An Improved Design of the Trustworthiness Authentication Mechanism of IaaS

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

By improving resource utilization, cloud computing can greatly save costs and get users considerable profit. However, security issues have emerged as one of the most significant barrier to faster and more widespread adoption of cloud computing. Therefore, this paper focused on the trustworthiness of infrastructure as a service (IaaS) and designed a role-based authentication trustworthiness mechanism to ensure that the different roles in IaaS architecture are trusted. What's more, this paper also considered the interactions between different roles in cloud environment and designed relevant validation protocols. At last, we also designed some benchmarks to evaluate the performance overhead of this mechanism and the results showed the costs can be very little to be neglected. © Springer-Verlag Berlin Heidelberg 2013.

Cite

CITATION STYLE

APA

Wu, X., Xie, X., Liu, C., & Li, C. (2013). An Improved Design of the Trustworthiness Authentication Mechanism of IaaS. In Communications in Computer and Information Science (Vol. 320, pp. 219–226). Springer Verlag. https://doi.org/10.1007/978-3-642-35795-4_28

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free