首页 > 最新文献

2015 International Conference on Cloud Technologies and Applications (CloudTech)最新文献

英文 中文
An efficient secure platform for storage in MCC 一个高效安全的MCC存储平台
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336984
Karim Zkik, Maha Tebaa, Ghizlane Orhanou, S. El Hajji
The Mobile Cloud Computing offers more and more services for data storage and sharing. It offers to users enormous storage space and allows them to recover their data anywhere and anytime. But the evolution of these services in the MCC remains slow, in front of the many constraints it faces such as processing power limitation, high energy consumption and, problems related to data security and confidentiality. We, propose an efficient structure for storing and sharing data that ensures security and user privacy without overloading the mobile device. Our structure enables quick and easy access to a Cloud server for uploading and downloading data safely. Our platform uses a system of files classification and a homomorphic keyword research for more fluent and easy access.
移动云计算为数据存储和共享提供了越来越多的服务。它为用户提供了巨大的存储空间,并允许他们随时随地恢复数据。但是,这些服务在MCC中的发展仍然缓慢,因为它面临着许多制约因素,如处理能力限制、高能耗以及与数据安全和机密性相关的问题。我们提出了一种有效的存储和共享数据的结构,确保了安全性和用户隐私,而不会使移动设备过载。我们的结构可以快速方便地访问云服务器,以便安全地上传和下载数据。我们的平台使用了文件分类系统和同态关键字研究,使访问更加流畅和方便。
{"title":"An efficient secure platform for storage in MCC","authors":"Karim Zkik, Maha Tebaa, Ghizlane Orhanou, S. El Hajji","doi":"10.1109/CLOUDTECH.2015.7336984","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336984","url":null,"abstract":"The Mobile Cloud Computing offers more and more services for data storage and sharing. It offers to users enormous storage space and allows them to recover their data anywhere and anytime. But the evolution of these services in the MCC remains slow, in front of the many constraints it faces such as processing power limitation, high energy consumption and, problems related to data security and confidentiality. We, propose an efficient structure for storing and sharing data that ensures security and user privacy without overloading the mobile device. Our structure enables quick and easy access to a Cloud server for uploading and downloading data safely. Our platform uses a system of files classification and a homomorphic keyword research for more fluent and easy access.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128541487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Challenges of using homomorphic encryption to secure cloud computing 使用同态加密保护云计算的挑战
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7337011
Khalid El Makkaoui, Abdellah Ezzati, A. B. Hssane
With the emergence of cloud computing, the concept of information security has become a major issue. Indeed, the security of such a system is the greatest concern of computer scientists, providers of cloud and organizations who want to adopt and benefit from these services. Cloud computing providers must implement concepts ensuring network security, hardware, data storage and strategies of control and access to services. All these elements help to preserve data security and ensuring the availability of services associated with the Cloud, to better satisfy clients and acquire and build their trust. However, even if the data storage security in cloud servers is assured, reluctance remain when it comes to process the confidential data. Indeed, the fear that sensitive data is being used is a major obstacle in the adoption of cloud services by enterprises. To overcome this obstacle, the use of methods that can perform operations on encrypted data without knowing the secret key, seems to be an effective way to strengthen the confidentiality of information. In this paper we will examine the challenges facing Homomorphic Encryption methods to allow suppliers of cloud to perform operations on encrypted data, and provide the same results after treatment, as if they were performing calculations on raw data.
