A cloud security framework based on trust model and mobile agent

@article{Benabied2015ACS,
  title={A cloud security framework based on trust model and mobile agent},
  author={Saddek Benabied and Abdelhafid Zitouni and Mahieddine Djoudi},
  journal={2015 International Conference on Cloud Technologies and Applications (CloudTech)},
  year={2015},
  pages={1-8}
}
Cloud computing as a potential paradigm offers tremendous advantages to enterprises. With the cloud computing, the market's entrance time is reduced, computing capabilities is augmented and computing power is really limitless. Usually, to use the full power of cloud computing, cloud users has to rely on external cloud service provider for managing their data. Nevertheless, the management of data and services are probably not fully trustworthy. Hence, data owners are uncomfortable to place their… Expand
A Security Framework for Cloud Data Storage(CDS) Based on Agent
TLDR
This paper proposes a framework of security to ensure the CDS, which is based on agents, it contains three layers: Cloud Provider layer, Customer layer and Trusted Third Party(TTP) layer. Expand
TRUST MODEL FOR EFFECTIVE CLOUD COMPUTING USAGE: A QUANTITATIVE STUDY
  • 2017
Cloud computing is becoming more and more important for different types of organizations. However, one of the main challenges that face Cloud Computing is Trust. This study developed a User TrustExpand
Data Security Frameworks for Mobile Cloud Computing: A Comprehensive Review of the Literature
TLDR
The development of an MCC data protection framework that provides a comprehensive protection against the threat spectrum and across all layers of the MCC infrastructure, by adequately addressing the fundamental security requirements is identified. Expand
A RULE SELECTED FUZZY ENERGY & SECURITY AWARE SCHEDULING IN CLOUD
The paradigm in which Information Technology (IT) application is provided as a service is referred to as cloud computing. It enables the users to make commercialized use of computation, storage, dataExpand
A Two-Tiers Framework for Cloud Data Storage (CDS) Security Based on Agent
Cloud Computing is a new model for delivering resources such as computing and storage on demand through a network. It has many advantages like reducing the cost, however, it remains the problem ofExpand

References

SHOWING 1-10 OF 22 REFERENCES
Security Agents: A Mobile Agent Based Trust Model for Cloud Computing
TLDR
A trust model for cloud architecture is proposed which uses mobile agent as security agents to acquire useful information from the virtual machine which the user and service provider can utilize to keep track of privacy of their data and virtual machines. Expand
A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security
TLDR
This research aims towards proposing a new trusted and collaborative agent-based two-tier framework, titled WAY (Who Are You?), to protect cloud resources and ensure security and privacy both at the service provider level as well as at the user level in a cloud environment. Expand
A User Identity Management Protocol for Cloud Computing Paradigm
TLDR
This protocol will authenticate and authorize customers/providers in other to achieve global security networks and protect customers/cloud service providers’ infrastructure by preventing unauthorized users to gain access to the service/facility. Expand
A framework of multi-agent system to facilitate security of cloud data storage
TLDR
This paper considers components of MAS framework, implementing a simulation framework by using JAVA and performing an input analysis of the data and an output analysis ofthe simulation results, and proposes MAS framework. Expand
SECURITY METHOD: CLOUD COMPUTING APPROACH BASED ON MOBILE AGENTS
TLDR
The architecture is based on mobile agents that have kept the goal of security communication in cloud computing, and is relying on the ability of security of agents. Expand
Information Security Risk Management Framework for the Cloud Computing Environments
TLDR
The goal of this paper is to present information risk management framework for better understanding critical areas of focus in cloud computing environment, to identifying a threat and identifying vulnerability. Expand
Security Architectures for Cloud Computing
TLDR
Domestic and international trends in security requirements for Cloud computing, along with security architectures proposed by Fujitsu such as access protocol, authentication and identity (ID) management, and security visualization are described. Expand
CLOUD COMPUTING: TOWARDS CASE STUDY OF DATA SECURITY MECHANISM
Pick up any magazine or visit almost any IT website or blog, you will be sure to see talk about Cloud Computing. The only problem is that not everyone agrees on what it is exactly. Every individualExpand
Security Architecture for Cloud Computing
TLDR
Security architecture for cloud computing is designed based on the functional architecture to have several security components that are common to all application and services. Expand
Cloud computing: state-of-the-art and research challenges
TLDR
A survey of cloud computing is presented, highlighting its key concepts, architectural principles, state-of-the-art implementation as well as research challenges to provide a better understanding of the design challenges of cloud Computing and identify important research directions in this increasingly important area. Expand
...
1
2
3
...