Privacy Preserved Entrust Mechanism in Cloud Computing Environment

被引:0
|
作者
Park, Jongyoul [1 ]
Lee, Seungyun [1 ]
机构
[1] Elect & Telecommun Res Inst, Taejon 305700, South Korea
来源
2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT) | 2012年
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing technology enables service to add special characteristics such as remote execution, service mobility and virtual workspace in a handheld device. However, it has a limitation on application areas for the reason that mobile applications distinctly need a help of the host computer. To eliminate those threats, hash chain based approaches are proposed [1][2]. However, it also has some restriction that a mobile device sends request messages to each server when the device needs a multi-entity co-operative work. Therefore, this paper introduces a concept of secure entrustment, which provides most near and trusted servers whenever your mobile devices want to use a trusted computing.
引用
收藏
页码:653 / 658
页数:6
相关论文
共 50 条
  • [1] Privacy preserving in cloud computing environment
    Zou, Deqing
    Xiang, Yang
    Min, Geyong
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (15) : 2752 - 2753
  • [2] Privacy-Preserved Access Control for Cloud Computing
    Zhou, Miao
    Mu, Yi
    Susilo, Willy
    Au, Man Ho
    Yan, Jun
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 83 - 90
  • [3] Privacy Mechanism for Applications in Cloud Computing
    Paredes, L. N. G.
    Zorzo, S. D.
    IEEE LATIN AMERICA TRANSACTIONS, 2012, 10 (01) : 1402 - 1407
  • [4] Review of Security and Privacy Techniques in Cloud Computing Environment
    Mote, Rutuja
    Pawar, Ambika
    Dani, Ajay
    PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS: VOL 1, 2016, 50 : 543 - 551
  • [5] Analysing Security and Privacy Management For Cloud Computing Environment
    Gourkhede, Manish H.
    Theng, Deepti P.
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 677 - 680
  • [6] A Scheme of Memory Privacy Protection in Cloud Computing Environment
    LIU Kehao
    CAO Ming
    FU Nan
    MA Jing
    WuhanUniversityJournalofNaturalSciences, 2015, 20 (04) : 307 - 312
  • [7] Towards Developing Privacy-Preserved Data Security Approach (PP-DSA) in Cloud Computing Environment
    Stewart Kirubakaran S.
    Arunachalam V.P.
    Karthik S.
    Kannan S.
    Computer Systems Science and Engineering, 2023, 44 (03): : 1881 - 1895
  • [8] Privacy protection mechanism in grid computing environment
    Li, MC
    Yao, HY
    Guo, C
    Zhang, N
    EC2ND 2005, PROCEEDINGS, 2006, : 33 - +
  • [9] Analytical Evaluation of k-Anonymity Algorithm and ε-Differential Privacy Mechanism in Cloud Computing Environment
    Razaque, Abdul
    Frej, Mohamed Ben Haj
    Huang Yiming
    Yan Shilin
    2019 3RD IEEE INTERNATIONAL CONFERENCE ON CLOUD AND FOG COMPUTING TECHNOLOGIES AND APPLICATIONS (IEEE CLOUD SUMMIT 2019), 2019, : 103 - 109
  • [10] A New Heuristic Anonymization Technique for Privacy Preserved Datasets Publication on Cloud Computing
    Yousra, S. Aldeen
    Mazleena, Salleh
    IBN AL-HAITHAM FIRST INTERNATIONAL SCIENTIFIC CONFERENCE, 2018, 1003