Trusted Block as a Service: Towards Sensitive Applications on the Cloud

被引:4
|
作者
Hao, Jianan [1 ]
Cai, Wentong [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Parallel & Distributed Comp Ctr, Singapore, Singapore
关键词
D O I
10.1109/TrustCom.2011.13
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing grows rapidly as today's advanced information technology. However, by allowing outsourcing computation on the Cloud, users risk of disclosing privacy and obtaining forged results. These potential threats block sensitive applications to join the Cloud. In this paper, we characterize sensitive applications on the Cloud (SAND) problem and define two critical security requirements: confidentiality and verifiability. The former refers to the protection of sensitive programs/data from disclosing to other users or even the Cloud administrators. The latter concerns with user's capability to verify whether computing results are faithfully calculated. To address SAND, we propose a new Cloud model, Trusted Block as a Service (TBaaS), to provide a confidential and verifiable environment for each sensitive application. TBaaS limits Cloud provider's access of sensitive applications while granting user the ability to verify whether the computation is faithfully carried out. Moreover, it offers high flexibility and low performance overhead.
引用
收藏
页码:73 / 82
页数:10
相关论文
共 50 条
  • [21] DECIDE: DevOps for Trusted, Portable and Interoperable Multi-cloud Applications Towards the Digital Single Market
    Orue-Echevarria, Leire
    Alonso, Juncal
    Escalante, Marisa
    Stefanidis, Kyriakos
    Blasi, Lorenzo
    PRODUCT-FOCUSED SOFTWARE PROCESS IMPROVEMENT, PROFES 2019, 2019, 11915 : 602 - 607
  • [22] A Security Protocol for Access to Sensitive Data in Trusted Cloud Server
    Yao, Mengmeng
    Zhou, Dongsheng
    Deng, Rui
    Liu, Mingda
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 531 - 542
  • [23] Encryption key management as a trusted security as a service for cloud computing
    Fehis, Saad
    Nouali, Omar
    Kechadi, Mohand-Tahar
    International Journal of Security and Networks, 2021, 16 (03) : 150 - 162
  • [24] A Trusted and Efficient Cloud Computing Service with Personal Health Record
    Wu, Chien-Hsing
    Hwang, Jing-Jang
    Zhuang, Zheng-Yun
    2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND APPLICATIONS (ICISA 2013), 2013,
  • [25] Selecting a trusted cloud service provider for your SaaS program
    Tang, Changlong
    Liu, Jiqiang
    COMPUTERS & SECURITY, 2015, 50 : 60 - 73
  • [26] A Novel Architecture Towards Trusted E-commerce Cloud
    Sun, Hongbo
    Liu, Yi
    Chai, Yueting
    Sun, Xiao
    2012 INTERNATIONAL CONFERENCE ON E-LEARNING AND E-TECHNOLOGIES IN EDUCATION (ICEEE), 2012, : 223 - 229
  • [27] Towards Service-oriented Enterprise Architectures for Big Data Applications in the Cloud
    Zimmermann, Alfred
    Pretz, Michael
    Zimmermann, Gertrud
    Firesmith, Donald G.
    Petrov, Ilia
    El-Sheikh, Eman
    17TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOCW 2013), 2013, : 130 - 135
  • [28] A dynamic trusted monitoring method for cloud applications based on CCA
    Li, Tao
    Zheng, Liyuan
    2024 9TH INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING, ICSIP, 2024, : 346 - 350
  • [29] Towards Trusted Result Verification in Mass Data Processing Service
    Ding, Yan
    Wang, Huaimin
    Shi, Peichang
    Fu, Hongyi
    Xu, Xinhai
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2014, E97B (01) : 19 - 28
  • [30] Towards Cloud, Service and Tenant Classification For Cloud Computing
    Jeuk, Sebastian
    Szefer, Jakub
    Zhou, Shi
    2014 14TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID), 2014, : 792 - 801