A Secure Interaction and Control Method for InterClouds Services

被引:0
|
作者
GAN Jiefu [1 ]
PENG Li [2 ]
LU Yueming [3 ]
机构
[1] China Information Security Certification Center
[2] School of Information and Communication Engineering, Beijing University of Posts and Telecommunications
[3] Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Inter-clouds services build information bridges over computing clouds so as to provide the convenience for electronic commerce and other information services. However, the interactions between clouds have challenges in information disclosure, services spoofing and information inconsistent. This paper proposes a secure interaction and control method for inter-clouds services, which uses information encryption, digital signature,time logic control means, to protect users' privacy and keep the integrity and consistency of cloud customers' request information, and prevent the spoofing of information requests. The results show that the method could prevent the spoofing well in a stable network environment and improve the security of clouds sessions.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A Secure Interaction and Control Method for InterClouds Services
    GAN Jiefu
    PENG Li
    LU Yueming
    [J]. China Communications, 2015, (S2) : 132 - 137
  • [2] A Secure Interaction and Control Method for Inter-Clouds Services
    Gan Jiefu
    Peng Li
    Lu Yueming
    [J]. CHINA COMMUNICATIONS, 2015, 12 (02) : 132 - 137
  • [3] Spy: A method to secure clients for network services
    Lipton, RJ
    Rajagopalan, S
    Serpanos, DN
    [J]. 22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOP, PROCEEDINGS, 2002, : 23 - 28
  • [4] Secure communication and access control for web services container
    Peng, Yu
    Wu, Quanyuan
    [J]. GCC 2005: FIFTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2006, : 412 - +
  • [5] A Method to Secure Data on Web Database with Web Services
    Rameaux, Wangue
    Zhao, Fengyu
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON LOGISTICS, ENGINEERING, MANAGEMENT AND COMPUTER SCIENCE, 2014, 101 : 1181 - 1187
  • [6] Authorization and access control to secure web services in a grid infrastructure
    Pastore, Serena
    [J]. WEBIST 2006: Proceedings of the Second International Conference on Web Information Systems and Technologies: INTERNET TECHNOLOGY / WEB INTERFACE AND APPLICATIONS, 2006, : 264 - 267
  • [7] A secure data interaction method based on edge computing
    Weiwei Miao
    Yuanyi Xia
    Rui Zhang
    Xinjian Zhao
    Qianmu Li
    Tao Wang
    Shunmei Meng
    [J]. Journal of Cloud Computing, 13
  • [8] A secure data interaction method based on edge computing
    Miao, Weiwei
    Xia, Yuanyi
    Zhang, Rui
    Zhao, Xinjian
    Li, Qianmu
    Wang, Tao
    Meng, Shunmei
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [9] Application of chaos control method in secure communication
    Tang Lin-shan
    Jiang Cheng-shun
    [J]. Proceedings of 2006 Chinese Control and Decision Conference, 2006, : 443 - 446
  • [10] A rhythm-based access control system for secure wellness services
    Hyungjin Im
    Jeong Kyu Lee
    Jong Hyuk Park
    [J]. The Journal of Supercomputing, 2016, 72 : 2860 - 2873