随着云计算的出现,信息安全的概念已经成为一个重大问题。事实上,这样一个系统的安全性是计算机科学家、云计算提供商和希望采用这些服务并从中受益的组织最关心的问题。云计算提供商必须实施确保网络安全、硬件、数据存储以及控制和访问服务策略的概念。所有这些元素都有助于保护数据安全性,确保与云相关的服务的可用性,从而更好地满足客户,获得并建立他们的信任。然而,即使云服务器中的数据存储安全得到保证,在处理机密数据时仍然存在不情愿的情况。事实上,对敏感数据被使用的担忧是企业采用云服务的主要障碍。为了克服这一障碍,使用可以在不知道密钥的情况下对加密数据执行操作的方法似乎是加强信息机密性的有效方法。在本文中,我们将研究同态加密方法所面临的挑战,这些方法允许云供应商对加密数据执行操作,并在处理后提供相同的结果,就像他们在原始数据上执行计算一样。
{"title":"Challenges of using homomorphic encryption to secure cloud computing","authors":"Khalid El Makkaoui, Abdellah Ezzati, A. B. Hssane","doi":"10.1109/CLOUDTECH.2015.7337011","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337011","url":null,"abstract":"With the emergence of cloud computing, the concept of information security has become a major issue. Indeed, the security of such a system is the greatest concern of computer scientists, providers of cloud and organizations who want to adopt and benefit from these services. Cloud computing providers must implement concepts ensuring network security, hardware, data storage and strategies of control and access to services. All these elements help to preserve data security and ensuring the availability of services associated with the Cloud, to better satisfy clients and acquire and build their trust. However, even if the data storage security in cloud servers is assured, reluctance remain when it comes to process the confidential data. Indeed, the fear that sensitive data is being used is a major obstacle in the adoption of cloud services by enterprises. To overcome this obstacle, the use of methods that can perform operations on encrypted data without knowing the secret key, seems to be an effective way to strengthen the confidentiality of information. In this paper we will examine the challenges facing Homomorphic Encryption methods to allow suppliers of cloud to perform operations on encrypted data, and provide the same results after treatment, as if they were performing calculations on raw data.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128436447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Security model for cloud database as a service (DBaaS) 云数据库即服务(DBaaS)的安全模型
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336974
K. Munir
Database-as-a-service (DBaaS) is a cloud computing service model that provides users with some form of access to a database without the need for setting up physical hardware, installing software or configuring for performance. Since consumers host data on the Cloud, DBaaS providers should be able to guarantee data owners that their data would be protected from all potential security threats. Protecting application data for large-scale web and mobile apps can be complex; especially with distributed and NoSQL databases. Data centers are no longer confined to the enterprise perimeter. More and more enterprises take their data to the cloud, but forget to adjust their security management practices when doing so. Unauthorized access to data resources, misuse of data stored on third party platform, data confidentiality, integrity and availability are some of the major security challenges that ail this nascent Cloud service model, which hinders the wide-scale adoption of DBaaS. In this paper, I propose a security model for cloud Database as a service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed framework for DBaaS and achieves efficiency. This will help Cloud community to get an insight into state-of-the-art progress in terms of secure strategies, their deficiencies and possible future directions.
数据库即服务(database -as-a-service, DBaaS)是一种云计算服务模型,它为用户提供对数据库的某种形式的访问,而不需要设置物理硬件、安装软件或配置性能。由于消费者在云上托管数据,DBaaS提供商应该能够保证数据所有者的数据将受到保护,免受所有潜在的安全威胁。保护大型web和移动应用程序的应用程序数据可能很复杂;尤其是分布式和NoSQL数据库。数据中心不再局限于企业内部。越来越多的企业将他们的数据放到云端,但是在这样做的时候忘记调整他们的安全管理实践。未经授权访问数据资源、滥用存储在第三方平台上的数据、数据机密性、完整性和可用性是所有这些新兴云服务模型面临的一些主要安全挑战,这些挑战阻碍了DBaaS的广泛采用。在本文中,我提出了一个云数据库即服务(DBaaS)的安全模型。用户可以随时更改他/她的密码。此外,安全性分析验证了所提出的DBaaS框架的可行性和有效性。这将有助于云社区深入了解安全策略的最新进展、不足之处和可能的未来方向。
