Trusted Execution Environment for Data Protection in Cloud

被引:0
|
作者
Srinivas, Podili V. S. [1 ]
Pravallika, Ch [2 ]
Raju, K. Srujan [3 ]
机构
[1] Gokaraju Rangaraju Inst Engn & Technol, Dept Comp Sci & Engn, Hyderabad 500090, Andhra Pradesh, India
[2] CVR Coll Engn Vastunagar, Dept Comp Sci & Engn, Ibrahimpatnam M 501510, Telangana, India
[3] CMR Tech Campus, Dept Comp Sci & Engn, Ranga Reddy D 501401, Telangana, India
关键词
Data protection in cloud; Cloud services; Cloud data protection;
D O I
10.1007/978-81-322-2757-1_65
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud Computing has become a major part of all organizations throughout the world because of the services offered such as Iaas, Saas, Paas and wide availability of these services. In spite of the benefits of cloud services they must consider how the security and privacy aspects are ensured, as users are often store some sensitive information with cloud storage providers which may be un trusted. In this paper, we are going to discuss about a novel approach where the Protection to data as included as a new service which will reduce the per application development cost to provide a secure environment and also provides secure access to data stored in public clouds.
引用
收藏
页码:657 / 665
页数:9
相关论文
共 50 条
  • [1] Trusted execution environment enabled dynamic group access control for data in cloud
    Li Y.
    Song Q.
    Jia H.
    Deng X.
    Ma J.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (04): : 194 - 205
  • [2] Cloud Key Management using Trusted Execution Environment
    Bouamama, Jaouhara
    Hedabou, Mustapha
    Erradi, Mohammed
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 560 - 567
  • [3] Dynamic trustworthiness verification mechanism for trusted cloud execution environment
    Liu, Chuan-Yi
    Lin, Jie
    Tang, Bo
    Ruan Jian Xue Bao/Journal of Software, 2014, 25 (03): : 662 - 674
  • [4] Data Enclave: A Data-Centric Trusted Execution Environment
    Xu, Yuanchao
    Pangia, James
    Ye, Chencheng
    Solihin, Yan
    Shen, Xipeng
    2024 IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE, HPCA 2024, 2024, : 218 - 232
  • [5] TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things
    Hui Xie
    Jun Zheng
    Zhengyuan Zhang
    Shengjun Wei
    Changzhen Hu
    Computing, 2024, 106 : 939 - 960
  • [6] TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things
    Xie, Hui
    Zheng, Jun
    Zhang, Zhengyuan
    Wei, Shengjun
    Hu, Changzhen
    COMPUTING, 2024, 106 (03) : 939 - 960
  • [7] Trusted Execution Environment With Rollback Protection for Smart Contract-Based IoT Data Trading
    Lu, Xin
    Zhang, Zijian
    Ma, Teng
    Li, Meng
    Zhou, Tyler
    Shen, Wei
    Zhu, Liehuang
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (20): : 32901 - 32909
  • [8] Enabling Trusted Data-Intensive Execution in Cloud Computing
    Zhang, Ning
    Lou, Wenjing
    Jiang, Xuxian
    Hou, Y. Thomas
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 355 - 363
  • [9] MIPE: a practical memory integrity protection method in a trusted execution environment
    Rui Chang
    Liehui Jiang
    Wenzhi Chen
    Yang Xiang
    Yuxia Cheng
    Abdulhameed Alelaiwi
    Cluster Computing, 2017, 20 : 1075 - 1087
  • [10] MIPE: a practical memory integrity protection method in a trusted execution environment
    Chang, Rui
    Jiang, Liehui
    Chen, Wenzhi
    Xiang, Yang
    Cheng, Yuxia
    Alelaiwi, Abdulhameed
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (02): : 1075 - 1087