Browse > Article
http://dx.doi.org/10.13089/JKIISC.2010.20.5.69

Security-Enhanced Local Process Execution Scheme in Cloud Computing Environments  

Kim, Tae-Hyoung (Department of Electrical and Computer Engineering, Sungkyunkwan University)
Kim, In-Hyuk (Department of Electrical and Computer Engineering, Sungkyunkwan University)
Kim, Jung-Han (Department of Electrical and Computer Engineering, Sungkyunkwan University)
Min, Chang-Woo (Department of Mobile Systems Engineering, Sungkyunkwan University)
Kim, Jee-Hong (Department of Mobile Systems Engineering, Sungkyunkwan University)
Eom, Young-Ik (Department of Electrical and Computer Engineering, Sungkyunkwan University)
Abstract
In the current cloud environments, the applications are executed on the remote cloud server, and they also utilize computing resources of the remote cloud server such as physical memory and CPU. Therefore, if remote server is exposed to security threat, every applications in remote server can be victim by several security-attacks. Especially, despite many advantages, both individuals and businesses often have trouble to start the cloud services according to the malicious administrator of the cloud server. We propose a security-enhanced local process executing scheme resolving vulnerability of current cloud computing environments. Since secret data is stored in the local, we can protect secret data from security threats of the cloud server. By utilizing computing resource of local computer instead of remote server, high-secure processes can be set free from vulnerability of remote server.
Keywords
Local Process Execution; Cloud Computing; Cloud Security; Secret Data; TPM;
Citations & Related Records
연도 인용수 순위
  • Reference
1 F. J. Krautheim, "Private virtual infrastructure for cloud computing," In Proc of HotCloud09, June 2009.
2 Remote Process Execution, http://en.wikipedia.org/wiki/Remote_Process_Ex ecution.
3 rsh, http://unixhelp.ed.ac.uk/CGI/man-cgi?rsh.
4 Asia Pacific End-User Cloud Computing Survey, IDC, 2009.
5 M. Armbrust et al, Above the clouds: a Berkeley view of cloud computing, UC Berkeley Technical Report, 2009.
6 Gartner, Assessing the Security Risks of Cloud Computing, 2008. 6, http://www. gartner.com/DisplayDocument?id=685 308.
7 Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing, 2009.
8 Open Cloud Consortium, http://opencloudconsortium.org/
9 이강찬, 이승윤, "클라우드 컴퓨팅 표준화 동향 및 전략," 전자통신동향분석, 25(1), pp 90-99, 2010.
10 N. Santos, K. Gummadi, and R. Rodrigues, "Towards trusted cloud computing," In Proc of HotCloud09, June 2009.
11 XenSource Inc, Xen, www.xensource.com
12 Kernal Based Virtual Machine, http://www.linux-kvm.org/page/MainPage
13 VMWare ESX Server, http://www.vmware.com/products/esx
14 Google App Engine, http://code.google.com/appengine
15 Windows Azure, http://www.microsoft.com/azure
16 Q. Zhang, L. Cheng, and R. Boutaba, "Cloud Computing : state-of-art and research challenges," Journal of Internet Services and Applications, pp 7-18, May 2010.
17 Amazon Elastic Computing Cloud, http://aws.amazon.com/ec2
18 Cloud Hosting, CLoud Computing and Hybrid Infrastructure from GoGrid, http://www.gogrid.com
19 Wikipedia, Cloud computing, http://en.wikipedia.org/wiki/Cloud_computing.