Abstract
In today’s computing environments, one must assume that a subset of the system is currently, or will eventually be compromised. The proposed architecture supports design separation for high reliability and information assurance. By leveraging a hybrid fault model with multiple, parallel execution paths and resultant execution trace comparison, the proposed cognitive trust architecture identifies suspect nodes and assures trusted execution. Furthermore, the modeled architecture may be scaled through proactive thread diversity for additional assurance during threat escalation. The solution provides dynamic protection through distributing critical information across federated cloud resources that adopt a metamorphic topology, redundant execution, and the ability to break command and control of malicious agents.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lammel, R., “Googles MapReduce programming model Revisited,” Science of Computer Programming 70(1), 1–30 (2008).
Gollman, D., [Computer Security], John Wiley & Sons (2011).
Saltzer, J. H. and Schroeder, M. D., “The protection of information in computer systems,” Proceedings of the IEEE 63(9), 1278–1308 (1975).
Han, S.-J., Oh, H.-S., and Park, J., “The improved data encryption standard (DES) algorithm,” in [Spread Spectrum Techniques and Applications Proceedings, 1996., IEEE 4th International Symposium on], 3, 1310– 1314, IEEE (1996).
Diffie, W. and Hellman, M., “New directions in cryptography,” Information Theory, IEEE Transactions on 22(6), 644–654 (1976).
Rivest, R. L., Shamir, A., and Adleman, L., “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM 21(2), 120–126 (1978).
Clark, D. D. and Wilson, D. R., “A comparison of commercial and military computer security policies,” NIST SPECIAL PUBLICATION SP (1989).
Brewer, D. F. and Nash, M. J., “The chinese wall security policy,” in [Security and Privacy, 1989. Proceedings., 1989 IEEE Symposium on], 206–214, IEEE (1989).
One, A., “Smashing the stack for fun and profit,” Phrack magazine 7(49), 14–16 (1996).
Eaton, J. W. et al., [GNU octave], Free Software Foundation (1997).
Wang, W., Zeng, G., Tang, D., and Yao, J., “Cloud-DLS: Dynamic trusted scheduling for Cloud computing,” Expert Systems with Applications 39(3), 2321–2329 (2012).
Rousseau, D. M., Sitkin, S. B., Burt, R. S., and Camerer, C., “Not so different after all: A cross-discipline view of trust.,” Academy of management review 23(3), 393–404 (1998).
Mayer, R. C., Davis, J. H., and Schoorman, F. D., “An integrative model of organizational trust,” Academy of management review, 709–734 (1995).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Anderson, G.W. (2014). Trusted Computation Through Biologically Inspired Processes. In: Pino, R., Kott, A., Shevenell, M. (eds) Cybersecurity Systems for Human Cognition Augmentation. Advances in Information Security, vol 61. Springer, Cham. https://doi.org/10.1007/978-3-319-10374-7_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-10374-7_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-10373-0
Online ISBN: 978-3-319-10374-7
eBook Packages: Computer ScienceComputer Science (R0)