|1/2017 - 2|
Enhancing Trusted Cloud Computing Platform for Infrastructure as a ServiceKIM, H.
|View the paper record and citations in|
|Click to see author's profile in SCOPUS, IEEE Xplore, Web of Science|
|Download PDF (1,284 KB) | Citation | Downloads: 795 | Views: 2,258|
authentication, communication system security, cryptographic protocols, data security, platform virtualization
computing(17), cloud(17), security(8), trusted(7)
Blue keywords are present in both the references section and the paper title.
About this article
Date of Publication: 2017-02-28
Volume 17, Issue 1, Year 2017, On page(s): 9 - 14
ISSN: 1582-7445, e-ISSN: 1844-7600
Digital Object Identifier: 10.4316/AECE.2017.01002
Web of Science Accession Number: 000396335900002
SCOPUS ID: 85014191578
The characteristics of cloud computing including on-demand self-service, resource pooling, and rapid elasticity have made it grow in popularity. However, security concerns still obstruct widespread adoption of cloud computing in the industry. Especially, security risks related to virtual machine make cloud users worry about exposure of their private data in IaaS environment. In this paper, we propose an enhanced trusted cloud computing platform to provide confidentiality and integrity of the user's data and computation. The presented platform provides secure and efficient virtual machine management protocols not only to protect against eavesdropping and tampering during transfer but also to guarantee the virtual machine is hosted only on the trusted cloud nodes against inside attackers. The protocols utilize both symmetric key operations and public key operations together with efficient node authentication model, hence both the computational cost for cryptographic operations and the communication steps are significantly reduced. As a result, the simulation shows the performance of the proposed platform is approximately doubled compared to the previous platforms. The proposed platform eliminates cloud users' worry above by providing confidentiality and integrity of their private data with better performance, and thus it contributes to wider industry adoption of cloud computing.
|References|||||Cited By «-- Click to see who has cited this paper|
| P. M. Mell and T. Grance, "The NIST definition of cloud computing," National Institute of Standards and Technology, Gaithersburg, MD, NIST SP 800-145, 2011.
 M. Armbrust, I. Stoica, M. Zaharia, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, and A. Rabkin, "A view of cloud computing," Communications of the ACM, vol. 53, no. 4, p. 50, Apr. 2010.
[CrossRef] [Web of Science Times Cited 4347] [SCOPUS Times Cited 6129]
 T. Kaur and I. Chana, "Energy Efficiency Techniques in Cloud Computing: A Survey and Taxonomy," ACM Computing Surveys, vol. 48, no. 2, pp. 1-46, Oct. 2015.
[CrossRef] [Web of Science Times Cited 84] [SCOPUS Times Cited 111]
 M. Ali, S. U. Khan, and A. V. Vasilakos, "Security in cloud computing: Opportunities and challenges," Information Sciences, vol. 305, pp. 357-383, Jun. 2015.
[CrossRef] [Web of Science Times Cited 318] [SCOPUS Times Cited 477]
 C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, "Toward Secure and Dependable Storage Services in Cloud Computing," IEEE Transactions on Services Computing, vol. 5, no. 2, pp. 220-232, Apr. 2012.
[CrossRef] [Web of Science Times Cited 236] [SCOPUS Times Cited 376]
 D. Zissis and D. Lekkas, "Addressing cloud computing security issues," Future Generation Computer Systems, vol. 28, no. 3, pp. 583-592, Mar. 2012.
[CrossRef] [Web of Science Times Cited 773] [SCOPUS Times Cited 1186]
 M. Sookhak, H. Talebian, E. Ahmed, A. Gani, and M. K. Khan, "A review on remote data auditing in single cloud server: Taxonomy and open issues," Journal of Network and Computer Applications, vol. 43, pp. 121-141, Aug. 2014.
[CrossRef] [Web of Science Times Cited 68] [SCOPUS Times Cited 96]
 K. Hashizume, D. G. Rosado, E. Fernández-Medina, and E. B. Fernandez, "An analysis of security issues for cloud computing," Journal of Internet Services and Applications, vol. 4, no. 1, p. 5, 2013.
[CrossRef] [SCOPUS Times Cited 407]
 K. Ren, C. Wang, and Q. Wang, "Security Challenges for the Public Cloud," IEEE Internet Computing, vol. 16, no. 1, pp. 69-73, Jan. 2012.
