formulized as Dtc (t).
MTBAC 9
Continued…..
c) Trust pheromone
A primary cognition of direct trust degree between the user and the
entity. At time t, user U's trust pheromone towards cloud service
node c is formulized by Tpc (t).
d) Heuristic pheromone
User's cognitive information about the service node. User's
cognitive information is the Euler distance between the user and the
entity, formulized as
MTBAC 10
Continued…..
 In cloud computing, user's choice of cloud service nodes is
expressed by direct trust degree.
 Where α is the weight of trust pheromone between user u and e, β
is the weight of heuristic pheromone. E is a set of user-selectable
cloud service nodes. Here E = {1, 2,…, m}.
MTBAC 11
Continued…..
e) Recommend trust
 Recommend trust is recommended by some intermediate entity.
formulized as
 Different intermediate entities have different significance on trust
values.
 Intermediate entity k belongs to N = {1, 2,··· , n}. At time t, user
U's recommended trust towards cloud service node C is
expressed as follows:
MTBAC 12
 Trust between a user and a node consists of two parts, direct trust δ1
and recommended trust δ2.
Trust pheromone between entities will be gradually reduced over time,
therefore, we need to make updates of trust pheromone timely.
Where, is the decay factor of trust pheromone represents the
increment of trust pheromone in the time period of (t,t + 1).
Continued…..
MTBAC 13
According to deterministic theory, the following formula defines transitive
relations of trust between the user and the entity.
iii. Mutual Trust between users and cloud service nodes
1. Mutual Trust definition
f) Mutual trust
The confidence that both users and cloud service nodes have shown
to each other in the face of uncertainty in future interactions.
Continued……
MTBAC 14
Continued…..
g) Mutual Trust Threshold
Mutual Trust Threshold MTT is composed of a binary group,
h) Trust Decision
Trust decision can be formulized as ,
MTBAC 15
Continued…..
2. Mutual trust mechanism
 Bidirectional trust structure.
 Collection and processing of behavior trust information.
 Computing and updating of trust values.
MTBAC 16
Mutual Trust Based Access Control Model In Cloud
Computing Environment, MTBAC
1. The structure of MTBAC
The physical structure of MTBAC
consists of users, authentication and
authorization center (AAC), cloud
service nodes, user's behavior trust
database and cloud service node's
trust database
MTBAC 17
MTBAC
2. Algorithm of MTBAC
1. AAC checks whether user has valid authentication token.
2. Compare the user's trust level with the trust threshold, if it is higher
than the threshold, turn to step (3); else, refuse to provide services
to the user.
3. Read the user's access request, and put all the cloud nodes which
could provide the corresponding service into the candidate node
queue.
Continued…..
4. Select the best service node in the candidate node queue and give the
user the service access right
5. Updates user's trust degree.
MTBAC 18
MTBAC 19
MTBAC SIMULATION AND EXPERIMENT
 Based on the rate of successful transaction (RST) as performance
measurement. RST is the proportion of successful interact times in all
interactions between users and cloud service nodes.
1. The comparison among CSTBAC, UTBAC and MTBAC
COP 5614 - Operating Systems 20
Continued…..
2. Comparison experiment of different mutual trust thresholds
MTBAC 21
CONCLUSIONS
 MTBAC take both user's behavior trust and cloud service node's trust
into consideration.
 MTBAC adapts to the characteristics of uncertainty, dynamism and
distribution in cloud computing.
 User's behavior is divided into three types in user's trust model and each
type of attribute has a certain weight.
 User' s trust level will be acquired through trust quantization of user's
behavior.
MTBAC 22
References
I. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=485845
II. https://hal.inria.fr/file/index/docid/695951/filename/article1-10-
HAL-1.pdf
III. Guoyuan Lin, Shan He, Hao Huang. Access Control Security
Model Based on Behavior in Cloud Computing Environment[J].
Journal of China Institute of Communications, 2012, 33(3).
IV. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6
827577&queryText%3Dmtbac.
MTBAC 23

Contenu connexe

Tendances

Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...
IDES Editor
 

Tendances (17)

Defeating jamming with the power of silence a gametheoretic analysis
Defeating jamming with the power of silence a gametheoretic analysisDefeating jamming with the power of silence a gametheoretic analysis
Defeating jamming with the power of silence a gametheoretic analysis
 
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...
 
ELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATION
ELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATIONELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATION
ELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATION
 
JAVA & .NET IEEE B.E/B.Tech PROJECT TITLES 2014-15
JAVA & .NET IEEE B.E/B.Tech PROJECT TITLES 2014-15JAVA & .NET IEEE B.E/B.Tech PROJECT TITLES 2014-15
JAVA & .NET IEEE B.E/B.Tech PROJECT TITLES 2014-15
 
Non cooperative location privacy
Non cooperative location privacyNon cooperative location privacy
Non cooperative location privacy
 
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICESUSER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES
 
Non cooperative location privacy
Non cooperative location privacyNon cooperative location privacy
Non cooperative location privacy
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a survey
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Survey on Hop-by-Hop Message Authentication and Source Privacy in WSN
Survey on Hop-by-Hop Message Authentication and Source Privacy in WSN  Survey on Hop-by-Hop Message Authentication and Source Privacy in WSN
Survey on Hop-by-Hop Message Authentication and Source Privacy in WSN
 
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
 
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...
 
Parallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 ProjectsParallel and Distributed System IEEE 2015 Projects
Parallel and Distributed System IEEE 2015 Projects
 
Irrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centerIrrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting center
 
Irrational node detection in multihop cellular
Irrational node detection in multihop cellularIrrational node detection in multihop cellular
Irrational node detection in multihop cellular
 
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...
 
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKSA METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
 

En vedette (6)

Isaca india trust & value from cloud computing (aug 2011) print
Isaca india trust & value from cloud computing (aug 2011) printIsaca india trust & value from cloud computing (aug 2011) print
Isaca india trust & value from cloud computing (aug 2011) print
 
Trust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud providerTrust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud Computing, removing the need to trust your cloud provider
 
Cloud security ppt
Cloud security pptCloud security ppt
Cloud security ppt
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 

Similaire à sanju

A trust evaluation scheme of service providers in mobile edge computing
A trust evaluation scheme of service providers in mobile edge  computingA trust evaluation scheme of service providers in mobile edge  computing
A trust evaluation scheme of service providers in mobile edge computing
IJECEIAES
 
Improved quality of service-based cloud service ranking and recommendation model
Improved quality of service-based cloud service ranking and recommendation modelImproved quality of service-based cloud service ranking and recommendation model
Improved quality of service-based cloud service ranking and recommendation model
TELKOMNIKA JOURNAL
 
Securing cloud computing environment against d do s attacks
Securing cloud computing environment against d do s attacksSecuring cloud computing environment against d do s attacks
Securing cloud computing environment against d do s attacks
Sampatkumar Satyamurti
 
Research Design Report Tagore
Research Design Report TagoreResearch Design Report Tagore
Research Design Report Tagore
Vinoth Kanna
 
Towards trusted mobile ad hoc clouds
Towards trusted mobile ad hoc cloudsTowards trusted mobile ad hoc clouds
Towards trusted mobile ad hoc clouds
Ahmed Hammam
 
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
SelCSP: A Framework to Facilitate Selection of Cloud Service ProvidersSelCSP: A Framework to Facilitate Selection of Cloud Service Providers
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
1crore projects
 

Similaire à sanju (20)

T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
T-BROKER: A TRUST-AWARE SERVICE BROKERING SCHEME FOR MULTIPLE CLOUD COLLABORA...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
SELECTING TRUSTWORTHY CLIENTS IN THE CLOUD
SELECTING TRUSTWORTHY CLIENTS IN THE CLOUDSELECTING TRUSTWORTHY CLIENTS IN THE CLOUD
SELECTING TRUSTWORTHY CLIENTS IN THE CLOUD
 
Selecting Trustworthy Clients in the Cloud
Selecting Trustworthy Clients in the CloudSelecting Trustworthy Clients in the Cloud
Selecting Trustworthy Clients in the Cloud
 
A trust evaluation scheme of service providers in mobile edge computing
A trust evaluation scheme of service providers in mobile edge  computingA trust evaluation scheme of service providers in mobile edge  computing
A trust evaluation scheme of service providers in mobile edge computing
 
