Journal of Guangdong University of Technology ›› 2014, Vol. 31 ›› Issue (3): 55-61.doi: 10.3969/j.issn.10077162.2014.03.010

• Comprehensive Studies • Previous Articles     Next Articles

Research on Intrusion Prevention Based on Trust in Cloud Environments

Wang Shuang-tu,  Han Jian-hua, Luo Jun   

  1. School of Computers,  Guangdong University of Technology, Guangzhou 510006,China
  • Received:2014-04-28 Online:2014-09-30 Published:2014-09-30

Abstract: Cloud computing has the nature of  being dynamic, virtual and open since it was used, and all kinds of largescale cloud security incidents make the safety of cloud environments frequently questioned. To ensure the security of cloud environments, it proposed an intrusion prevention framework model, based on trusted computing in cloud environments, by combining intrusion prevention technologies and trusted computing ideas. The model began with the principle of intrusion prevention with access to behavioral characteristics. Then, these features were gradually normalized, and the weight of each feature was determined to obtain user nodes' credibility. Next, it used a variety of cloud cluster server engines to detect defense and make integrated decision analysis and cluster analysis, enabling the cloud to make timely fast intrusion prevention, which avoids the drawbacks of the traditional intrusion prevention, such as minding only their own business, lagging behind in detecting and preventing attacks. The model provides cloud users with the maximum intrusion prevention services, and ensures that the cloud can withstand attacks, making the cloud and cloud users secure.

Key words: intrusion prevention, cloud computing, trust theory

[1] WANG Yong, JIN Wen-Ting, WANG Ying. A Data Distribution Method for Workflow in Cloud Environment [J]. Journal of Guangdong University of Technology, 2016, 33(04): 23-29.
[2] LIU Zhu-Song, CHEN Jie, TIAN Long. Task Scheduling Algorithm Based on Improved Cuckoo Search Algorithm in Cloud Computing Environment [J]. Journal of Guangdong University of Technology, 2016, 33(03): 32-36.
[3] ZHAO Guang-Qiang, LING Jie. Anonymous Authentication Protocol Based on Bilinear Pairing and Nonce in Cloud Computing [J]. Journal of Guangdong University of Technology, 2014, 31(3): 67-71.
[4] LIN Xin-Da, LIN Sui. Design of CAE Software Integrated System Based on Integration of Cloud Computing and Super Computing [J]. Journal of Guangdong University of Technology, 2014, 31(3): 72-76.
[5] ZHANG Hao-Rong, CHEN Ping-Hua, XIONG Jian-Bin. Task Scheduling Algorithm Based on Simulated Annealing Ant Colony Algorithm in Cloud Computing Environment [J]. Journal of Guangdong University of Technology, 2014, 31(3): 77-82.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!