Openly accessible

Above the trust and security in cloud computing : a notion towards innovation

Ahmed, Mahbub and Xiang, Yang 2010, Above the trust and security in cloud computing : a notion towards innovation, in IEEE/IFIP 2010 : Proceedings of the IEEE/IFIP 8th International Conference Embedded and Ubiquitous Computing 2010, IEEE, Piscataway, N.J., pp. 723-730.

Attached Files
Name Description MIMEType Size Downloads
xiang-abovethetrustandsecurityin-2010.pdf Published version application/pdf 216.89KB 40

Title Above the trust and security in cloud computing : a notion towards innovation
Author(s) Ahmed, Mahbub
Xiang, Yang
Conference name Embedded and Ubiquitous Computing. Conference (8th : 2010 : Hong Kong, China)
Conference location Hong Kong, China
Conference dates 11-13 Dec. 2010
Title of proceedings IEEE/IFIP 2010 : Proceedings of the IEEE/IFIP 8th International Conference Embedded and Ubiquitous Computing 2010
Editor(s) [Unknown]
Publication date 2010
Conference series Embedded and Ubiquitous Computing Conference
Start page 723
End page 730
Total pages 8
Publisher IEEE
Place of publication Piscataway, N.J.
Keyword(s) secure channel
confidentiality
token
mediated authentication
Summary While the nascent Cloud Computing paradigm supported by virtualization has the upward new notion of edges, it lacks proper security and trust mechanisms. Edges are like on demand scalability and infinite resource provisioning as per the `pay-as-you-go' manner in favour of a single information owner (abbreviated as INO from now onwards) to multiple corporate INOs. While outsourcing information to a cloud storage controlled by a cloud service provider (abbreviated as CSP from now onwards) relives an information owner of tackling instantaneous oversight and management needs, a significant issue of retaining the control of that information to the information owner still needs to be solved. This paper perspicaciously delves into the facts of the Cloud Computing security issues and aims to explore and establish a secure channel for the INO to communicate with the CSP while maintaining trust and confidentiality. The objective of the paper is served by analyzing different protocols and proposing the one in commensurate with the requirement of the security property like information or data confidentiality along the line of security in Cloud Computing Environment (CCE). To the best of our knowledge, we are the first to derive a secure protocol by successively eliminating the dangling pitfalls that remain dormant and thereby hamper confidentiality and integrity of information that is worth exchanging between the INO and the CSP. Besides, conceptually, our derived protocol is compared with the SSL from the perspectives of work flow related activities along the line of secure trusted path for information confidentiality.
ISBN 9780769543222
Language eng
Field of Research 080503 Networking and Communications
Socio Economic Objective 890206 Internet Hosting Services (incl. Application Hosting Services)
HERDC Research category E1 Full written paper - refereed
HERDC collection year 2010
Copyright notice ©2010, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30034385

Document type: Conference Paper
Collections: School of Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Access Statistics: 302 Abstract Views, 44 File Downloads  -  Detailed Statistics
Created: Mon, 18 Apr 2011, 17:32:40 EST by Sandra Dunoon

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.