Trust Model to Enhance Security and Interoperability of Cloud Environment

  • Wenjuan Li
  • Lingdi Ping
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5931)


Trust is one of the most important means to improve security and enable interoperability of current heterogeneous independent cloud platforms. This paper first analyzed several trust models used in large and distributed environment and then introduced a novel cloud trust model to solve security issues in cross-clouds environment in which cloud customer can choose different providers’ services and resources in heterogeneous domains can cooperate. The model is domain-based. It divides one cloud provider’s resource nodes into the same domain and sets trust agent. It distinguishes two different roles cloud customer and cloud server and designs different strategies for them. In our model, trust recommendation is treated as one type of cloud services just like computation or storage. The model achieves both identity authentication and behavior authentication. The results of emulation experiments show that the proposed model can efficiently and safely construct trust relationship in cross-clouds environment.


cloud computing trust model heterogeneous domain role trust recommendation 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Foster, I., Kesselman, C.: The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann, San Francisco (1999)Google Scholar
  2. 2.,
  3. 3.
    Foster, I., Kesselman, C., Nick, J., Tuecke, S.: The Physiology of the Grid: an Open Grid Services Architecture for Distributed Systems Integration. Technical report, Global Grid Forum (2002)Google Scholar
  4. 4.
    Xu, Z., Feng, B., Li, W.: Cloud Computing Technology. Publishing House of Electronics Industry, Beijing (2004)Google Scholar
  5. 5.
    Gartner.: Security Issue of Cloud Computing,
  6. 6.
    Urquhart, J.: The Biggest Cloud-Computing Issue of 2009 is Trust (2009),
  7. 7.
    Li, W., Wang, X., Fu, Y., Fu, Z.: Study on Several Trust Models in Grid Environment. Journal of Fuzhou University Natural Science Edition 34(2), 189–193 (2006)Google Scholar
  8. 8.
    Blaze, M., loannidis, J., Keromytis, A.D.: Experience with the KeyNote Trust Management System. Applications and Future Directions. In: iTrust 2008, pp. 284–300 (2003)Google Scholar
  9. 9.
    Meng, X., Zhang, G., Kang, J., Li, H., Li, D.: A New Subjective Trust Model Based on Cloud Model. In: ICNSC 2008, 5th IEEE International Conference on Networking, Sensing and Control Sanya China, April 6-8, pp. 1125–1130 (2008)Google Scholar
  10. 10.
    Xiao-Yong, L.I., Xiao-Lin, G.U.I.: Research on Dynamic Trust Model for Large Scale Distributed Environment. Journal of Software 18(6), 1510–1521 (2007)Google Scholar
  11. 11.
    Song, S., Hwang, K., Macwan, M.: Fuzzy Trust Integration for Security Enforcement in Grid Computing. In: Jin, H., Gao, G.R., Xu, Z., Chen, H. (eds.) NPC 2004. LNCS, vol. 3222, pp. 9–21. Springer, Heidelberg (2004)Google Scholar
  12. 12.
    Altman, J.: PKI Security for JXTA Overlay Network, Technical Report,TR-I2-03-06, Palo Alto; Sun Microsystem (2003)Google Scholar
  13. 13.
    Perlman, R.: An Overview of PKI Trust Models. IEEE Network 13, 38–43 (1999)CrossRefGoogle Scholar
  14. 14.
    Dou, W., Wang, H., Jia, Y., Zou, P.: A Recommendation-Based Peer-to-Peer Trust Model. Software Journal 15(4), 571–583 (2004)zbMATHMathSciNetGoogle Scholar
  15. 15.
    Gan, Z., Zeng, G.: A Trust Evaluation Model Based on Behavior in Grid Environment. Computer Application and Software 22(2), 63–64 (2005)Google Scholar
  16. 16.
    Zhu, J., Yang, S., Fan, J., Chen, M.: A Grid&P2P Trust Model Based on Recommendation Evidence Reasoning. Journal of Computer Research and Development 42(5), 797–803 (2005)zbMATHCrossRefGoogle Scholar
  17. 17.
    Li, X., Michael, R., Liu, J.: A Trust Model Based Routing Protocol for Secure Ad Hoc Network. In: Proceedings of the 2004 IEEE Aerospace Conference, vol. 2, pp. 1286–1295 (2004)Google Scholar
  18. 18.
    Lin, C., Varadharajan, V., Wang, Y.: Enhancing Grid Security with Trust Management. In: Proceedings of the 2004 IEEE International Conference on Service Computing, pp. 303–310 (2004)Google Scholar
  19. 19.
    Azzendin, F., Maheswaran, M.: Evolving and Managing Trust in Grid Computing Systems. In: Proceedings of the 2002 IEEE Canadian Conference on Electrical & Computer Engineering, vol. 3, pp. 1424–1429 (2002)Google Scholar
  20. 20.
    Abdul-Rahman, A., Hailes, S.: Supporting Trust in Virtual Communities. In: Proceedings of the 33rd Hawaii International Conference on System Sciences, Hawaii, vol. 1 (2000)Google Scholar
  21. 21.
    Wang, L., Yang, S.: A Trust Model in Grid Environment. Journal of Computer Engineering and Application 40(23), 50–53 (2004)Google Scholar
  22. 22.
    Foster, I., Kesselman, C., Tsudik, G., Tuecke, S.: A Security Architecture for Computational Grids. In: The 5th ACM Conference on Computer and Communication Security, pp. 83–92 (1998)Google Scholar
  23. 23.
    Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud Computing and Grid Computing 360-Degree Compared. In: Grid Computing Environments Workshop, GCE 2008. IEEE, Los Alamitos (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Wenjuan Li
    • 1
    • 2
  • Lingdi Ping
    • 1
  1. 1.College of Computer Science and TechnologyZhejiang UniversityHangzhouChina
  2. 2.Hangzhou Normal UniversityHangzhouChina

Personalised recommendations