Title: Developing a trustworthy computing framework for clouds

Authors: ChenLin Huang; LiGang He; XiangKe Liao; HuaDong Dai; MengLuo Ji

Addresses: School of Computer, National University of Defense Technology, Changsha, 410073, Hunan, China ' Department of Computing Science, University of Warwick, Coventry, CV4 7AL, UK; College of Computer Science and Electronic Engineering, Hunan University, Changsha, China ' School of Computer, National University of Defense Technology, Changsha, 410073, Hunan, China ' School of Computer, National University of Defense Technology, Changsha, 410073, Hunan, China ' Department of Computer and Information Engineering, Luoyang Institute of Science and Technology, Luoyang, 471023, Henan, China

Abstract: The concept of tailored trustworthy spaces (TTSs) has been proposed to build a trustworthy cyberspace and solve the trust and security issues in clouds. However, the problem of building a trustworthy cloud infrastructure to support TTS has not been addressed yet. In this paper, we aim to coordinate trust and security, and propose a trust-based cloud security framework, called trustworthy computing framework (TwCF), for TTS. In this framework, the application-aware policy is adopted to suit the users' security contents. A trust management framework is designed to manage trust, security and policies, and fulfil the trust negotiation and decision-making in TTS. The platform security mechanisms concerning the key elements in cloud security are designed to assure the deployment of security policies. In this paper, the key elements and emerging research issues in TwCF are identified and a case study of establishing a TTS in platform as a service (PaaS) is presented.

Keywords: tailored trustworthy spaces; TTSs; trustworthy computing; trust management; cloud computing; cloud security; application-aware policy; platform as a service; PaaS.

DOI: 10.1504/IJES.2016.073753

International Journal of Embedded Systems, 2016 Vol.8 No.1, pp.59 - 68

Received: 10 Jul 2014
Accepted: 08 Nov 2014

Published online: 17 Dec 2015 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article