A Decentralised Mechanism for Secure Cloud Computing Transactions

被引:0
|
作者
Ahmed, Monjur [1 ]
Bhuiyan, Md. Mahabub Alam [1 ]
Jaidka, Sapna [2 ]
Jiranantanagorn, Peerumporn [3 ]
机构
[1] Waikato Inst Technol, Ctr Informat Technol, Hamilton, New Zealand
[2] Univ Waikato, Dept Comp Sci, Hamilton, New Zealand
[3] Rajamangala Univ Technol Rattanakosin, Fac Engn, Nakhon Pathom, Thailand
关键词
Big Data; Cloud Computing; Cloud Transaction; Decentralised Computing; Decentralised Processing; Data Security; Information Security;
D O I
10.1109/FMEC54266.2021.9732405
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we present an innovative mechanism for transaction processing for big data in Cloud Computing context. We focus on data and information security in proposing the decentralised mechanism. Traditional transaction processing, if monitored, can potentially help an attacker to construct context of the information stored by the client to subsequently determine of value of the client's digital asset. In the proposed mechanism, we take a decentralised and collaborative approach both in terms of implementations and operations of transactions between end-users and Cloud servers. In the proposed transaction mechanism, the total picture of a transaction is not recoverable by unwanted third parties and thus the information on data processed by a transaction may not become a knowledge of an eavesdropper. The proposed mechanism is built upon and motivated by the principles of Ki-Nga-Kopuku - a decentralised and distributed computing security model that employs scattered and redundant decentralised processing.
引用
收藏
页码:132 / 136
页数:5
相关论文
共 50 条
  • [21] Secure torage of Data in Cloud Computing
    Fu, Zhangjie
    Cao, Xinyue
    Wang, Jin
    Sun, Xingming
    2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 783 - 786
  • [22] Secure storage of data in cloud computing
    20150500466883
    (1) School of Computer and Software and Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science and Technology, Nanjing; 210044, China, 1600, IEEE Tainan Section; International Society of Management Engineers; JSPS/NSFC/NRF A3 Foresight Program Ultra-Realistic Acoustic Interactive Communication on Next-Generation Internet; Tainan Chapter of IEEE Signal Processing Society; Waseda University (Institute of Electrical and Electronics Engineers Inc.):
  • [23] A hybrid algorithm for secure cloud computing
    Das D.
    International Journal of Wireless and Mobile Computing, 2020, 18 (02) : 116 - 122
  • [24] A Secure Cloud Computing Scaling Model
    Lei, Mingyue
    Huang, Zheng
    Wen, Qiaoyan
    Hu, Chunye
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 60 - 66
  • [25] Cryptographic Protocols for Secure Cloud Computing
    Alhumrani, S. A.
    Kar, Jayaprakash
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (02): : 301 - 310
  • [26] Secure Document Service for Cloud Computing
    Xu, Jin-Song
    Huang, Ru-Cheng
    Huang, Wan-Ming
    Yang, Geng
    CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 541 - +
  • [27] Secure Sharing of Data in Cloud Computing
    Tiwari, Deepnarayan
    Gangadharan, G. R.
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 24 - 35
  • [28] Secure User Authentication in Cloud Computing
    Javaid, Zeeshan
    Ijaz, Imran
    PROCEEDINGS OF THE 2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES (ICICT 2013), 2013,
  • [29] A Cryptographic Scheme for Secure Cloud Computing
    Llamas, Alejandro
    Ernesto Gonzalez, Raul
    2013 10TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTING SCIENCE AND AUTOMATIC CONTROL (CCE), 2013, : 221 - 226
  • [30] A Framework for Secure Mobile Cloud Computing
    Ramavathu, Lakshmananaik
    Bairam, Manjula
    Manchala, Sadanandam
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INFORMATICS, ICCII 2016, 2017, 507 : 353 - 363