Establishing Trust in Cloud Computing

被引:167
作者
Khan, Khaled M. [1 ]
Malluhi, Qutaibah [1 ]
机构
[1] Qatar Univ, Dept Comp Sci & Engn, Doha, Qatar
关键词
certification; cloud computing; control on data; Hybrid cloud computing; information technology; private enclave; reflection of security profile; security and privacy; trust;
D O I
10.1109/MITP.2010.128
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
How can cloud providers earn their customers' trust when a third party is processing sensitive data in a remote machine located in various countries? Emerging technologies can help address the challenges of trust in cloud computing. © 2006 IEEE.
引用
收藏
页码:20 / 26
页数:7
相关论文
共 14 条
[1]  
Blum D., 2009, CLOUD COMPUTING WHO
[2]  
Boles J., 2008, COMPUTERWORLD OCT
[3]   The Information Assurance Practices of Cloud Computing Vendors [J].
Chakraborty, Rajarshi ;
Ramireddy, Srilakshmi ;
Raghu, T. S. ;
Rao, Raghav .
IT PROFESSIONAL, 2010, 12 (04) :29-37
[4]   Trust and control interrelations - New perspectives on the trust-control nexus [J].
Costa, Ana Cristina ;
Bijlsma-Frankema, Katinka .
GROUP & ORGANIZATION MANAGEMENT, 2007, 32 (04) :392-406
[5]  
Dournaee B., 2010, TAKING CONTROL CLOUD
[6]  
Gambetta D., 1988, TRUST MAKING BREAKIN, DOI [DOI 10.2307/591021, 10.2307/2234217]
[7]   Can a Trusted Environment Provide Security? [J].
Kaufman, Lori M. .
IEEE SECURITY & PRIVACY, 2010, 8 (01) :50-52
[8]  
Khan Khaled M., 2009, Cutter IT Journal, V22, P27
[9]   EVOLUTION IN RELATION TO RISK AND TRUST MANAGEMENT [J].
Lund, Mass Soldal ;
Solhaug, Bjornar ;
Stolen, Ketil .
COMPUTER, 2010, 43 (05) :49-55
[10]   In Clouds Shall We Trust? [J].
Michael, Bret .
IEEE SECURITY & PRIVACY, 2009, 7 (05) :3-3