Security from the transparent computing aspect

Wang,G, Liu,Q, Xiang,Y and Chen,J 2014, Security from the transparent computing aspect, in ICNC 2014 : Proceedings of the 2014 International Conference on Computing, Networking and Communications, IEEE, Piscataway, N.J., pp. 216-220, doi: 10.1109/ICCNC.2014.6785334.

Attached Files
Name Description MIMEType Size Downloads

Title Security from the transparent computing aspect
Author(s) Wang,G
Liu,Q
Xiang,YORCID iD for Xiang,Y orcid.org/0000-0001-5252-0831
Chen,J
Conference name Computing, Networking and Communications. Conference (2014 : Honolulu, Hawaii)
Conference location Honolulu, Hawaii
Conference dates 2014/2/3 - 2014/2/6
Title of proceedings ICNC 2014 : Proceedings of the 2014 International Conference on Computing, Networking and Communications
Editor(s) [Unknown]
Publication date 2014
Conference series Computing, Networking and Communications Conference
Start page 216
End page 220
Total pages 5
Publisher IEEE
Place of publication Piscataway, N.J.
Keyword(s) security architecture
Transparent computing
user-controlled cloud computing
Summary Transparent computing is an emerging computing paradigm where the users can enjoy any kind of service over networks on-demand with any devices, without caring about the underlying deployment details. In transparent computing, all software resources (even the OS) are stored on remote servers, from which the clients can request the resources for local execution in a block-streaming way. This paradigm has many benefits including cross-platform experience, user orientation, and platform independence. However, due to its fundamental features, e.g., separation of computation and storage in clients and servers respectively, and block-streaming-based scheduling and execution, transparent computing faces many new security challenges that may become its biggest obstacle. In this paper, we propose a Transparent Computing Security Architecture (TCSA), which builds user-controlled security for transparent computing by allowing the users to configure the desired security environments on demand. We envision, TCSA, which allows the users to take the initiative to protect their own data, is a promising solution for data security in transparent computing. © 2014 IEEE.
Language eng
DOI 10.1109/ICCNC.2014.6785334
Field of Research 080303 Computer System Security
Socio Economic Objective 890202 Application Tools and System Utilities
HERDC Research category E1 Full written paper - refereed
ERA Research output type E Conference publication
Copyright notice ©2014, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30072052

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 3 times in TR Web of Science
Scopus Citation Count Cited 4 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 287 Abstract Views, 2 File Downloads  -  Detailed Statistics
Created: Thu, 30 Apr 2015, 16:57:45 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.