Skip to main content

Study on Security Supervising and Managing Methods of the Trusted Cloud Computing Based on Petri Net

  • Conference paper
  • First Online:
Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2013

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 212))

  • 852 Accesses

Abstract

With the constant popularization of cloud computing, the importance of security problem is gradually increasing and becomes the important factor which restricts cloud computing development. Currently, combination of cloud computing and trusted computing technology are the main topic on cloud security. In the paper, according to analyzing the research situation of the cloud computing security, a novel trusted cloud computing technology according to the related technology is proposed, and a secure supervising and managing methods by behavioral analysis and service composition is analyzed based on Petri net.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Liu Q (2011) The research of cloud computing services problem. Internet Inf Secur 6:36–37

    Google Scholar 

  2. Shafiq B, Joshi JBD, Bertino E, Ghafoor A (2005) Secure interoperation in a multidomain environment employing RBAC policies. IEEE Trans Knowl Data Eng 17(11):1557–1577

    Article  Google Scholar 

  3. Hong C, Zhang M, Feng DG (2010) A way of ciphertext-access control in cloud storage. Compu Res Dev 47:259–265

    Google Scholar 

  4. Roy I, Ramadan HE, Setty STV, Kilzer A, Shmatikov V, Witchel E, Airavat (2010) Security and privacy for map reduce. In: Proceedings of the 7th Usenix Symposium on networked systems design and implementation, 297–312

    Google Scholar 

  5. Feng DG, Zhang M, Zhang Y, Xu ZH (2011) Research of cloud computing security. J Softw 22(1):71–83

    Article  Google Scholar 

  6. Santos N, Gummadi KP, Rodrigues R (2009) Towards trusted cloud computing. In: Proceedings of the workshop on hot topics in cloud computing 2009, San Diego

    Google Scholar 

  7. Sadeghi AR, Schneider T, Winandy M (2010) Token-based cloud computing: secure outsourcing of data and arbitrary computations with lower latency. In: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, 417–429

    Google Scholar 

  8. Matthias W, Jan M, Mathias W (2012) Propagating Changes between aligned process models. J Syst Softw, 1885–1898

    Google Scholar 

  9. Monika W, Modood A, Falko K, Frank L, Thomas R, David S (2011) Business process change management based on process model synchronization of multiple abstraction levels. In: 2011 IEEE international conference on service-oriented computing and applications, 1–4

    Google Scholar 

Download references

Acknowledgments

We would like to thank the support of the National Natural Science Foundation of China under Grant No.61272153, No.61170059, No.61170172, No.61100058 and No.61073102, Anhui Provincial Soft Science Foundation (12020503031), the Natural Science Foundation of Educational Government of Anhui Province of China (KJ2011A086 and KJ2012A073), Anhui Provincial Natural Science Foundation (1208085MF105), the youth academic backbone foundation of AUST.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lu Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, L., Fang, Xw., Liu, Xw., Ji, J. (2013). Study on Security Supervising and Managing Methods of the Trusted Cloud Computing Based on Petri Net. In: Yin, Z., Pan, L., Fang, X. (eds) Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2013. Advances in Intelligent Systems and Computing, vol 212. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37502-6_70

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37502-6_70

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37501-9

  • Online ISBN: 978-3-642-37502-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics