Trust Evaluation Strategy for Single Sign-on Solution in Cloud

In order to solve the security problems like single point failure, maliciously access or even destruction of the authorizing node that was caused by the lack of knowledge of trust evaluation of interactional nodes, this article proposes a trust evaluation strategy for single sign-on solutions in the...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of digital crime and forensics Vol. 10; no. 1; pp. 1 - 11
Main Authors Chen, Guangxuan, Ding, Liping, Du, Jin, Zhou, Guomin, Qin, Panke, Chen, Guangxiao, Liu, Qiang
Format Journal Article
LanguageEnglish
Published Hershey IGI Global 01.01.2018
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In order to solve the security problems like single point failure, maliciously access or even destruction of the authorizing node that was caused by the lack of knowledge of trust evaluation of interactional nodes, this article proposes a trust evaluation strategy for single sign-on solutions in the cloud. The strategy improved the D-S evidence theory to verify the security of the peer nodes in cloud, including the calculation, combination and transfer of the direct trust and recommended trust. This solved the security problems brought on by evidence conflicts in trust combination and provides security insurance for single sign-on solutions in the cloud.
ISSN:1941-6210
1941-6229
DOI:10.4018/IJDCF.2018010101