Browse > Article
http://dx.doi.org/10.7840/KICS.2011.36B.9.1066

Trust Assurance of Data in Cloud Computing Environment  

Jung, Im-Y. (서울대학교 컴퓨터공학부 분산컴퓨팅시스템 연구실)
Jo, In-Soon (서울대학교 컴퓨터공학부 분산컴퓨팅시스템 연구실)
Yu, Young-Jin (서울대학교 컴퓨터공학부 분산컴퓨팅시스템 연구실)
Abstract
Cloud Computing Environment provides users with a blue print of IT Utopia with virtualization; unbounded computing power and data storage free from the cost and the responsibility of maintenance for the IT resources. But, there are several issues to be addressed for the Cloud Computing Environment to be realized as the blue print because users cannot control the IT resources provided by the Cloud Computing Environment but can only use them. One of the issues is how to secure and to trust data in the Cloud Computing Environment. In this paper, an efficient and practical trust assurance of data with provenance in Cloud Computing Environment.
Keywords
Cloud Computing; Trust of Data; Provenance; Data Integrity; Audit Integrity;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. M. Kaufman, "Data security in the world of cloud computing", IEEE Security & Privacy 7, 4 (July-Aug. 2009), pp.61-64.   DOI   ScienceOn
2 Luc Moreau, Ben Clifford, Juliana Freire, Joe Futrelle, Yolanda Gil, Paul Groth, Natalia Kwasnikowska, Simon Miles, Paolo Missier, Jim Myers, Beth Plale, Yogesh Simmhan, Eric Stephan, Jan Van den Bussche, "The Open Provenance Model core specification (v1.1)", Future Generation Computer Systems, 2010, doi:10.1016/j.future. 2010. 07. 005
3 T. Sterling, and D. Stark, "A high-performance computing forecast: Partly cloudy", Computing in Science & Engineering 11, 4 (July-Aug. 2009), pp.42-49.   DOI   ScienceOn
4 J. Voas, and J. Zhang, "Cloud computing: New wine or just a new bottle?", IT Professional 11, 2 (March-April 2009), pp.15-17.   DOI   ScienceOn
5 Crypto++ library 5.5.2, available at http://www.cryptopp.com/
6 QuickHash Library, available at http://www.slavasoft.com/quickhash/index.htm
7 Z. CHEN, AND L. MOREAU, "Implementation and evaluation of a protocol for recording process documentation in the presence of failures." In Proceedings of Second International Provenance and Annotation Workshop (IPAW'08).
8 I. FOSTER, J. VOECKLER, M. WILDE, AND Y. ZHAO, "The Virtual Data Grid: A New Model and Architecture for Data-Intensive Collaboration.", In CIDR (Asilomar, CA, Jan. 2003).
9 P. GROTH, L. MOREAU, AND M. LUCK, "Formalising a protocol for recording provenance in grids. In Proceedings of the UK OST e-Science Third All Hands Meeting 2004 (AHM'04) (Nottingham,UK, Sept. 2004). Accepted for publication.
10 Y. L. SIMMHAN, B. PLALE, AND D. GANNON, "A framework for collecting provenance in data-centric scientific workflows", In ICWS '06: Proceedings of the IEEE International Conference on Web Services (2006).
11 R. Bose, "A conceptual framework for composing and managing scientific data lienage", In Proceedings of the 14th International Conference on Scientific and Statistical Database Management, pp.15–19, 2002.
12 A. de Keijzer and M. van Keulen, "Quality measures in uncertain data management", Scalable Uncertainty Management, 4772:pp.104-115, 2007.   DOI
13 A. Chapman, B. Blaustein and C. Elsaesser, "Provenance based belief", in Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, July 2010.
14 Kiran-Kumar Muniswamy-Reddy, Peter Macko, and Margo Seltzer, "Provenance for the Cloud", in Proceedings of 8th USENIX Conference on File and Storage Technologies (FAST '10), Feb 2010
15 Kiran-Kumar Muniswamy-Reddy and David A. Holland, "Causality-Based Versioning", ACM Transactions on Storage (ACM TOS), Dec 2009
16 Wikipedia, http://en.wikipedia.org/wiki/Cloud_computing
17 H. Erdogmus, "Cloud computing: Does nirvana hide behind the nebula?", IEEE Software 11, 2 (March-April 2009), pp.4-6.
18 I. Foster, Y. Zhao, I. Raicu, and S. Lu, "Cloud computing and grid computing 360-degree compared", In Proceedings of Grid Computing Environments Workshop, GCE'08 (Austin, TX, 2008), pp.1-10.
19 R. Gellman, "Privacy in the clouds: Risks to privacy and confidentiality from cloud computing", Tech. rep., February 2009
20 Pubchem, http://pubchem.ncbi.nln.nih.gov/
21 Genbank, Nucleic Acids Research 36 (Database Issue) (Jan. 2008)
22 R. Hasan, R. Sion, and M. Winslett, "Introducing secure provenance: problems and challenges", In Proceedings of ACM workshop on Storage security and survivabilit, StorageSS '07 (Alexandria, Virginia, USA, October 2007), pp.13-18.