[CrossRef] [Web of Science Times Cited 370] [SCOPUS Times Cited 501]
 M. H. Song, "Analysis of Risks for Virtualization Technology," Applied Mechanics and Materials, vol. 539, pp. 374-377, Jul. 2014.
[CrossRef] [SCOPUS Times Cited 7]
 F. Zhang and H. Chen, "Security-Preserving Live Migration of Virtual Machines in the Cloud," Journal of Network and Systems Management, vol. 21, no. 4, pp. 562-587, Dec. 2013.
[CrossRef] [Web of Science Times Cited 14] [SCOPUS Times Cited 26]
 N. Santos, K. P. Gummadi, and R. Rodrigues, "Towards trusted cloud computing," Proc. HotCloud'09, Article no. 3, 2009.
 I. Khan, H. Rehman, and Z. Anwar, "Design and Deployment of a Trusted Eucalyptus Cloud," Proc. IEEE cloud computing, 2011, pp. 380-387.
[CrossRef] [SCOPUS Times Cited 34]
 S. Balfe, A. D. Lakhani, and K. G. Paterson, "Trusted Computing: Providing Security for Peer-to-Peer Networks," Proc. IEEE PSP'05, pp. 117-124.
[CrossRef] [Web of Science Times Cited 33] [SCOPUS Times Cited 67]
 D. G. Murray, G. Milos, and S. Hand, "Improving Xen security through disaggregation," Proc. VEE'08, 2008, p. 151.
[CrossRef] [SCOPUS Times Cited 156]
 T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh, "Terra: a virtual machine-based platform for trusted computing," ACM SIGOPS Operating Systems Review, vol. 37, no. 5, p. 193, Dec. 2003.
[CrossRef] [SCOPUS Times Cited 600]
 Wang Han-Zhang and Huang Liu-Sheng, "An improved trusted cloud computing platform model based on DAA and privacy CA scheme," Proc. ICCAMS 2010, 2010, pp. V13-33-V13-39.
[CrossRef] [SCOPUS Times Cited 21]
 Ge Cheng and A. K. Ohoussou, "Sealed storage for trusted cloud computing," Proc. ICCDA 2010, 2010, pp. V5-335-V5-339.
[CrossRef] [SCOPUS Times Cited 9]
 S. R. Pojage and M. A. Pund, "Review of trusted cloud computing platform security," Proc. NCSC2D 2016, pp. 167-172, Feb. 2016.
 B. C. Neuman and T. Ts'o, "Kerberos: an authentication service for computer networks," IEEE Communications Magazine, vol. 32, no. 9, pp. 33-38, Sep. 1994.
[CrossRef] [Web of Science Times Cited 512] [SCOPUS Times Cited 825]
Web of Science® Citations for all references: 6,755 TCR
SCOPUS® Citations for all references: 11,028 TCR
Web of Science® Average Citations per reference: 322 ACR
SCOPUS® Average Citations per reference: 525 ACR
TCR = Total Citations for References / ACR = Average Citations per Reference
We introduced in 2010 - for the first time in scientific publishing, the term "References Weight", as a quantitative indication of the quality ... Read more
Citations for references updated on 2021-07-21 15:56 in 112 seconds.
Note1: Web of Science® is a registered trademark of Clarivate Analytics.
Note2: SCOPUS® is a registered trademark of Elsevier B.V.
Disclaimer: All queries to the respective databases were made by using the DOI record of every reference (where available). Due to technical problems beyond our control, the information is not always accurate. Please use the CrossRef link to visit the respective publisher site.
Faculty of Electrical Engineering and Computer Science
Stefan cel Mare University of Suceava, Romania
All rights reserved: Advances in Electrical and Computer Engineering is a registered trademark of the Stefan cel Mare University of Suceava. No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from the Editor. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Faculty of Electrical Engineering and Computer Science, Stefan cel Mare University of Suceava, Romania, if and only if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.
Permission for other use: The copyright owner's consent does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific written permission must be obtained from the Editor for such copying. Direct linking to files hosted on this website is strictly prohibited.
Disclaimer: Whilst every effort is made by the publishers and editorial board to see that no inaccurate or misleading data, opinions or statements appear in this journal, they wish to make it clear that all information and opinions formulated in the articles, as well as linguistic accuracy, are the sole responsibility of the author.