Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 384967, 12 pages
http://dx.doi.org/10.1155/2014/384967
Research Article

Trusted Measurement Model Based on Multitenant Behaviors

College of Computer Science, Beijing University of Technology, Beijing 100124, China

Received 13 January 2014; Accepted 16 February 2014; Published 30 March 2014

Academic Editors: Y. Mao, X. Meng, J. Zhou, and Z. Zhou

Copyright © 2014 Zhen-Hu Ning et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. H. Zang, J. Jue, and B. Mukherjee, “A review of routing and wavelength assignment approaches for wavelength-routed optical WDM networks,” Optical Networks Magazine, vol. 1, pp. 47–60, 2000. View at Google Scholar
  2. Amazon Web Services, “Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services,” White Paper, 2009, http://awsmedia.s3.amazonaws.com/AWS_HIPAA_Whitepaper_Final.pdf.
  3. E. Kanimozhi, “Trusted cloud—a solution for cloud cartography,” Journal of Global Research in Computer Science, vol. 3, no. 11, pp. 44–51, 2012. View at Google Scholar
  4. D. W. Clarke, C. Mohtadi, and P. S. Tuffs, “Properties of generalized predictive control,” Automatica, vol. 25, no. 6, pp. 859–875, 1989. View at Google Scholar · View at Scopus
  5. G. Kim and E. Spafford, “The design and implementation of tripwire:a file system integrity checker,” Tech. Rep., Purdue Univiversity, West Lafayette, Ind, USA, 1993. View at Google Scholar
  6. W. Arbaugh, D. Farber, and J. Smith, “A secure andreliable bootstrap architecture,” in Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society, Oakland, Calif, USA, 1997. View at Scopus
  7. P. Iglio, “Trustedbox: a Kernellevel integrity checker,” in Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC '99), IEEE Computer Society, Phoenix, AZ, USA, 1999. View at Publisher · View at Google Scholar
  8. N. Petroni, T. Fraser, J. Molina et al., “Copilot-a coprocessor-based Kernel runtime integrity monitor,” in Proceedings of the 13th Usenix Security Symposium, USENIX Association, San Diego, Calif, USA, 2004.
  9. E. Shi, A. Perrig, and L. Doom, “BIND: a fine-grained attestation service for secure distributed systems,” in Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society, Oakland, Calif, USA, 2005.
  10. T. Jaeger, R. Sailer, and U. Shankar, “PRIMA: policy-reduced integrity measurement architecture,” in Proceedings of the 11th ACM Symposium on Access Control Models and Technologies (SACMAT '06), Association for Computing Machinery, Lake Tahoe, Calif, USA, 2006. View at Scopus
  11. X.-Y. Li, X.-D. Zuo, and C.-X. Shen, “System behavior based trustworthiness attestation for computing platform,” Chinese Journal of Electronics, vol. 35, no. 7, pp. 1234–1239, 2007 (Chinese). View at Google Scholar · View at Scopus
  12. C.-X. Shen, H.-G. Zhang, F. Dengguo et al., “Survey of informationsecurity,” Science in China Series:E, vol. 37, no. 2, pp. 129–150, 2007 (Chinese). View at Google Scholar
  13. B. Gong, “The behavior measurement model based on prediction and control of trusted network,” Chinese Journal of Communication, vol. 9, no. 5, pp. 117–128, 2012. View at Google Scholar
  14. L. Zhuang, M. Cai, and C.-X. Shen, “Hierarchical verification of behavior trustworthiness,” Journal of Beijing University of Technology, vol. 38, no. 9, pp. 1396–1401, 2012. View at Google Scholar
  15. M. T. Khorshed, A. B. M. S. Ali, and S. A. Wasimi, “A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing,” Future Generation Computer Systems, vol. 28, no. 6, pp. 833–851, 2012. View at Publisher · View at Google Scholar · View at Scopus
  16. X.-Y. Li, X.-L. Gui, Q. Mao, and D.-Q. Leng, “Adaptive dynamic trust measurement and prediction model based on behavior monitoring,” Chinese Journal of Computers, vol. 32, no. 4, pp. 664–674, 2009. View at Publisher · View at Google Scholar · View at Scopus
  17. T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds,” in Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09), pp. 199–212, 2009. View at Publisher · View at Google Scholar · View at Scopus
  18. Amazon, “Amazon elastic compute cloud (AmazonEC2),” 2011, http://aws.amazon.com/ec2/.
  19. F. Rocha and M. Correia, “Lucy in the sky without diamonds: stealing confidential data in the cloud,” in Proceedings of the IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W '11), pp. 129–134, 2011. View at Publisher · View at Google Scholar · View at Scopus
  20. A. Chonka, Y. Xiang, W. Zhou, and A. Bonti, “Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks,” Journal of Network and Computer Applications, vol. 34, no. 4, pp. 1097–1107, 2011. View at Publisher · View at Google Scholar · View at Scopus
  21. D. Danchev, “DanchoDanchev'sblog—mind streams of information security knowledge,” 2011, http://ddanchev.blogspot.com/.
  22. J. Grossman, “Jeremiah Grossman,” 2011, http://jeremiahgrossman.blogspot.com/.
  23. D. Danchev, “Coordinated Russia vs Georgia cyber attack in progress,” 2008.
  24. D. Danchev, The DDoS attack against CNN.com, 2008.
  25. Grossman, Cross-site scripting worms and viruses, WhitehatSecurity, 2006.
  26. M. T. Khorshed, A. B. M. S. Ali, and S. A. Wasimi, “Classifying different denial-of-service attacks in cloud computing using rule-based learning,” Security and Communication Networks, vol. 5, no. 11, pp. 1235–1247, 2012. View at Google Scholar
  27. T. Y. Chai, K. Z. Mao, and X. F. Qin, “Decoupling design of multivariable generalised predictive control,” IEE Proceedings: Control Theory and Applications, vol. 141, no. 3, pp. 197–201, 1994. View at Google Scholar
  28. M. Li, X. Chen, M. L. Xin et al., “The similarity metric,” in Proceedings of the IEEE Transactions Information Theory, pp. 863–872, 2003.
  29. J. Deng, The Control Problems of Grey Systems, Huazhong University of Science & Technology, 1993.
  30. B. Gong, Trusted Network Architecture Supporting Trusted Group Establishment and Key Technologies Research, Beijing University of Technology, 2012.