Trust ticket deployment : a notion of a data owner's trust in cloud computing

Ahmed, Mahbub and Xiang, Yang 2011, Trust ticket deployment : a notion of a data owner's trust in cloud computing, in TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, [Changsha, China], pp. 111-117.

Attached Files
Name Description MIMEType Size Downloads

Title Trust ticket deployment : a notion of a data owner's trust in cloud computing
Author(s) Ahmed, Mahbub
Xiang, Yang
Conference name International Conference on Trust, Security and Privacy in Computing and Communications (10th : 2011 : Changsha, China)
Conference location Changsha, China
Conference dates 16-18 Nov. 2011
Title of proceedings TRUSTCOM 2011 : International Conference on Trust, Security and Privacy in Computing and Communications
Editor(s) [Unknown]
Publication date 2011
Conference series IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Start page 111
End page 117
Total pages 7
Publisher IEEE
Place of publication [Changsha, China]
Keyword(s) cloud computing
trust ticket
trust
security
control
Summary While cloud computing (CC) is a scalable model of shared infrastructure and on-demand computing, it lacks a transparent trust and security mechanism. A data owner (DO) loses control over the data outsourced to a machine in the cloud controlled and operated by a cloud service provider (CSP). This machine is at a location unknown to a data owner. This loss of control over data is further intensified with the lack of managing users' access to the data from practical cloud computing perspectives. In this paper, we introduce a new mechanism of ensuring trust and security in Software as a Service (SaaS) CC. Trust Ticket, with the supporting protocols, is our mechanism that helps a data owner in establishing a link between a CSP and a registered user. In our mechanism, a user first gets registered with a DO before receiving a Trust Ticket and a secret key from that DO. Each Trust Ticket is unique and encrypted. On completing the registration of each user, the DO apprises the CSP of the Trust Ticket. Trust Ticket and secret key are respectively for the registered user's getting accepted to the CSP and having a view of the data owner's data upon a successful verification by the CSP. We have done our experiment in Java network programming by creating an emulated cloud computing framework under the VMware ESXi 4.1 hyper visor based platform. Using the framework, we have evaluated our algorithmic protocol for Trust Ticket. We have also compared our work with prior work. Overall performance of our work is better. We argue that our proposed algorithmic protocol for Trust Ticket deployment establishes a data owner's trust. This trust is established through a data owner's control over data and a registered user, because a registered user is linked with a CSP by a data owner through Trust Ticket.
ISBN 145772135X
9781457721359
Language eng
Field of Research 080503 Networking and Communications
Socio Economic Objective 890201 Application Software Packages (excl. Computer Games)
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2011, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30042212

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 72 Abstract Views, 6 File Downloads  -  Detailed Statistics
Created: Tue, 14 Feb 2012, 15:17:35 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.