Search WWW Search
»Journal Description
»Call for Papers and Reviewers
»Author Guidelines
»Contents & Papers
»Call for Special Issues

Trusted Computing Model with Attestation to Assure Security for Software Services in a Cloud Environment


Udhayakumar Shanmugam1*,Latha Tamilselvan2


1School of Computer, Information and Mathematical Science, B.S. Abdur Rahman University, Vandalur, Chennai 600048, Tamil Nadu, India
2Department of Information Technology, School of Computer, Information and Mathematical Science, B.S. Abdur Rahman University, Vandalur, Chennai 600048, Tamil Nadu, India


Predicting the behavioural patterns of an ambiguous environment is a complex task that could risk the integrity of security architecture if left unnoticed. One such ambiguous environment is the cloud computing paradigm where computations are executed remotely in geographically dispersed decentralized data centers, and access to resources distributed beyond a definable and controlled perimeter. Nevertheless, the consumer’s confidence in dependable and trustworthy services is still uncertain as a result of security concerns encompassing the cloud. Deploying trusted computing models that can assure security could considerably improve the average consumer’s perspective. Our proposed model emphasises an attestation procedure for trust evaluation, measuring and auditing the integrity of the system through a body of evidence. The model implements an attestation rule engine based on a Cloud Attestation Protocol (CAP). The approach for monitoring the behaviour and certifying it for attestation enables the users to select the services with trustworthiness.


Trusted cloud computing, Service attestation, QoS trust evaluation, Cloud security, Attestation as a service.

Full Text:

  1. L. Leong, D. Toombs and B. Gill, “Worldwide Survey of Cloud Infrastructure Service Providers”, in by Gartner, 2015.
  2. P. Rudlin, “Personal data in the cloud: A global survey of consumer attitudes”, A White Paper on survey on cloud computing, Fujitsu Research Institute, 2013.
  3. J. Laundrup, M. Pohlman and D. Fielder, "Security Guidance for Critical Areas of Focus in Cloud Computing v3.0”, Security Guidance Working Group of Cloud Security Alliance, 2011.
  4. Trusted Multi-Tenant Infrastructure Reference Framework, a reference manual from Trusted Computing Group, 2013.
  5. J. Huang and D. Nicol, “Trust mechanisms for cloud computing”, in Journal of Cloud Computing Advances, Systems and Applications, 2013.
  6. S. M. Habib, “Trust as a facilitator in cloud computing: a survey”, in Journal of Cloud Computing: Advances, Systems, Applications, 2012.
  7. W. Xu, Z. Hu, and J. Pierre, “Remote Attestation with Domain-based Integrity Model and Policy Analysis”, in IEEE Transaction on Dependable and Secure Computing, pp. 429-442, 2012.
  8. J. Du, N. Shah and X. Gu, “Adaptive Data-Driven Service Integrity Attestation for Multi-Tenant Cloud Systems”, in Proceedings of the Nineteenth International Workshop on Quality of Service, 2011.
  9. S. Udhayakumar, S. Chandrasekaran, T. Latha and A. Fareez, “An Adaptive Trust Model for Software Services in Hybrid Cloud Environment”, Recent Researches in Computer Science, Proceeding on 15th WSEAS International Conference on Computers, pp. 497-502, 2011.
  10. F. Ishmanov and S. W. Kim, “ A Novel Trust Establishment Method for Wireless Sensor Networks”, in KSII Transactions on Internet and Information Systems, pp.1529-1547, Vol.9, 2015.
  11. M Zhang, C. Xu, J. Guan, R. Zheng, Q. wu and H. Zhang, “A Novel Bio-inspired Trusted Routing Protocol for Mobile Wireless Sensor Networks”, Transaction on Internet and Information Systems, vol. 8, no. 1, pp. 74-90, 2014.
  12. A. Kumar, K. Gopal and A. Aggarwal, “Design and Analysis of Lightweight Trust Mechanism for Accessing Data in MANETs”, Transaction on Internet and Information Systems, Vol. 8, no. 3, pp. 1119-1143, 2014.
  13. K. Saravanan and M. Rajaram, “An Exploratory Study of Cloud Service Level Agreements - State of the Art Review”, in KSII Transactions on Internet and Information Systems, Vol. 9, No.3, pp.843-869, 2015.
  14. M. Hogan, F Lui, A. Sokol and J. Tong, “NIST Cloud Computing Standards Roadmap Version 1.0”, in Special Publication 500‐291 of National Institute of Standards and Technology , 2011.
  15. T. Evangelos and H.M. Stuart, “Using The Analytic Hierarchy Process For Decision Making In Engineering Applications”, in International Journal of Industrial Engineering: Applications, Vol. 2, No.1, pp. 35-44, 1995.
  16. H. Chen, J. Chen, W. Mao and F. Yan, “Grid Security from Two Levels of Virtualization”, in Elsevier Journal of Information Security Technical Report, Vol. 12, pp. 123-138, Elsevier, 2007
  17. G Coker, J. Guttman and P. Loscocco, et al., “Principles of remote attestation”, in International Journal of Information Security, Vol. 10, Issue 2, pp. 63-81, June 2011.
  18. G. Atoosai and M. G. Arani, “A Trust Model Based on Quality of Service in Cloud Computing Environment”, In International Journal of Database Theory and Application, Vol.8, No.5, pp.161-170, 2015.
  19. K. Gokulnath and R. Uthariaraj, “Game Theory Based Trust Model for Cloud Environment”, In the Scientific World Journal, Hindawi Publishing Corporation, Volume 2015.
  20. C. Hang and M. Singh “Trustworthy service selection and composition”, In ACM Transactions on Autonomous and Adaptive Systems, Vol. 6. Article 5, 2011.
  21. S. Udhayakumar and T. Latha, “A Cooperative Trust Model with Adaptive Migration for Secure Cloud Services”, In Advances in Information Sciences and Service Sciences, Volume 6, Number 6, December, pp. 37-47, 2014.

INASS Home | Copyright@2008 The Intelligent Networks and Systems Society