Node Verification to Join the Cloud Environment Using Third Party Verification Server
DOI:
https://doi.org/10.3991/ijim.v11i4.6501Keywords:
Cloud computing, Cloud security, Network security, Node scanning.Abstract
Currently, cloud computing is facing different types of threats whether from inside or outside its environment. This may cause cloud to be crashed or at least unable to provide services to the requests made by clients. In this paper, a new technique is proposed to make sure that the new node which asks to join the cloud is not composing a threat on the cloud environment. Our new technique checks the node before it will be guaranteed to join the cloud whether it runs malwares or software that could be used to launch an attack. In this way the cloud will allow only the clean node to join it, eliminating the risk of some types of threats that could be caused by infected nodes.
Downloads
Published
2017-05-22
How to Cite
Aljammal, A. H., Bani-Salameh, H., Alsarhan, A., Kharabsheh, M., & Obiedat, M. (2017). Node Verification to Join the Cloud Environment Using Third Party Verification Server. International Journal of Interactive Mobile Technologies (iJIM), 11(4), pp. 55–65. https://doi.org/10.3991/ijim.v11i4.6501
Issue
Section
Papers