Trust Evaluation Strategy for Single Sign-on Solution in Cloud
In order to solve the security problems like single point failure, maliciously access or even destruction of the authorizing node that was caused by the lack of knowledge of trust evaluation of interactional nodes, this article proposes a trust evaluation strategy for single sign-on solutions in the...
Saved in:
Published in | International journal of digital crime and forensics Vol. 10; no. 1; pp. 1 - 11 |
---|---|
Main Authors | , , , , , , |
Format | Journal Article |
Language | English |
Published |
Hershey
IGI Global
01.01.2018
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | In order to solve the security problems like single point failure, maliciously access or even destruction of the authorizing node that was caused by the lack of knowledge of trust evaluation of interactional nodes, this article proposes a trust evaluation strategy for single sign-on solutions in the cloud. The strategy improved the D-S evidence theory to verify the security of the peer nodes in cloud, including the calculation, combination and transfer of the direct trust and recommended trust. This solved the security problems brought on by evidence conflicts in trust combination and provides security insurance for single sign-on solutions in the cloud. |
---|---|
ISSN: | 1941-6210 1941-6229 |
DOI: | 10.4018/IJDCF.2018010101 |