ARTÍCULO
TITULO

Node Verification to Join the Cloud Environment Using Third Party Verification Server

Ashraf Hamdan Aljammal    
Hani Bani-Salameh    
Ayoub Alsarhan    
Mohammad Kharabsheh    
Mamoon Obiedat    

Resumen

Currently, cloud computing is facing different types of threats whether from inside or outside its environment.  This may cause cloud to be crashed or at least unable to provide services to the requests made by clients. In this paper, a new technique is proposed to make sure that the new node which asks to join the cloud is not composing a threat on the cloud environment. Our new technique checks the node before it will be guaranteed to join the cloud whether it runs malwares or software that could be used to launch an attack. In this way the cloud will allow only the clean node to join it, eliminating the risk of some types of threats that could be caused by infected nodes.

 Artículos similares

       
 
Qingxi Yang, Gongbo Li, Weilei Mu, Guijie Liu and Hailiang Sun    
The reconstruction algorithm for the probabilistic inspection of damage (RAPID) is aimed at localizing structural damage via the signal difference coefficient (SDC) between the signals of the present and reference conditions. However, tomography is only ... ver más