The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Trust Evaluation Strategy for Single Sign-on Solution in Cloud
|
Author(s): Guangxuan Chen (Zhejiang Police College, Institute of Software Application Technology, CAS, Guangzhou, China), Liping Ding (Digital Forensics Lab, Institute of Software Application Technology, CAS, Guangzhou, China), Jin Du (Digital Forensics Lab, Institute of Software Application Technology, CAS, Guangzhou, China), Guomin Zhou (Zhejiang Police College, Guangzhou, China), Panke Qin (Henan Polytechnic University, Jiaozuo, China), Guangxiao Chen (Universidad Carlos III de Madrid, Madrid, Spain)and Qiang Liu (Zhejiang Police College, Guangzhou, China)
Copyright: 2018
Volume: 10
Issue: 1
Pages: 11
Source title:
International Journal of Digital Crime and Forensics (IJDCF)
Editor(s)-in-Chief: Feng Liu (Chinese Academy of Sciences, China)
DOI: 10.4018/IJDCF.2018010101
Purchase
|
Abstract
In order to solve the security problems like single point failure, maliciously access or even destruction of the authorizing node that was caused by the lack of knowledge of trust evaluation of interactional nodes, this article proposes a trust evaluation strategy for single sign-on solutions in the cloud. The strategy improved the D-S evidence theory to verify the security of the peer nodes in cloud, including the calculation, combination and transfer of the direct trust and recommended trust. This solved the security problems brought on by evidence conflicts in trust combination and provides security insurance for single sign-on solutions in the cloud.
Related Content
Shakir A. Mehdiyev, Tahmasib Kh. Fataliyev.
© 2024.
17 pages.
|
Fuhai Jia, Yanru Jia, Jing Li, Zhenghui Liu.
© 2024.
13 pages.
|
Dawei Zhang.
© 2024.
16 pages.
|
Yuwen Zhu, Lei Yu.
© 2023.
16 pages.
|
Vijay Kumar, Sahil Sharma, Chandan Kumar, Aditya Kumar Sahu.
© 2023.
14 pages.
|
Wenjun Yao, Ying Jiang, Yang Yang.
© 2023.
20 pages.
|
Dawei Zhang.
© 2023.
14 pages.
|
|
|