Accountability in Cloud Computing by Means of Chain of Trust

@article{Contractor2017AccountabilityIC,
  title={Accountability in Cloud Computing by Means of Chain of Trust},
  author={Dipen Contractor and Dhiren R. Patel},
  journal={Int. J. Netw. Secur.},
  year={2017},
  volume={19},
  pages={251-259}
}
Cloud computing offers various services in form of infrastructure, platform, and software to meet the consumer requirements. It is radically changing how information technology services are created, delivered, accessed, and managed. However, this swift has prompted concerns regarding security and privacy due to cloud computing characteristics such as the multi-tenancy, elasticity, and layered architecture. One of the major challenge is to offer accountability in cloud services across all the… 

Figures from this paper

Perseverance of Uncertainty in Cloud Storage Services through Reputation Based Trust
TLDR
A new approach for reputation based interactions is proposed that are characterized by the trust which is critical for the cloud data persistence and the promise of gaining the advantage in a competitive market.
Network Security in Cloud Computing
  • Sachin Gupta
  • Computer Science
    International Journal for Research in Applied Science and Engineering Technology
  • 2020
TLDR
Analysis into the protection of the Cloud focuses principally on protective legitimate users of Cloud Services from attacks by external, malicious users.
Evidence Based Trust Estimation Model for Cloud Computing Services
TLDR
An evidence based trust estimation model (EBTEM) is proposed for trust assessment of cloud services that performs adaptive trust computation, which is sensitive to changes in the service behavior and presents a method for dynamic trust prediction.
Cryptanalysis of A Hierarchical Data Access and Key Management in Cloud Computing
TLDR
In their scheme, the data owner could change the encryption key more easily, and not to affect other users in Cloud Storage Service system, however, some weaknesses are found.
Descriptive Literature Review and Classification of Community Cloud Computing Research
TLDR
This study contributes to identify various existing research gaps by providing holistic insights and future exploratory approaches that are anticipated to result in a robust unified structure for the adoption of community cloud computing services in the higher education institution (HEIs).
DNA Cryptography for Secure Data Storage in Cloud
TLDR
A DNA based encryption algorithm for securing data in cloud environment which will be cost effective and secure by using bio-computational techniques is proposed which makes algorithm secure as it is an additional layer of biosecurity than conventional cryptographic techniques.
A Data Sorting and Searching Scheme Based on Distributed Asymmetric Searchable Encryption
TLDR
This paper introduces the concept of distributed Searchable asymmetric encryption, which is useful for security and can enable search operations on encrypted data and gives the proof of security.
Enhance Data Storage Security DNA Cryptography in Cloud
TLDR
Cloud computing features, service models, and security issues are discussed and a DNA based encryption algorithm for securing data in cloud environment is proposed which will be cost effective and secure by using bio-computational techniques.
...
...

References

SHOWING 1-10 OF 32 REFERENCES
Accountability as a Service for the Cloud
TLDR
A novel design to achieve Trustworthy Service Oriented Architecture (TSOA) in the Cloud through enforcing strong accountability is proposed and the testing figure indicates the cost of incorporating the design to SOA in the cloud is acceptable.
Seeding clouds with trust anchors
TLDR
A cloud verifier service that generates integrity proofs for customers to verify the integrity and access control enforcement abilities of the cloud platform that protect the integrity of customer's application VMs in IaaS clouds is proposed.
Accountability for cloud and other future Internet services
TLDR
The A4Cloud project will create solutions to support users in deciding and tracking how their data is used by cloud service providers, by combining methods of risk analysis, policy enforcement, monitoring and compliance auditing with tailored IT mechanisms for security, assurance and redress.
Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance
TLDR
This book, written by recognized authorities in the tech security world, addresses issues that affect any organization preparing to use cloud computing as an option and provides the detailed information on cloud computing security that has been lacking, until now.
A Metamodel for Measuring Accountability Attributes in the Cloud
TLDR
The goal of this metamodel is to act as a language for describing accountability properties in terms of actions between entities, and metrics for measuring the fulfillment of such properties, and allows the recursive decomposition of properties and metrics.
Trust but verify: accountability for network services
TLDR
The foundation of the approach is to preserve digitally signed records of actions and/or internal state snapshots of each service, and use them to detect tampering, verify the consistency of actions, and prove responsibility for unexpected states or actions.
An Analysis of the Cloud Computing Security Problem
TLDR
A detailed analysis of the cloud security problem is introduced and key features that should be covered by any proposed security solution are derived.
CCOA: Cloud Computing Open Architecture
TLDR
Seven architectural principles are presented and ten interconnected architectural modules are derives to form a reusable and customizable Cloud Computing Open Architecture (CCOA) to guide strategic planning and other consulting practices of Cloud Computing.
Clouds Trust Anchors
  • I. Abbadi
  • Environmental Science
    2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
  • 2012
TLDR
This paper proposes novel methods which help in providing remote attestation in the context of Clouds environment, and clarifies this important subject.
The NIST Definition of Cloud Computing
TLDR
This cloud model promotes availability and is composed of five essential characteristics, three service models, and four deployment models.
...
...