Trust Ticket Deployment: A Notion of a Data Owner's Trust in Cloud Computing

被引:5
作者
Ahmed, Mahbub [1 ]
Xiang, Yang [1 ]
机构
[1] Deakin Univ, Sch Informat Technol, Burwood, Vic 3125, Australia
来源
TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11 | 2011年
关键词
Cloud Computing; Trust Ticket; Trust; Security; Control;
D O I
10.1109/TrustCom.2011.17
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
While cloud computing (CC) is a scalable model of shared infrastructure and on-demand computing, it lacks a transparent trust and security mechanism. A data owner (DO) loses control over the data outsourced to a machine in the cloud controlled and operated by a cloud service provider (CSP). This machine is at a location unknown to a data owner. This loss of control over data is further intensified with the lack of managing users' access to the data from practical cloud computing perspectives. In this paper, we introduce a new mechanism of ensuring trust and security in Software as a Service (SaaS) CC. Trust Ticket, with the supporting protocols, is our mechanism that helps a data owner in establishing a link between a CSP and a registered user. In our mechanism, a user first gets registered with a DO before receiving a Trust Ticket and a secret key from that DO. Each Trust Ticket is unique and encrypted. On completing the registration of each user, the DO apprises the CSP of the Trust Ticket. Trust Ticket and secret key are respectively for the registered user's getting accepted to the CSP and having a view of the data owner's data upon a successful verification by the CSP. We have done our experiment in Java network programming by creating an emulated cloud computing framework under the VMware ESXi 4.1 hypervisor based platform. Using the framework, we have evaluated our algorithmic protocol for Trust Ticket. We have also compared our work with prior work. Overall performance of our work is better. We argue that our proposed algorithmic protocol for Trust Ticket deployment establishes a data owner's trust. This trust is established through a data owner's control over data and a registered user; because a registered user is linked with a CSP by a data owner through Trust Ticket.
引用
收藏
页码:111 / 117
页数:7
相关论文
共 21 条
[1]  
Ahmed M., 2010, Proceedings 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC 2010), P723, DOI 10.1109/EUC.2010.114
[2]  
[Anonymous], J NETWORK COMPUTER A
[3]  
[Anonymous], 2010, Top threats to cloud computing v1.0
[4]  
[Anonymous], 2010, 2010 IEEE 2 INT C CL, DOI DOI 10.1109/CLOUDCOM.2010.66
[5]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[6]   Trust-X:: A peer-to-peer framework for trust establishment [J].
Bertino, E ;
Ferrari, E ;
Squicciarini, AC .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (07) :827-842
[7]  
Chang H, 2010, COMM COM INF SC, V120, P214
[8]  
Chen Y., 2010, U CALIFORNIA BERKELE, P2010
[9]  
Chow R., 2009, Proceedings of the 2009 ACM workshop on Cloud computing security, CCSW '09, P85, DOI DOI 10.1145/1655008.1655020
[10]   Outlook: Cloudy with a Chance of Security Challenges and Improvements [J].
Jaeger, Trent ;
Schiffman, Joshua .
IEEE SECURITY & PRIVACY, 2010, 8 (01) :77-80