Continuous Certification of Non-Repudiation in Cloud Storage Services

被引:6
|
作者
Krotsiani, Maria [1 ]
Spanoudakis, George [1 ]
机构
[1] City Univ London, Dept Comp Sci, London, England
关键词
non-repudiation; cloud; security certification; continuous monitoring;
D O I
10.1109/TrustCom.2014.122
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a certification model for Non-repudiation (NR) of cloud storage services. NR, i.e., the possession of proofs that certain exchanges have taken place amongst interacting parties, is a significant security property for cloud data storage services. Our model for certifying NR is based on continuous monitoring and has been defined and realised according to the CUMULUS approach. It also corresponds to certification of level 3 maturity in the reference certification framework of Cloud Security Alliance.
引用
收藏
页码:921 / 928
页数:8
相关论文
共 50 条
  • [1] Continuous Biometric Verification for Non-Repudiation of Remote Services
    Schiavone, E.
    Ceccarelli, A.
    Bondavalli, A.
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [2] Fair Non-Repudiation for Web Services Transactions
    SU Ruidan
    [J]. Wuhan University Journal of Natural Sciences, 2010, 15 (05) : 385 - 392
  • [3] TrustBuilder: A non-repudiation scheme for IoT cloud applications
    Chen, Fei
    Wang, Jiahao
    Li, Jianqiang
    Xu, Yang
    Zhang, Cheng
    Xiang, Tao
    [J]. Computers and Security, 2022, 116
  • [4] Modeling Adaptive Non-Repudiation Security Services
    Tunia, Marcin A.
    [J]. PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH-ENERGY PHYSICS EXPERIMENTS 2016, 2016, 10031
  • [5] Non-repudiation Services for the MMS Protocol of IEC 61850
    Ruland, Karl Christoph
    Sassmannshausen, Jochen
    [J]. SECURITY STANDARDISATION RESEARCH, SSR 2015, 2015, 9497 : 70 - 85
  • [6] TrustBuilder: A non-repudiation scheme for IoT cloud applications
    Chen, Fei
    Wang, Jiahao
    Li, Jianqiang
    Xu, Yang
    Zhang, Cheng
    Xiang, Tao
    [J]. COMPUTERS & SECURITY, 2022, 116
  • [7] Evidence and non-repudiation
    Zhou, JY
    Gollmann, D
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 1997, 20 (03) : 267 - 281
  • [8] Continuous Authentication and Non-repudiation for the Security of Critical Systems
    Schiavone, Enrico
    Ceccarelli, Andrea
    Bondavalli, Andrea
    [J]. PROCEEDINGS OF 2016 IEEE 35TH SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2016, : 207 - 208
  • [9] A proof of non-repudiation
    Bella, G
    Paulson, LC
    [J]. SECURITY PROTOCOLS, 2002, 2467 : 119 - 125
  • [10] BPEL processes for non-repudiation protocols in Web Services
    Bilal, M
    Thomas, JP
    Harrington, P
    Abraham, A
    [J]. International Conference on Next Generation Web Services Practices, 2005, : 299 - 304