Cloud ppt
Cloud pptCloud ppt
Cloud ppt
 
Cloud armor:Supporting Reputation-Based Trust Management for Cloud Service
Cloud armor:Supporting Reputation-Based Trust Management for Cloud ServiceCloud armor:Supporting Reputation-Based Trust Management for Cloud Service
Cloud armor:Supporting Reputation-Based Trust Management for Cloud Service
 
Improved quality of service-based cloud service ranking and recommendation model
Improved quality of service-based cloud service ranking and recommendation modelImproved quality of service-based cloud service ranking and recommendation model
Improved quality of service-based cloud service ranking and recommendation model
 
IRJET- Trust Value Calculation for Cloud Resources
IRJET- Trust Value Calculation for Cloud ResourcesIRJET- Trust Value Calculation for Cloud Resources
IRJET- Trust Value Calculation for Cloud Resources
 
Securing cloud computing environment against d do s attacks
Securing cloud computing environment against d do s attacksSecuring cloud computing environment against d do s attacks
Securing cloud computing environment against d do s attacks
 
BNTM: Bayesian Network based Trust Model for Grid Computing
BNTM: Bayesian Network based Trust Model for Grid ComputingBNTM: Bayesian Network based Trust Model for Grid Computing
BNTM: Bayesian Network based Trust Model for Grid Computing
 
Trust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud EnvironmentTrust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud Environment
 
Research Design Report Tagore
Research Design Report TagoreResearch Design Report Tagore
Research Design Report Tagore
 
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...
IRJET-  	  Improvement of Security and Trustworthiness in Cloud Computing usi...IRJET-  	  Improvement of Security and Trustworthiness in Cloud Computing usi...
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...
 
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKTRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
 
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...
Weighted Coefficient Firefly Optimization Algorithm and Support Vector Machin...
 
WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...
WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...
WEIGHTED COEFFICIENT FIREFLY OPTIMIZATION ALGORITHM AND SUPPORT VECTOR MACHIN...
 
Towards trusted mobile ad hoc clouds
Towards trusted mobile ad hoc cloudsTowards trusted mobile ad hoc clouds
Towards trusted mobile ad hoc clouds
 
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
SelCSP: A Framework to Facilitate Selection of Cloud Service ProvidersSelCSP: A Framework to Facilitate Selection of Cloud Service Providers
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 

