Skip to main content

Design and Implementation of a Trust Service for the Cloud

  • Conference paper
  • First Online:
On the Move to Meaningful Internet Systems: OTM 2015 Conferences (OTM 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9415))

Abstract

Cloud computing is probably one of the most promising and appealing technologies since it supplies access to an unlimited number of virtualized resources. However, due to its distributed and opaque nature, the Cloud raises many issues such as security, and integrity to cite a few. As a result, these issues inhibit a more general migration of workloads into the Cloud.

In this paper we discuss the design and implementation of a system that may help users trust the cloud. The system combines provenance, access control and reasoning models.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Muniswamy-Reddy, K.-K., Seltzer, M.I.: Provenance as first class cloud data. Operating Systems Review 43(4), 11–16 (2009)

    Article  Google Scholar 

  2. Moreau, L., Missier, P. (eds.): PROV-DM: The PROV Data Model. W3C Recommendation (2013)

    Google Scholar 

  3. Li, Y., Boucelma, O.: A CPN provenance model of workflow: towards diagnosis in the cloud. In: ADBIS (2), pp. 55-64 (2011)

    Google Scholar 

  4. Park, J., Nguyen, D., Sandhu, R.: A provenance-based access control model. In: Proceedings of the 10th Annual International Conference on Privacy, Security and Trust (PST 2012) (2012)

    Google Scholar 

  5. Lacroix, J., Boucelma, O.: Trusting the cloud: a PROV + RBAC approach. In: Proceedings of the 7th IEEE International Conference on Cloud Computing (CLOUD 2014) (2014)

    Google Scholar 

  6. Ali, M., Moreau, L.: A provenance-aware policy language (cProvl) and a data traceability model (cProv) for the cloud. In: Proceedings of the 2013 IEEE 3rd International Conference on Cloud and Green Computing (CGC 2013) (2013)

    Google Scholar 

  7. Singh, M.P.: Towards a science of security. In: Presented keynote 4 at the 7th IEEE International Conference on Cloud Computing (CLOUD 2014) (2014)

    Google Scholar 

  8. Dahl, R.L., et al.: Node.js (2010). https://nodejs.org/

  9. Moreau, L.: ProvTranslator REST API (2013). https://provenance.ecs.soton.ac.uk/validator/view/api.html

  10. Jewell, M.O., Keshavarz, A.S., Michaelides, D.T., Yang, H., Moreau, L.: The PROV-JSON Serialization - W3C Member Submission (2014). https://provenance.ecs.soton.ac.uk/prov-json/

  11. Moreau, L., Clifford, B., Freire, J., Futrelle, J., Gil, Y., Groth, P., Kwasnikowska, N., Miles, S., Missier, P., Myers, J., Plale, B., Simmhan, Y., Stephan, E., den Bussche, J.V.: The open provenance model core specification (v1.1). Future Generation Computer Systems (2010)

    Google Scholar 

  12. Lebo, T., Sahoo, S., McGuinness, D., (eds.): PROV-O: The PROV Ontology. W3C Recommendation (2013)

    Google Scholar 

  13. Goble, C., et al.: Taverna (2009). http://www.taverna.org.uk

  14. Cheney, J., Missier, P., Moreau, L., (eds.): Constraints of the PROV Data Model. W3C Recommendation (2013)

    Google Scholar 

  15. Moreau, L., Huynh, T.D., Michaelides, D.: An online validator for provenance: algorithmic design, testing, and API. In: Gnesi, S., Rensink, A. (eds.) FASE 2014 (ETAPS). LNCS, vol. 8411, pp. 291–305. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  16. Cheney, J., Soiland-Reyes, S.: PROV-N: The Provenance Notation. W3C Recommendation (2013)

    Google Scholar 

  17. De Nies, T., Magliacane, S., Verborgh, R., Coppens, S., Groth, P., Mannens, E., Van de Walle, R.: Git2PROV: exposing version control system content as W3C PROV. In: Poster and Demo Proceedings of the 12th International Semantic Web Conference (2013)

    Google Scholar 

  18. Sun, L., Park, J., Sandhu, R.: Engineering access control policies for provenance-aware systems. In: Proceedings of the third ACM conference on Data and application security and privacy (CODASPY 2013) (2013)

    Google Scholar 

  19. Lin, G., Bie, Y., Lei, M.: Trust Based Access Control Policy in Multi-domain of Cloud Computing. Journal of Computers 8(5), 1357 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Omar Boucelma .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Lacroix, J., Boucelma, O. (2015). Design and Implementation of a Trust Service for the Cloud. In: Debruyne, C., et al. On the Move to Meaningful Internet Systems: OTM 2015 Conferences. OTM 2015. Lecture Notes in Computer Science(), vol 9415. Springer, Cham. https://doi.org/10.1007/978-3-319-26148-5_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26148-5_42

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26147-8

  • Online ISBN: 978-3-319-26148-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics