A Decentralised Mechanism for Secure Cloud Computing Transactions

被引:0
|
作者
Ahmed, Monjur [1 ]
Bhuiyan, Md. Mahabub Alam [1 ]
Jaidka, Sapna [2 ]
Jiranantanagorn, Peerumporn [3 ]
机构
[1] Waikato Inst Technol, Ctr Informat Technol, Hamilton, New Zealand
[2] Univ Waikato, Dept Comp Sci, Hamilton, New Zealand
[3] Rajamangala Univ Technol Rattanakosin, Fac Engn, Nakhon Pathom, Thailand
关键词
Big Data; Cloud Computing; Cloud Transaction; Decentralised Computing; Decentralised Processing; Data Security; Information Security;
D O I
10.1109/FMEC54266.2021.9732405
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we present an innovative mechanism for transaction processing for big data in Cloud Computing context. We focus on data and information security in proposing the decentralised mechanism. Traditional transaction processing, if monitored, can potentially help an attacker to construct context of the information stored by the client to subsequently determine of value of the client's digital asset. In the proposed mechanism, we take a decentralised and collaborative approach both in terms of implementations and operations of transactions between end-users and Cloud servers. In the proposed transaction mechanism, the total picture of a transaction is not recoverable by unwanted third parties and thus the information on data processed by a transaction may not become a knowledge of an eavesdropper. The proposed mechanism is built upon and motivated by the principles of Ki-Nga-Kopuku - a decentralised and distributed computing security model that employs scattered and redundant decentralised processing.
引用
收藏
页码:132 / 136
页数:5
相关论文
共 50 条
  • [41] Secure Rendering Process in Cloud Computing
    Baharon, Mohd Rizuan
    Shi, Qi
    Llewellyn-Jones, David
    Merabti, Madjid
    2013 ELEVENTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2013, : 82 - 87
  • [42] A distributed algorithm for SI transactions serializability in cloud computing
    Huang, Bin
    Peng, Yuxing
    Peng, Xiaoning
    Information Technology Journal, 2013, 12 (24) : 8435 - 8445
  • [43] Everything Under Control: Secure Data Sharing Mechanism for Cloud-Edge Computing
    Song, Zishuai
    Ma, Hui
    Zhang, Rui
    Xu, Wenhan
    Li, Jianhao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 2234 - 2249
  • [44] Secure Cloud Computing: Risk Analysis for Secure Cloud Reference Architecture in Legal Metrology
    Oppermann, Alexander
    Esche, Marko
    Thiel, Florian
    Seifert, Jean-Pierre
    PROCEEDINGS OF THE 2018 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2018, : 593 - 602
  • [45] A Secure Self-Identification Mechanism for Enabling IoT Devices to Join Cloud Computing
    Villari, Massimo
    Celesti, Antonio
    Fazio, Maria
    Puliafito, Antonio
    INTERNET OF THINGS: IOT INFRASTRUCTURES, PT II, 2015, 151 : 306 - 311
  • [46] Towards secure mobile cloud computing: A survey
    Khan, Abdul Nasir
    Kiah, M. L. Mat
    Khan, Samee U.
    Madani, Sajjad A.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (05): : 1278 - 1299
  • [47] A Security Framework for Secure Cloud Computing Environments
    Jouini, Mouna
    Rabai, Latifa Ben Arfa
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2016, 6 (03) : 32 - 44
  • [48] Secure Identity Management In Mobile Cloud Computing
    Suguna, M.
    Shalinie, S. Mercy
    Anusia, R.
    Deepti, S.
    2017 INTERNATIONAL CONFERENCE ON NEXTGEN ELECTRONIC TECHNOLOGIES: SILICON TO SOFTWARE (ICNETS2), 2017, : 42 - 45
  • [49] Research of Data Secure Based on Cloud Computing
    Shi Yan-rong
    Zhao Xiao-fang
    Chen Shu-yin
    2014 IEEE WORKSHOP ON ELECTRONICS, COMPUTER AND APPLICATIONS, 2014, : 202 - 204
  • [50] Secure Data Process in Distributed Cloud Computing
    Sharmila, P.
    Danapaquiame, N.
    Subhapriya, R.
    Janakiram, A.
    Amudhavel, J.
    BIOSCIENCE BIOTECHNOLOGY RESEARCH COMMUNICATIONS, 2018, 11 (01): : 75 - 84