sanju

  • 1. BNM INSTITUTE OF TECHNOLOGY Technical seminar on A Mutual Trust Based Access Control in Cloud Computing Presented by, Sanju A.N. Mtech CSE Under the guidance of, Mr. Prashanth J Assistant Professor Dept. of CSE, BNMIT
  • 2. CONTENTS 1. Introduction. 2. Literature Survey. 3. Mutual Trust Between Cloud User And Cloud Service Node. 4. Mutual Trust Based Access Control Model In Cloud Computing Environment, MTBAC. 5. MTBAC Simulation and Experiment. MTBAC 1
  • 3. MTBAC 2 INTRODUCTION Cloud computing is a service delivering mode based on the Internet. Cloud computing environment is a typical distributed environment. Access control is one of the most important measures to ensure the security of cloud computing..
  • 4. MTBAC 4 LITERATURE SURVEY  In 1994, Marsh put forward the concept of trust for the first time, and then Baize introduced trust management into network security applications.  Hassan proposed a novel trust evaluation method suitable for the pervasive environment.  According to algebraic theory of semi-rings, George presented a new trust modeling method, which defined trust relationship as a directed graph path problem.
  • 5. MTBAC 5 Continued…  Wang Wej built a trust model based on Bayesian theory and proposed a trusted resource scheduling algorithm.  Jong P. Yoon et al proposed a credible model for cloud resources based on authorization chain.  Santos et al proposed a trusted cloud computing platform (TCCP) on which IaaS service providers could offer a closed box-type execution environment.
  • 6. MTBAC 6 Mutual Trust Between Cloud User And Cloud Service Node  The mutual trust mechanism of users and cloud service nodes has a two- part structure. i. Users' behavior trust model a) Acquisition of user's behavior information. b) The division of trust attributes. c) Quantitative expression of user behavior trust.
  • 7. The division of trust attributes MTBAC 7 Fig.1 The division of trust attributes
  • 8. MTBAC 8 Continued….. ii. Trust model of cloud service nodes. The behavior trust mechanism of cloud service nodes is based on Ant colony algorithm. a) Trust Degree The tendency which entity the user would choose to interact. At time t, trust degree of cloud service node c is expressed as Tc (t) E [0,1]. b) Direct trust Direct trust relationship is built through direct experience of interactions between the user and entity, formulized as Dtc (t).
  • 9. MTBAC 9 Continued….. c) Trust pheromone A primary cognition of direct trust degree between the user and the entity. At time t, user U's trust pheromone towards cloud service node c is formulized by Tpc (t). d) Heuristic pheromone User's cognitive information about the service node. User's cognitive information is the Euler distance between the user and the entity, formulized as
  • 10. MTBAC 10 Continued…..  In cloud computing, user's choice of cloud service nodes is expressed by direct trust degree.  Where α is the weight of trust pheromone between user u and e, β is the weight of heuristic pheromone. E is a set of user-selectable cloud service nodes. Here E = {1, 2,…, m}.
  • 11. MTBAC 11 Continued….. e) Recommend trust  Recommend trust is recommended by some intermediate entity. formulized as  Different intermediate entities have different significance on trust values.  Intermediate entity k belongs to N = {1, 2,··· , n}. At time t, user U's recommended trust towards cloud service node C is expressed as follows:
  • 12. MTBAC 12  Trust between a user and a node consists of two parts, direct trust δ1 and recommended trust δ2. Trust pheromone between entities will be gradually reduced over time, therefore, we need to make updates of trust pheromone timely. Where, is the decay factor of trust pheromone represents the increment of trust pheromone in the time period of (t,t + 1). Continued…..
  • 13. MTBAC 13 According to deterministic theory, the following formula defines transitive relations of trust between the user and the entity. iii. Mutual Trust between users and cloud service nodes 1. Mutual Trust definition f) Mutual trust The confidence that both users and cloud service nodes have shown to each other in the face of uncertainty in future interactions. Continued……
  • 14. MTBAC 14 Continued….. g) Mutual Trust Threshold Mutual Trust Threshold MTT is composed of a binary group, h) Trust Decision Trust decision can be formulized as ,
  • 15. MTBAC 15 Continued….. 2. Mutual trust mechanism  Bidirectional trust structure.  Collection and processing of behavior trust information.  Computing and updating of trust values.
  • 16. MTBAC 16 Mutual Trust Based Access Control Model In Cloud Computing Environment, MTBAC 1. The structure of MTBAC The physical structure of MTBAC consists of users, authentication and authorization center (AAC), cloud service nodes, user's behavior trust database and cloud service node's trust database
  • 17. MTBAC 17 MTBAC 2. Algorithm of MTBAC 1. AAC checks whether user has valid authentication token. 2. Compare the user's trust level with the trust threshold, if it is higher than the threshold, turn to step (3); else, refuse to provide services to the user. 3. Read the user's access request, and put all the cloud nodes which could provide the corresponding service into the candidate node queue.
  • 18. Continued….. 4. Select the best service node in the candidate node queue and give the user the service access right 5. Updates user's trust degree. MTBAC 18
  • 19. MTBAC 19 MTBAC SIMULATION AND EXPERIMENT  Based on the rate of successful transaction (RST) as performance measurement. RST is the proportion of successful interact times in all interactions between users and cloud service nodes. 1. The comparison among CSTBAC, UTBAC and MTBAC
  • 20. COP 5614 - Operating Systems 20 Continued….. 2. Comparison experiment of different mutual trust thresholds
  • 21. MTBAC 21 CONCLUSIONS  MTBAC take both user's behavior trust and cloud service node's trust into consideration.  MTBAC adapts to the characteristics of uncertainty, dynamism and distribution in cloud computing.  User's behavior is divided into three types in user's trust model and each type of attribute has a certain weight.  User' s trust level will be acquired through trust quantization of user's behavior.
  • 22. MTBAC 22 References I. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=485845 II. https://hal.inria.fr/file/index/docid/695951/filename/article1-10- HAL-1.pdf III. Guoyuan Lin, Shan He, Hao Huang. Access Control Security Model Based on Behavior in Cloud Computing Environment[J]. Journal of China Institute of Communications, 2012, 33(3). IV. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6 827577&queryText%3Dmtbac.