Continuous Certification of Non-Repudiation in Cloud Storage Services

被引:6
|
作者
Krotsiani, Maria [1 ]
Spanoudakis, George [1 ]
机构
[1] City Univ London, Dept Comp Sci, London, England
关键词
non-repudiation; cloud; security certification; continuous monitoring;
D O I
10.1109/TrustCom.2014.122
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a certification model for Non-repudiation (NR) of cloud storage services. NR, i.e., the possession of proofs that certain exchanges have taken place amongst interacting parties, is a significant security property for cloud data storage services. Our model for certifying NR is based on continuous monitoring and has been defined and realised according to the CUMULUS approach. It also corresponds to certification of level 3 maturity in the reference certification framework of Cloud Security Alliance.
引用
收藏
页码:921 / 928
页数:8
相关论文
共 50 条
  • [31] How to achieve non-repudiation of origin with privacy protection in cloud computing
    Wu, Wei
    Zhou, Jianying
    Xiang, Yang
    Xu, Li
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2013, 79 (08) : 1200 - 1213
  • [32] A Signature Scheme with Non-Repudiation
    XIN Xiangjun~ 1
    2.Department of Information and Computing Science
    [J]. Wuhan University Journal of Natural Sciences, 2006, (05) : 1249 - 1252
  • [33] A fair non-repudiation protocol
    Zhou, JY
    Gollmann, D
    [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 55 - 61
  • [34] A non-repudiation metering scheme
    Harn, L
    Lin, HY
    [J]. IEEE COMMUNICATIONS LETTERS, 2001, 5 (12) : 486 - 487
  • [35] Non-repudiation and the metaphysics of presence
    Roe, Michael
    [J]. SECURITY PROTOCOLS, 2007, 4631 : 207 - 214
  • [36] Non-repudiation in Ad Hoc Networks
    Tandel, Purvi
    Valiveti, Sharada
    Agrawal, K. P.
    Kotecha, K.
    [J]. COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 405 - 415
  • [37] Non-repudiation in SET: Open issues
    Van Herreweghen, E
    [J]. FINANCIAL CRYPTOGRAPHY, PROCEEDINGS, 2001, 1962 : 140 - 156
  • [38] Automatic Analysis of a Non-Repudiation Protocol
    Lanotte, Ruggero
    Maggiolo-Schettini, Andrea
    Troina, Angelo
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 112 : 113 - 129
  • [39] Securing digital signatures for non-repudiation
    Zhou, J
    Lam, KY
    [J]. COMPUTER COMMUNICATIONS, 1999, 22 (08) : 710 - 716
  • [40] A key authentication scheme with non-repudiation
    Hwang, Min-Shiang
    Li, Li-Hua
    Lee, Cheng-Chi
    [J]. Operating Systems Review (ACM), 2004, 38 (03): : 75 - 78