Advertisement

A Trust-Based Data Backup Method on the Cloud

  • Mingtao Lei
  • Wenbin Yao
  • Cong Wang
Part of the Communications in Computer and Information Science book series (CCIS, volume 320)

Abstract

Data backup method may trigger the problem of the security reduction owing to the same data versions stored in different IDCs. To deal with the problem, the paper proposes a trust-based data backup method on the cloud in which trust value is exploited as the foundation to decide that the replica should be stored to the most trusted nodes. Production node calculates the trust value combining with local trust value and mutual trust value before it carries out the operation of backup. The trusted third party(TTP) is introduced to calculate the local trust value. The production node evaluates the mutual trust value based on the interactive evaluation with the available backup nodes. The trust-based data backup method can guarantee that every replica will be stored on the most trusted node during the time nodes trust each other. The proof shows this method is feasible.

Keywords

data backup trust model mutual trust the third trusted party 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Xiong, L., Liu, L.: PeerTrust: Support reputation-based trust for peer-peer-peer electronic communities. IEEE Trans. on Knowledge and Data Engineer 16(7), 843–857 (2004)CrossRefGoogle Scholar
  2. 2.
    Wen, T., Jianbin, H., Zhong, C.: Research on a fuzzy logic-based subjective trust management model. Computer Research and Development 42(10), 1654–1659 (2005) (in Chinese)CrossRefGoogle Scholar
  3. 3.
    Hui, C., Zheng, Q.: Trust model based on focus point space. Journal of Tsinghua University (Science and Technology) 51(11) (2011)Google Scholar
  4. 4.
    Borowski, J.F., et al.: Reputation-Based Trust for a Cooperative Agent-Based Backup Protection Scheme. IEEE Transctions on Smart Grid (2011)Google Scholar
  5. 5.
    Tian, L.-Q., Lin, C., Yang, Y.: Behavior trust computation in distributed network. Computer Engineering and Applications (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Mingtao Lei
    • 1
    • 2
  • Wenbin Yao
    • 1
    • 2
  • Cong Wang
    • 2
  1. 1.School of Computer ScienceBeijing University of Posts and TelecommunicationsBeijingChina
  2. 2.Key Laboratory of Trustworthy Distributed Computing and Service (BUPT)Ministry of EducationBeijingChina

Personalised recommendations