ИССЛЕДОВАНИЕ ПРОБЛЕМ ДОВЕРИЯ В ОБЛАЧНЫХ ТЕХНОЛОГИЯХ - Проблемы Информационных Технологий

ИССЛЕДОВАНИЕ ПРОБЛЕМ ДОВЕРИЯ В ОБЛАЧНЫХ ТЕХНОЛОГИЯХ - Проблемы Информационных Технологий

ИССЛЕДОВАНИЕ ПРОБЛЕМ ДОВЕРИЯ В ОБЛАЧНЫХ ТЕХНОЛОГИЯХ - Проблемы Информационных Технологий

ИССЛЕДОВАНИЕ ПРОБЛЕМ ДОВЕРИЯ В ОБЛАЧНЫХ ТЕХНОЛОГИЯХ - Проблемы Информационных Технологий

ИССЛЕДОВАНИЕ ПРОБЛЕМ ДОВЕРИЯ В ОБЛАЧНЫХ ТЕХНОЛОГИЯХ - Проблемы Информационных Технологий
ИССЛЕДОВАНИЕ ПРОБЛЕМ ДОВЕРИЯ В ОБЛАЧНЫХ ТЕХНОЛОГИЯХ - Проблемы Информационных Технологий
НАЦИОНАЛЬНАЯ АКАДЕМИЯ НАУК АЗЕРБАЙДЖАНА

№2, 2013

ИССЛЕДОВАНИЕ ПРОБЛЕМ ДОВЕРИЯ В ОБЛАЧНЫХ ТЕХНОЛОГИЯХ

Алгулиев Расим М., Абдуллаева Фаргана Д.

В статье исследуются проблемы доверия, являющиеся фундаментальными среди проблем обеспечения безопасности облачных технологий. Для этого, в первую очередь, дается краткое объяснение понятия доверия, изученного в различных областях науки, исследуются технологии создания доверия на основе репутаций, подходы обеспечения прозрачности облачных технологий, методы установления доверия на основе соглашения об уровне сервиса, услуги «Доверие как сервис». Определяются существующие недостатки в исследованных проблемах, и приводится ряд рекомендаций для устранения данных недостатков. (стр. 3-9)

