JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Trust Assurance of Data in Cloud Computing Environment
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Trust Assurance of Data in Cloud Computing Environment
Jung, Im-Y.; Jo, In-Soon; Yu, Young-Jin;
  PDF(new window)
 Abstract
Cloud Computing Environment provides users with a blue print of IT Utopia with virtualization; unbounded computing power and data storage free from the cost and the responsibility of maintenance for the IT resources. But, there are several issues to be addressed for the Cloud Computing Environment to be realized as the blue print because users cannot control the IT resources provided by the Cloud Computing Environment but can only use them. One of the issues is how to secure and to trust data in the Cloud Computing Environment. In this paper, an efficient and practical trust assurance of data with provenance in Cloud Computing Environment.
 Keywords
Cloud Computing;Trust of Data;Provenance;Data Integrity;Audit Integrity;
 Language
Korean
 Cited by
1.
재해정보를 고려한 클라우드 데이터센터 입지선정에 관한 연구,김기욱;김창수;

한국정보통신학회논문지, 2012. vol.16. 12, pp.2575-2580 crossref(new window)
2.
클라우드 서비스 가상화 내부 환경을 위한 BareMetal Hypervisor 기반 보안 구조 설계,최도현;유한나;박태성;도경화;전문석;

한국통신학회논문지, 2013. vol.38B. 7, pp.526-534 crossref(new window)
3.
가상화 클라우드 데이터센터에서 가상 머신 간의 균등한 성능 보장을 위한 제어 알고리즘,김환태;김황남;

한국통신학회논문지, 2013. vol.38C. 6, pp.512-520 crossref(new window)
4.
클라우드 스토리지의 공유 데이터에 대한 효율적 다중 서명 기법,김영식;

한국통신학회논문지, 2013. vol.38A. 11, pp.967-969 crossref(new window)
5.
선형 재생 부호 앙상블의 평균 복구 접속 비용,박진수;김정현;박기현;송홍엽;

한국통신학회논문지, 2014. vol.39B. 11, pp.723-729 crossref(new window)
 References
1.
Kiran-Kumar Muniswamy-Reddy, Peter Macko, and Margo Seltzer, "Provenance for the Cloud", in Proceedings of 8th USENIX Conference on File and Storage Technologies (FAST '10), Feb 2010

2.
Kiran-Kumar Muniswamy-Reddy and David A. Holland, "Causality-Based Versioning", ACM Transactions on Storage (ACM TOS), Dec 2009

3.
Wikipedia, http://en.wikipedia.org/wiki/Cloud_computing

4.
H. Erdogmus, "Cloud computing: Does nirvana hide behind the nebula?", IEEE Software 11, 2 (March-April 2009), pp.4-6.

5.
I. Foster, Y. Zhao, I. Raicu, and S. Lu, "Cloud computing and grid computing 360-degree compared", In Proceedings of Grid Computing Environments Workshop, GCE'08 (Austin, TX, 2008), pp.1-10.

6.
R. Gellman, "Privacy in the clouds: Risks to privacy and confidentiality from cloud computing", Tech. rep., February 2009

7.
Pubchem, http://pubchem.ncbi.nln.nih.gov/

8.
Genbank, Nucleic Acids Research 36 (Database Issue) (Jan. 2008)

9.
R. Hasan, R. Sion, and M. Winslett, "Introducing secure provenance: problems and challenges", In Proceedings of ACM workshop on Storage security and survivabilit, StorageSS '07 (Alexandria, Virginia, USA, October 2007), pp.13-18.

10.
L. M. Kaufman, "Data security in the world of cloud computing", IEEE Security & Privacy 7, 4 (July-Aug. 2009), pp.61-64. crossref(new window)

11.
Luc Moreau, Ben Clifford, Juliana Freire, Joe Futrelle, Yolanda Gil, Paul Groth, Natalia Kwasnikowska, Simon Miles, Paolo Missier, Jim Myers, Beth Plale, Yogesh Simmhan, Eric Stephan, Jan Van den Bussche, "The Open Provenance Model core specification (v1.1)", Future Generation Computer Systems, 2010, doi:10.1016/j.future. 2010. 07. 005

12.
T. Sterling, and D. Stark, "A high-performance computing forecast: Partly cloudy", Computing in Science & Engineering 11, 4 (July-Aug. 2009), pp.42-49. crossref(new window)

13.
J. Voas, and J. Zhang, "Cloud computing: New wine or just a new bottle?", IT Professional 11, 2 (March-April 2009), pp.15-17. crossref(new window)

14.
Crypto++ library 5.5.2, available at http://www.cryptopp.com/

15.
QuickHash Library, available at http://www.slavasoft.com/quickhash/index.htm

16.
Z. CHEN, AND L. MOREAU, "Implementation and evaluation of a protocol for recording process documentation in the presence of failures." In Proceedings of Second International Provenance and Annotation Workshop (IPAW'08).

17.
I. FOSTER, J. VOECKLER, M. WILDE, AND Y. ZHAO, "The Virtual Data Grid: A New Model and Architecture for Data-Intensive Collaboration.", In CIDR (Asilomar, CA, Jan. 2003).

18.
P. GROTH, L. MOREAU, AND M. LUCK, "Formalising a protocol for recording provenance in grids. In Proceedings of the UK OST e-Science Third All Hands Meeting 2004 (AHM'04) (Nottingham,UK, Sept. 2004). Accepted for publication.

19.
Y. L. SIMMHAN, B. PLALE, AND D. GANNON, "A framework for collecting provenance in data-centric scientific workflows", In ICWS '06: Proceedings of the IEEE International Conference on Web Services (2006).

20.
R. Bose, "A conceptual framework for composing and managing scientific data lienage", In Proceedings of the 14th International Conference on Scientific and Statistical Database Management, pp.15–19, 2002.

21.
A. de Keijzer and M. van Keulen, "Quality measures in uncertain data management", Scalable Uncertainty Management, 4772:pp.104-115, 2007. crossref(new window)

22.
A. Chapman, B. Blaustein and C. Elsaesser, "Provenance based belief", in Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, July 2010.