Abstract
With the constant popularization of cloud computing, the importance of security problem is gradually increasing and becomes the important factor which restricts cloud computing development. Currently, combination of cloud computing and trusted computing technology are the main topic on cloud security. In the paper, according to analyzing the research situation of the cloud computing security, a novel trusted cloud computing technology according to the related technology is proposed, and a secure supervising and managing methods by behavioral analysis and service composition is analyzed based on Petri net.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Liu Q (2011) The research of cloud computing services problem. Internet Inf Secur 6:36–37
Shafiq B, Joshi JBD, Bertino E, Ghafoor A (2005) Secure interoperation in a multidomain environment employing RBAC policies. IEEE Trans Knowl Data Eng 17(11):1557–1577
Hong C, Zhang M, Feng DG (2010) A way of ciphertext-access control in cloud storage. Compu Res Dev 47:259–265
Roy I, Ramadan HE, Setty STV, Kilzer A, Shmatikov V, Witchel E, Airavat (2010) Security and privacy for map reduce. In: Proceedings of the 7th Usenix Symposium on networked systems design and implementation, 297–312
Feng DG, Zhang M, Zhang Y, Xu ZH (2011) Research of cloud computing security. J Softw 22(1):71–83
Santos N, Gummadi KP, Rodrigues R (2009) Towards trusted cloud computing. In: Proceedings of the workshop on hot topics in cloud computing 2009, San Diego
Sadeghi AR, Schneider T, Winandy M (2010) Token-based cloud computing: secure outsourcing of data and arbitrary computations with lower latency. In: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing, 417–429
Matthias W, Jan M, Mathias W (2012) Propagating Changes between aligned process models. J Syst Softw, 1885–1898
Monika W, Modood A, Falko K, Frank L, Thomas R, David S (2011) Business process change management based on process model synchronization of multiple abstraction levels. In: 2011 IEEE international conference on service-oriented computing and applications, 1–4
Acknowledgments
We would like to thank the support of the National Natural Science Foundation of China under Grant No.61272153, No.61170059, No.61170172, No.61100058 and No.61073102, Anhui Provincial Soft Science Foundation (12020503031), the Natural Science Foundation of Educational Government of Anhui Province of China (KJ2011A086 and KJ2012A073), Anhui Provincial Natural Science Foundation (1208085MF105), the youth academic backbone foundation of AUST.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, L., Fang, Xw., Liu, Xw., Ji, J. (2013). Study on Security Supervising and Managing Methods of the Trusted Cloud Computing Based on Petri Net. In: Yin, Z., Pan, L., Fang, X. (eds) Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2013. Advances in Intelligent Systems and Computing, vol 212. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37502-6_70
Download citation
DOI: https://doi.org/10.1007/978-3-642-37502-6_70
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-37501-9
Online ISBN: 978-3-642-37502-6
eBook Packages: EngineeringEngineering (R0)