{"title":"Application of a Distributed Security Method to End-2-End Services Security in Independent Heterogeneous Cloud Computing Environments","authors":"P. Goyal","doi":"10.1109/SERVICES.2011.34","DOIUrl":null,"url":null,"abstract":"Security of service usage in a heterogeneous independently-operated interoperable cloud computing environments (ICE), is a multi-faceted problem, from trust in service performance in conformance with the service specification, to trust in and security of the interaction between the service requestor and service. These issues are compounded in an ICE as there may not be a single source of trust or guarantor or centralized enforcer of security and other control mechanisms. This paper proposes a solution to the problem of trust and security of the interaction between the service requestor and service provider in an ICE, and presents its performance under various threat scenarios.","PeriodicalId":429726,"journal":{"name":"2011 IEEE World Congress on Services","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE World Congress on Services","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SERVICES.2011.34","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11
Abstract
Security of service usage in a heterogeneous independently-operated interoperable cloud computing environments (ICE), is a multi-faceted problem, from trust in service performance in conformance with the service specification, to trust in and security of the interaction between the service requestor and service. These issues are compounded in an ICE as there may not be a single source of trust or guarantor or centralized enforcer of security and other control mechanisms. This paper proposes a solution to the problem of trust and security of the interaction between the service requestor and service provider in an ICE, and presents its performance under various threat scenarios.