We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

A Modified Trusted Cloud Computing Architecture based on Third Party Auditor (TPA) Private Key Mechanism

by R. Ushadevi, V. Rajamani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 58 - Number 22
Year of Publication: 2012
Authors: R. Ushadevi, V. Rajamani
10.5120/9428-3450

R. Ushadevi, V. Rajamani . A Modified Trusted Cloud Computing Architecture based on Third Party Auditor (TPA) Private Key Mechanism. International Journal of Computer Applications. 58, 22 ( November 2012), 5-9. DOI=10.5120/9428-3450

@article{ 10.5120/9428-3450,
author = { R. Ushadevi, V. Rajamani },
title = { A Modified Trusted Cloud Computing Architecture based on Third Party Auditor (TPA) Private Key Mechanism },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 58 },
number = { 22 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 5-9 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume58/number22/9428-3450/ },
doi = { 10.5120/9428-3450 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:03:10.652264+05:30
%A R. Ushadevi
%A V. Rajamani
%T A Modified Trusted Cloud Computing Architecture based on Third Party Auditor (TPA) Private Key Mechanism
%J International Journal of Computer Applications
%@ 0975-8887
%V 58
%N 22
%P 5-9
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A modified security mechanism for cloud computing environment based on private key mechanism is presented in this paper. Typically, users will know neither the exact location of their data nor the other sources of the data collectively stored with theirs. The data can find in a cloud ranges from public sources which have minimal security concerns to private data containing which has highly sensitive information (such as social security numbers, medical records, or shipping manifests for hazardous material). It provides trust-overlay network over multiple data centers to implement a reputation system for establishing trust between service providers and data owners. To overcome these problems, data coloring and watermarking techniques are used to protect shared data objects and massively distributed software modules. These techniques safeguard multi-way authentications, enable single sign-on in the cloud, and tighten access control for sensitive data in both public and private clouds.

References
  1. Hui Zheng "Cloud computing and its benefits" IT 103-005.
  2. L. Xiong and L. Liu, "Peer Trust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic communities," IEEE Trans. Knowledge and Data Eng. , July 2004, pp. 843–857.
  3. K. Hang, S. Kulkarni, and Y. Hu, "Cloud Security with Virtualized Defense and Reputation-Based Trust Management" IEEE Int'l Conf. Dependable, Autonomic and Secure Computing, IEEECS Press, 2009.
  4. Kyle Whitney "Security in Cloud" ITEC 620 Apr 8 ,2012.
  5. "Security Guidance for critical areas of focus in cloud computing," Cloud Security Alliance, apr. 2009; www. cloudsecurityalliance. org/guidance/csaguide. v. 2. 1. pdf.
  6. J. Rittinghouse and J. Ransome, Cloud Computing: Implementation, Management and Security, CRC Pub- lisher, 2010.
  7. S. Song et al. ,"Trusted P2P Tracsactions with Fuzzy Reputation Aggregation," IEEE internet computing, vol 9, no. 6, 2005, pp. 24 -34.
  8. J. Nick, "Journey to the Private Cloud: Security and Compliance," tech. presentation, EMC, Tsinghua Univ. , 25 May 2010.
  9. C. Collberg and C. Thomborson, "Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection," IEEE Trans. Software Eng. , vol. 28, 2002, pp.
  10. R. Zhou, R. Zhou, and K. Hwang, "Power Trust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing," IEEE Trans. Parallel and Distributed Systems, Apr. 2007, pp. 460–473.
  11. C. Clark et al. , "Live Migration of Virtual Machines," Proc. Symp. Networked Systems Design and Implementation, 2005, pp. 273–286.
  12. X. Lou and K. Hwang, "Collusive Piracy Prevention in P2P Content Delivery Networks," IEEE Trans. Computers, July 2009, pp. 970–983.
  13. T. Mather, S. Kumaraswamy, and S. Latif, Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, O'Reilly Media, 2009.
  14. D. Li, C. Liu, and W. Gan, "A New cognitive Model: Cloud Model," Int'l J. Intelligent Systems, Mar. 2009, pp. 357 - 375.
  15. D. Li and Y. Du, Artificial Intelligence with Uncertainty, Chapman & Hall, 2008.
  16. Hwang, G. Fox, and J. Dongarra, Distributed systems and cloud computing: Clusters, Grids/P2P, and Internet Clouds, Morgan Kanfmann, to appear, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

cloud computing watermarking Data coloring social security multi-way authentications