Enhancing Trusted Cloud Computing Platform for Infrastructure as a Service

被引:6
作者
Kim, Heeyoul [1 ]
机构
[1] Kyonggi Univ, Dept Comp Sci, Suwon 443760, South Korea
基金
新加坡国家研究基金会;
关键词
authentication; communication system security; cryptographic protocols; data security; platform virtualization; SECURITY ISSUES; CHALLENGES;
D O I
10.4316/AECE.2017.01002
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The characteristics of cloud computing including on-demand self-service, resource pooling, and rapid elasticity have made it grow in popularity. However, security concerns still obstruct widespread adoption of cloud computing in the industry. Especially, security risks related to virtual machine make cloud users worry about exposure of their private data in IaaS environment. In this paper, we propose an enhanced trusted cloud computing platform to provide confidentiality and integrity of the user's data and computation. The presented platform provides secure and efficient virtual machine management protocols not only to protect against eavesdropping and tampering during transfer but also to guarantee the virtual machine is hosted only on the trusted cloud nodes against inside attackers. The protocols utilize both symmetric key operations and public key operations together with efficient node authentication model, hence both the computational cost for cryptographic operations and the communication steps are significantly reduced. As a result, the simulation shows the performance of the proposed platform is approximately doubled compared to the previous platforms. The proposed platform eliminates cloud users' worry above by providing confidentiality and integrity of their private data with better performance, and thus it contributes to wider industry adoption of cloud computing.
引用
收藏
页码:9 / 14
页数:6
相关论文
共 20 条
[1]   Security in cloud computing: Opportunities and challenges [J].
Ali, Mazhar ;
Khan, Samee U. ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2015, 305 :357-383
[2]  
[Anonymous], 2009, HOTCLOUD
[3]  
[Anonymous], 2011, NIST SP
[4]   A View of Cloud Computing [J].
Armbrust, Michael ;
Fox, Armando ;
Griffith, Rean ;
Joseph, Anthony D. ;
Katz, Randy ;
Konwinski, Andy ;
Lee, Gunho ;
Patterson, David ;
Rabkin, Ariel ;
Stoica, Ion ;
Zaharia, Matei .
COMMUNICATIONS OF THE ACM, 2010, 53 (04) :50-58
[5]   Trusted computing: Providing security for Peer-to-Peer networks [J].
Balfe, S ;
Lakhani, AD ;
Paterson, KG .
FIFTH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2005, :117-124
[6]  
Cheng G., 2010, P INT C COMP DES APP, DOI [10.1109/ICCDA.2010.5541060, DOI 10.1109/ICCDA.2010.5541060]
[7]  
Garfinkel T., 2003, Operating Systems Review, V37, P193, DOI 10.1145/1165389.945464
[8]  
Han-zhang W., 2010, International Conference on Computer Application and System Modeling (ICCASM), V13, pV13
[9]   An analysis of security issues for cloud computing [J].
Hashizume, Keiko ;
Rosado, David G. ;
Fernandez-Medina, Eduardo ;
Fernandez, Eduardo B. .
JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2013, 4 (01) :1-13
[10]   Energy Efficiency Techniques in Cloud Computing: A Survey and Taxonomy [J].
Kaur, Tarandeep ;
Chana, Inderveer .
ACM COMPUTING SURVEYS, 2015, 48 (02)