A Cloud Computing Security Framework Based on Cloud Security Trusted Authority

被引:1
|
作者
Dawoud, Mohammed M. [1 ]
Ebrahim, Gamal A. [1 ]
Youssef, Sameh A. [1 ]
机构
[1] Ain Shams Univ, Fac Engn, Comp & Syst Engn Dept, Cairo, Egypt
来源
INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016) | 2016年
关键词
Cloud computing; cloud security; cloud service provider; data center; trusted cloud computing;
D O I
10.1145/2908446.2908459
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is a promising technology that provides dynamic resource allocation, power saving, and low running cost. On the other hand, security risks of cloud computing represent a major concern that slows down its market growth. There are many frameworks for handling security risks of cloud computing, most of them trust the cloud service provider and do not focus on the new types of security risks that might face the cloud. Hence, they cannot detect attacks that might come from cloud service provider's side or due to vulnerabilities or attacks at the cloud service provider system. Therefore, a new security framework for cloud computing is introduced in this paper that tries to tackle these problems. Additionally, it is assumed that the introduced framework does not trust the cloud service provider. The introduced framework keeps the sensitive data encrypted at a cloud trusted authority and, hence, the sensitive data are kept away from attacks occurred at the cloud service provider.
引用
收藏
页码:133 / 138
页数:6
相关论文
共 50 条
  • [1] Cloud Computing: Cloud Security to Trusted Cloud
    Wu Jiyi
    Shen Qianli
    Zhang Jianlin
    Xie Qi
    NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 596 - 600
  • [2] Cloud Virtual Machine Lifecycle Security Framework Based on Trusted Computing
    Xin Jin
    Qixu Wang
    Xiang Li
    Xingshu Chen
    Wei Wang
    TsinghuaScienceandTechnology, 2019, 24 (05) : 520 - 534
  • [3] Cloud Virtual Machine Lifecycle Security Framework Based on Trusted Computing
    Jin, Xin
    Wang, Qixu
    Li, Xiang
    Chen, Xingshu
    Wang, Wei
    TSINGHUA SCIENCE AND TECHNOLOGY, 2019, 24 (05) : 520 - 534
  • [4] The Trusted Computing exemplary with Astonishing Security for Cloud Computing
    Devi, Ramya M.
    Balamurugan, P. S.
    Thanushkodi, K.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (01): : 206 - 209
  • [5] Trusted Model for Virtual Machine Security in Cloud Computing
    Narayana, K. Sathya
    Pasupuleti, Syam Kumar
    PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 655 - 665
  • [6] A Security Protection Framework for Cloud Computing
    Zhu, Wenzheng
    Lee, Changhoon
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2016, 12 (03): : 538 - 547
  • [7] A Framework for Security Transparency in Cloud Computing
    Ismail, Umar Mukhtar
    Islam, Shareeful
    Ouedraogo, Moussa
    Weippl, Edgar
    FUTURE INTERNET, 2016, 8 (01)
  • [8] A Framework for Storage Security in Cloud Computing
    Chen, Guoyou
    Miao, Jiajia
    Xie, Feng
    Mao, Handong
    ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING, PTS 1-3, 2013, 278-280 : 1767 - +
  • [9] A Framework for Improving Security in Cloud Computing
    Surbiryala, Jayachander
    Li, Chunlei
    Rong, Chunming
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2017), 2017, : 260 - 264
  • [10] Research on ATN-based trusted cloud computing security model
    Yang, Shaoyu
    Wang, Shiqing
    Journal of Information and Computational Science, 2012, 9 (18): : 5945 - 5952