Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/6281
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Faraj, Sufyan T. | - |
dc.contributor.author | Awad, Waleed K. | - |
dc.contributor.author | Kifayat, Kashif | - |
dc.date.accessioned | 2022-10-24T19:51:15Z | - |
dc.date.available | 2022-10-24T19:51:15Z | - |
dc.date.issued | 2012 | - |
dc.identifier.issn | 1991-8941 | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/6281 | - |
dc.description.abstract | Cloud computing is a new consumption and delivery model for IT services. The cloud has become an attractive platform for enterprises to deploy and execute their business services for business to business (B2B) and government to government (G2G) collaborations, etc. There are many concerns about cloud computing especially in terms of security, privacy and trust. These main issues have prevented businesses from fully accepting cloud platforms. Cloud computing demands three primary security requirements: confidentiality, integrity, and availability. In this paper we discuss some these issues by reviewing a recently proposed model [1] that interestingly handles secure messaging among services deployed within the same cloud or on different clouds. Then, we report on our ongoing work which is based on enhancing and developing this model. This is mainly achieved by adding a new service layer which is responsible for offering a high level of trust between collaborative parties. The added layer facilitates the integration of this model with the Public-Key Infrastructure (PKI). The main objective of the developed model is to increase the trust of the whole system by preventing any unauthorized party from joining the connectivity service. Indeed, our system can prevent any involved organization from launching masquerade attacks | en_US |
dc.language.iso | en | en_US |
dc.publisher | J. of university of anbar for pure science | en_US |
dc.relation.ispartofseries | 6;2 | - |
dc.subject | authentication service | en_US |
dc.subject | Business to Business | en_US |
dc.subject | cloud computing | en_US |
dc.subject | PKI | en_US |
dc.subject | security | en_US |
dc.subject | trust | en_US |
dc.title | Trusted Cloud Computing | en_US |
dc.type | Article | en_US |
Appears in Collections: | قسم نظم المعلومات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
429db41c0bac9571.pdf | 376.83 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.