Mohd Izuan Mohd Saad, Kamarularifin Abd Jalil, M. Manaf
{"title":"Achieving trust in cloud computing using secure data provenance","authors":"Mohd Izuan Mohd Saad, Kamarularifin Abd Jalil, M. Manaf","doi":"10.1109/ICOS.2014.7042634","DOIUrl":null,"url":null,"abstract":"Cloud computing is the next generation computer system which extends network architecture into dynamic and large scale capacity by using visualization techniques. Transparent and secure data provenance will enhance the level of trust in the Cloud. Recent literature on securing data provenance focuses only on providing partial part of security elements in their mechanisms, thus they could not provide full protection to the data provenance as a whole. This paper presents the provenance description and challenges in providing security assurances in the Cloud. The paper also proposes a novel trust model for data provenance in cloud computing. The model will be used for securing the transaction process of storing and accessing the data provenance. The paper describes in detail the flow process of the model to achieve a high level of trust in cloud services. The significance of this research is to enhance the level of trust in the cloud services via comprehensive trust model which consists all aspects of security elements in the model.","PeriodicalId":146332,"journal":{"name":"2014 IEEE Conference on Open Systems (ICOS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"15","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE Conference on Open Systems (ICOS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOS.2014.7042634","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 15
Abstract
Cloud computing is the next generation computer system which extends network architecture into dynamic and large scale capacity by using visualization techniques. Transparent and secure data provenance will enhance the level of trust in the Cloud. Recent literature on securing data provenance focuses only on providing partial part of security elements in their mechanisms, thus they could not provide full protection to the data provenance as a whole. This paper presents the provenance description and challenges in providing security assurances in the Cloud. The paper also proposes a novel trust model for data provenance in cloud computing. The model will be used for securing the transaction process of storing and accessing the data provenance. The paper describes in detail the flow process of the model to achieve a high level of trust in cloud services. The significance of this research is to enhance the level of trust in the cloud services via comprehensive trust model which consists all aspects of security elements in the model.