CCBKE - Session key negotiation for fast and secure scheduling of scientific applications in cloud computing

被引:18
作者
Liu, Chang [1 ]
Zhang, Xuyun [1 ]
Yang, Chi [2 ]
Chen, Jinjun [1 ]
机构
[1] Univ Technol Sydney, Fac Engn & Informat Technol, Sydney, NSW 2007, Australia
[2] Univ Western Australia, Sch Comp Sci & Software Engn, Nedlands, WA 6009, Australia
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2013年 / 29卷 / 05期
基金
澳大利亚研究理事会;
关键词
Hybrid environment; Cloud computing; Scheduling; Efficiency; Communication security; Authenticated key exchange; PROTOCOL; PKI;
D O I
10.1016/j.future.2012.07.001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Instead of purchasing and maintaining their own computing infrastructure, scientists can now run data-intensive scientific applications in a hybrid environment such as cloud computing by facilitating its vast storage and computation capabilities. During the scheduling of such scientific applications for execution, various computation data flows will happen between the controller and computing server instances. Amongst various quality-of-service (QoS) metrics, data security is always one of the greatest concerns to scientists because their data may be intercepted or stolen by malicious parties during those data flows, especially for less secure hybrid cloud systems. An existing typical method for addressing this issue is to apply the Internet Key Exchange (IKE) scheme to generate and exchange session keys, and then to apply these keys for performing symmetric-key encryption which will encrypt those data flows. However, the IKE scheme suffers from low efficiency due to its asymmetric-key cryptological operations over a large amount of data and high-density operations which are exactly the characteristics of scientific applications. In this paper, we propose Cloud Computing Background Key Exchange (CCBKE), a novel authenticated key exchange scheme that aims at efficient security-aware scheduling of scientific applications. Our scheme is designed based on the randomness-reuse strategy and the Internet Key Exchange (IKE) scheme. Theoretical analyses and experimental results demonstrate that, compared with the IKE scheme, our CCBKE scheme can significantly improve the efficiency by dramatically reducing time consumption and computation load without sacrificing the level of security. (c) 2012 Elsevier B.V. All rights reserved.
引用
收藏
页码:1300 / 1308
页数:9
相关论文
共 39 条
  • [1] [Anonymous], 2009, P 41 ANN ACM S THEOR
  • [2] [Anonymous], 1 WORKSH CLOUD COMP
  • [3] [Anonymous], 2008, Philippine Rats: Ecology and Management, DOI DOI 10.1109/SC.2008.5217932
  • [4] [Anonymous], UCBEECS200928
  • [5] [Anonymous], 2009, Cloud security and privacy: An Enterprise Perspective on Risks and Compliance (Theory in Practice)
  • [6] [Anonymous], AUSTR TEL
  • [7] Bellare M, 2003, P 6 INT WORKSH THEOR
  • [8] Boldyreva A, 2007, LECT NOTES COMPUT SC, V4450, P458
  • [9] Bresson E., 2002, P INT C THEOR APPL C
  • [10] Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
    Buyya, Rajkumar
    Yeo, Chee Shin
    Venugopal, Srikumar
    Broberg, James
    Brandic, Ivona
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2009, 25 (06): : 599 - 616