{"title":"用于基于云的分布式服务的远程完整性认证的可扩展协议","authors":"Siamak Azadiabad, H. Pedram, M. Abbasy","doi":"10.1109/ICAICT.2014.7035912","DOIUrl":null,"url":null,"abstract":"Although, using cloud-based services is increasing nowadays, but for many sensitive applications, users need to ensure that the processes are performing correctly in the cloud. In this paper, we propose a scalable method for remote attestation of distributed services integrity in the cloud, in comparison with other similar works. This method allows performing attestation at any time, and it is easy to implement. Users also can identify malicious cloud systems in order to report to the cloud service provider in most of the cases.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Scalable protocol for remote integrity attestation of cloud based distributed services\",\"authors\":\"Siamak Azadiabad, H. Pedram, M. Abbasy\",\"doi\":\"10.1109/ICAICT.2014.7035912\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Although, using cloud-based services is increasing nowadays, but for many sensitive applications, users need to ensure that the processes are performing correctly in the cloud. In this paper, we propose a scalable method for remote attestation of distributed services integrity in the cloud, in comparison with other similar works. This method allows performing attestation at any time, and it is easy to implement. Users also can identify malicious cloud systems in order to report to the cloud service provider in most of the cases.\",\"PeriodicalId\":103329,\"journal\":{\"name\":\"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)\",\"volume\":\"110 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAICT.2014.7035912\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAICT.2014.7035912","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Scalable protocol for remote integrity attestation of cloud based distributed services
Although, using cloud-based services is increasing nowadays, but for many sensitive applications, users need to ensure that the processes are performing correctly in the cloud. In this paper, we propose a scalable method for remote attestation of distributed services integrity in the cloud, in comparison with other similar works. This method allows performing attestation at any time, and it is easy to implement. Users also can identify malicious cloud systems in order to report to the cloud service provider in most of the cases.