%0 Conference Proceedings %T A Trust-Based Defensive System Model for Cloud Computing %+ Xinjiang University %+ North China Electric Power University %A Zhou, Qian %A Yu, Jiong %A Yu, Feiran %Z Part 4: Session 4: Trust and Authentication %< avec comité de lecture %( Lecture Notes in Computer Science %B 8th Network and Parallel Computing (NPC) %C Changsha,, China %Y Erik Altman %Y Weisong Shi %I Springer %3 Network and Parallel Computing %V LNCS-6985 %P 146-159 %8 2011-10-21 %D 2011 %R 10.1007/978-3-642-24403-2_12 %K fuzzy AHP %K multiple detection engines %K cloud security %K trusted cloud %K trust %K behavioral evidence %Z Computer Science [cs]Conference papers %X Because of the dynamic and open characteristics of the cloud computing, continuing malicious attacks happen frequently. Combining the idea of trusted cloud, a trust-based defensive system model for cloud computing has been constructed to guarantee the cloud security. Through real-timely monitoring, users’ behavior evidences have been obtained and standardized; a new method for users’ trust evaluation based on fuzzy AHP (Analytic Hierarchy Process, AHP) has been presented, it gradually determines the weights of behavior evidences, achieves quantitative assessment of behavioral trust; to provide great security defense for users, multiple detection engines have been used to conduct a comprehensive inspection of suspicious files and integrated decisions have been made. Experimental results show the system model can effectively eliminate the malicious behaviors from undesirable users, reduce users’ damages caused by virus and achieve a two-way defense for both cloud and client. %G English %Z TC 10 %Z WG 10.3 %2 https://inria.hal.science/hal-01593026/document %2 https://inria.hal.science/hal-01593026/file/978-3-642-24403-2_12_Chapter.pdf %L hal-01593026 %U https://inria.hal.science/hal-01593026 %~ IFIP-LNCS %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-TC10 %~ IFIP-NPC %~ IFIP-WG10-3 %~ IFIP-LNCS-6985