Node Verification to Join the Cloud Environment Using Third Party Verification Server

Ashraf Hamdan Aljammal, Hani Bani-Salameh, Ayoub Alsarhan, Mohammad Kharabsheh, Mamoon Obiedat


Currently, cloud computing is facing different types of threats whether from inside or outside its environment.  This may cause cloud to be crashed or at least unable to provide services to the requests made by clients. In this paper, a new technique is proposed to make sure that the new node which asks to join the cloud is not composing a threat on the cloud environment. Our new technique checks the node before it will be guaranteed to join the cloud whether it runs malwares or software that could be used to launch an attack. In this way the cloud will allow only the clean node to join it, eliminating the risk of some types of threats that could be caused by infected nodes.


Cloud computing, Cloud security, Network security, Node scanning.

Full Text:


International Journal of Interactive Mobile Technologies (iJIM) – eISSN: 1865-7923
Creative Commons License
Scopus logo IET Inspec logo DBLP logo EBSCO logo Ulrich's logo MAS logo