ridm@nrct.go.th   ระบบคลังข้อมูลงานวิจัยไทย   รายการโปรดที่คุณเลือกไว้

Above the trust and security in cloud computing : a notion towards innovation

หน่วยงาน Central Queensland University, Australia

รายละเอียด

ชื่อเรื่อง : Above the trust and security in cloud computing : a notion towards innovation
นักวิจัย : Ahmed, Mahbub. , Xiang, Yang. , Ali, Shawkat.
คำค้น : LIBRARY OF CONGRESS NEEDED , Confidentiality -- Mediated authnetication -- Secure channel -- Token
หน่วยงาน : Central Queensland University, Australia
ผู้ร่วมงาน : -
ปีพิมพ์ : 2553
อ้างอิง : http://hdl.cqu.edu.au/10018/58613
ที่มา : Ahmed, M, Xiang, Y & Shawkat Ali, ABM 2010, 'Above the trust and security in cloud computing: a notion towards innovation', in IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), 2010, IEEE, Hong Kong, China, pp. 723-730. http://dx.doi.org/10.1109/EUC.2010.114
ความเชี่ยวชาญ : -
ความสัมพันธ์ : Proceedings - IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2010 Los Alamitos, CA : IEEE/IFIP, 2010. p. 723-730 8 pages Refereed 9781424497195 , ACQUIRE [electronic resource] : Central Queensland University Institutional Repository.
ขอบเขตของเนื้อหา : -
บทคัดย่อ/คำอธิบาย :

While the nascent Cloud Computing paradigm supported by virtualization has the upward new notion of edges, it lacks proper security and trust mechanisms. Edges are like on demand scalability and infinite resource provisioning as per the ‘pay-as-you-go’ manner in favour of a single information owner (abbreviated as INO from now onwards) to multiple corporate INOs. While outsourcing information to a cloud storage controlled by a cloud service provider (abbreviated as CSP from now onwards) relives an information owner of tackling instantaneous oversight and management needs, a significant issue of retaining the control of that information to the information owner still needs to be solved. This paper perspicaciously delves into the facts of the Cloud Computing security issues and aims to explore and establish a secure channel for the INO to communicate with the CSP while maintaining trust and confidentiality. The objective of the paper is served by analyzing different protocols and proposing the one in commensurate with the requirement of the security property like information or data confidentiality along the line of security in Cloud Computing Environment (CCE). To the best of our knowledge, we are the first to derive a secure protocol by successively eliminating the dangling pitfalls that remain dormant and thereby hamper confidentiality and integrity of information that is worth exchanging between the INO and the CSP. Besides, conceptually, our derived protocol is compared with the SSL from the perspectives of work flow related activities along the line of secure trusted path for information confidentiality.

บรรณานุกรม :
Ahmed, Mahbub. , Xiang, Yang. , Ali, Shawkat. . (2553). Above the trust and security in cloud computing : a notion towards innovation.
    กรุงเทพมหานคร : Central Queensland University, Australia.
Ahmed, Mahbub. , Xiang, Yang. , Ali, Shawkat. . 2553. "Above the trust and security in cloud computing : a notion towards innovation".
    กรุงเทพมหานคร : Central Queensland University, Australia.
Ahmed, Mahbub. , Xiang, Yang. , Ali, Shawkat. . "Above the trust and security in cloud computing : a notion towards innovation."
    กรุงเทพมหานคร : Central Queensland University, Australia, 2553. Print.
Ahmed, Mahbub. , Xiang, Yang. , Ali, Shawkat. . Above the trust and security in cloud computing : a notion towards innovation. กรุงเทพมหานคร : Central Queensland University, Australia; 2553.