Ключевые слова: облачные технологии, доверие, соглашение об уровне услуг, репутация, Сибил атака
Литература
  • Habib S.M., Hauke S., Ries S., Muhlh M. Trust as a facilitator in cloud computing: a survey // Journal of Cloud Computing: Advances, Systems and Applications, 2012, vol. 1, no 19, 33 p.
  • Alguliev R.M., Abdullayeva F.C. Identity management based security architecture of cloud computing on multi-agent systems / Proc. of the Third International Conference on Innovative Computing Technology (INTECH), 2013, pp. 123–126.
  • Əliquliyev R.M., Abdullayeva F.C. Bulud texnologiyalarının təhlükəsizlik problemlərinin tədqiqi və analizi // İnformasiya Texnologiyaları Problemləri, 2013, №1, s. 3–14.
  • Rashidi A., Movahhedinia N. A model for user trust in cloud computing // International Journal on Cloud Computing: Services and Architecture (IJCCSA), 2012, vol. 2, no. 2, pp.1–8.
  • Huang J., Nicol D.M. Trust mechanisms for cloud computing // Journal of Cloud Computing: Advances, Systems and Applications, 2013, vol. 2, no 9, 14 p.
  • Heijden V.H., Verhagen T., Creemers M., Creemers M. Understanding online purchase intentions: contributions from technology and trust perspectives // European Journal of Information Systems, 2003, vol. 12, no 1, pp. 41–48.
  • Castelfranchi C., Falcone R. Principles of trust for MAS: Cognitive anatomy social importance, and quantication / Proc. of the IEEE Third International Conference on Multi-Agent Systems, 1998, pp. 72–79.
  • Gambetta D. Can we trust trust? Trust: Making and Breaking Cooperative Relations, Basil Blackwell, Oxford, 1990, Chapter 13, pp. 213–237.
  • Montaner M., Lopez B., Rosa J.L. Opinion-based filtering through trust / Proc. of the 6th International Workshop on Cooperative Information Agents VI, 2002, pp. 164–178.
  • Jøsang A., Ismail R., Boyd C. A survey of trust and reputation systems for online service provision // Journal of Decision Support Systems, vol. 43, no 2, pp.618–644.
  • Wang Y., Vassileva J. Trust and reputation model in peer-to-peer networks / Proc. of IEEE Conference on P2P Computing, 2003, pp. 1–8.
  • Ghosh A., Arce I. Guest editors’ introduction: In Cloud Computing We Trust–But Should We? // IEEE Security & Privacy, 2010, 8, no 6, pp. 14–16.
  • Personal data in the cloud: A global survey of consumer attitudes. Fujitsu Research Institute, 2010, Japan, 23 p.
  • Columbus L. Gartner predicts infrastructure services will accelerate cloud computing Growth. http://www.forbes.com/sites/louiscolumbus/2013/02/19/gartner-predicts- infrastructure-services-will-accelerate-cloud-computing-growth/.
  • Global cloud computing market forecast 2015-2020. Market Research Media Ltd, http://www.marketresearchmedia.com/?p=839.
  • Knode R. Digital trust in the cloud: Liquid security in cloudy places, CSC.COM, 2009, 40 p.
  • Security, Trust and Assurance Registry (STAR). Cloud Security Alliance (CSA), 2011, https://cloudsecurityalliance.org/star/.
  • Security guidance for critical areas of focus in cloud computing, Cloud Security Alliance (CSA), 2011, v.3.0, 176 p.
  • Haq I.U., Brandic I., Schikuta E. SLA validation in layered cloud infrastructures / Proc. of the 7th International Conference on Economics of Grids, Clouds, Systems, and Services, 2010, pp. 153–164.
  • Wang S.X., Zhang L., Wang S., Qiu X. A cloud-based trust model for evaluating quality of web services // Journal of Computer Science and Technology, 2010, vol. 25, no 6, pp. 
    1130–1142.
  • Wieder P., Yahyapour R., Ziegler Grids and Service-Oriented Architectures for Service Level Agreements, Springer, 2010, chapter 5, 171 p.
  • EMC’s vision for trust in the cloud. Proof, not promises: Creating the trusted cloud, EMC Corporation, 2011, 15 p.
  • Zacharia G., Moukas A., Maes P. Collaborative reputation mechanisms in electronic marketplaces // Decision Support Systems, , 2000, vol. 29, no 4, pp. 371–388.
  • Yu B., Singh P.M. An evidential model of distributed reputation management / Proc. of the First International Joint Conference on Autonomous Agents and Multiagent Systems, 2002, pp. 294–301.
  • Yu B., Singh P.M. A social mechanism of reputation management in electronic communities /Proc. of Fourth International Workshop on Cooperative Information Agents, 2000, pp.154–165.
  • Schafer B.J., Konstan J., Riedl J. Recommender systems in e-commerce / ACM Conference on Electronic Commerce, 1999, pp. 158–166.
  • Chang E., Dillon T.S., Hussain F.K. Trust and reputation relationships in service-oriented environments / Proc. of the Third International Conference on Information Technology and Applications (ICITA), 2005, vol. 1, pp. 4–14.
  • Wang S.X., Zhang L., Wang S. Qiu X. A cloud-based trust model for evaluating quality of Web services // Journal of Computer Science And Technology, 2010, vol. 25, no 6, pp.1130–1142.
  • Reputation system. From Wikipedia, the free encyclopedia 
    http://en.wikipedia.org/wiki/Reputation_system.
  • Carrara E., Hogben G. Reputation-based systems: a security analysis. ENISA Position Paper, 2007, no 2, 32 p.
  • Talal H.N., Quan Z.S., Sheng A.A. Reputation attacks detection for effective trust assessment among cloud services / Proc. of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2013, pp. 469–476.
  • Schreiber F.R. Sybil. Warner Books, 1973, 359 p.
  • Douceur J.R. The Sybil Attack / Proc. of 1st International Workshop on Peer-to-Peer Systems (IPTPS), 2002, pp. 1–6.