Article ID Journal Published Year Pages File Type
489840 Procedia Computer Science 2015 6 Pages PDF
Abstract

Available trust measures for cloud computing does not provide rigid control, which needs more enhanced security measures. We propose an extended trust management scheme which uses various attributes of the cloud computing environment. The trust computing performed with user profiles, and key based mechanism does not support the firewalls for successful operating and performance development. Here the location information of the user is used to avoid services from targeting by malicious users. It also uses a time variant hashing mechanism to compute secret keys for the legitimate users. On the scope of being secure the services from target attacks, we used a real time service composition approach, which combine necessary services according to the location of the user and other metrics.

Related Topics
Physical Sciences and Engineering Computer Science Computer Science (General)