{"title":"Security model for cloud database as a service (DBaaS)","authors":"K. Munir","doi":"10.1109/CLOUDTECH.2015.7336974","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336974","url":null,"abstract":"Database-as-a-service (DBaaS) is a cloud computing service model that provides users with some form of access to a database without the need for setting up physical hardware, installing software or configuring for performance. Since consumers host data on the Cloud, DBaaS providers should be able to guarantee data owners that their data would be protected from all potential security threats. Protecting application data for large-scale web and mobile apps can be complex; especially with distributed and NoSQL databases. Data centers are no longer confined to the enterprise perimeter. More and more enterprises take their data to the cloud, but forget to adjust their security management practices when doing so. Unauthorized access to data resources, misuse of data stored on third party platform, data confidentiality, integrity and availability are some of the major security challenges that ail this nascent Cloud service model, which hinders the wide-scale adoption of DBaaS. In this paper, I propose a security model for cloud Database as a service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed framework for DBaaS and achieves efficiency. This will help Cloud community to get an insight into state-of-the-art progress in terms of secure strategies, their deficiencies and possible future directions.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122643324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Toward a trusted framework for cloud computing 为云计算建立一个可信的框架
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7337013
Hicham Toumi, M. Talea, K. Sabiri, A. Eddaoui
Cloud Computing is evolving as a key computing platform for sharing resources that include infrastructures, software, applications, and business. However, Cloud Computing is still a matter of great concern for a cloud user to trust security and reliability of cloud services. Cloud Computing is undergoing an incontestable success, which could be indeed compromised by concerns about the risks related to potential misuse of this model aimed at conducting illegal activities. There is major need of bringing security, transparency and reliability in cloud model for client satisfaction. One of the security issues is how to reduce the impact of any type of intrusion in this environment. To overcome these kinds of attacks, we propose a framework of cooperative Hybrid Intrusion Detection System (Hy-IDS) and Mobile Agents. Then, our Hybrid IDS consists of two types of IDS, which are dispatched over three layer of cloud computing. Therefore, in the first layer our framework allows to collect, analyze and detect malicious data using the first type of IDS and Mobile Agents. In case of attack, we collect at the level of the second layer all the malicious data detected in the first layer for the generation of new signatures, based on a Signature Generation Algorithm (SGA) and network intrusion detection system (NIDS). However, these new signatures are used to update the database of the IDS. The mobile agents play an important role in this collaboration. They are used in our framework for investigation of hosts, transfer data malicious and transfer update of a database of neighboring IDS in the cloud. Therefore, the neighboring IDS will use these new signatures to protect their area of control against the same type of attack. Applying this close-loop control, the collaborative network security management framework could identify and address new distributed attacks more quickly and effectively.
云计算正在发展成为共享资源(包括基础设施、软件、应用程序和业务)的关键计算平台。然而,云计算的安全性和可靠性仍然是云用户非常关心的问题。云计算正在取得无可争议的成功,但人们担心这种模式可能被滥用以进行非法活动,因此这种成功确实可能受到损害。为了让客户满意,在云模型中引入安全性、透明性和可靠性是非常重要的。安全问题之一是如何减少这种环境中任何类型的入侵的影响。为了克服这类攻击,我们提出了一种基于移动代理的协同混合入侵检测系统(Hy-IDS)框架。然后,我们的混合IDS由两种类型的IDS组成,它们通过三层云计算进行调度。因此,在第一层,我们的框架允许使用第一种类型的IDS和移动代理收集、分析和检测恶意数据。在攻击发生的情况下,我们在第二层收集第一层检测到的所有恶意数据,并基于签名生成算法(SGA)和网络入侵检测系统(NIDS)生成新的签名。但是,这些新签名用于更新IDS的数据库。移动代理在这种协作中起着重要的作用。它们在我们的框架中用于主机调查,恶意传输数据以及在云中传输相邻IDS数据库的更新。因此,邻近的IDS将使用这些新签名来保护其控制区域免受相同类型的攻击。应用这种闭环控制,协作网络安全管理框架可以更快速有效地识别和应对新的分布式攻击。
{"title":"Toward a trusted framework for cloud computing","authors":"Hicham Toumi, M. Talea, K. Sabiri, A. Eddaoui","doi":"10.1109/CLOUDTECH.2015.7337013","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337013","url":null,"abstract":"Cloud Computing is evolving as a key computing platform for sharing resources that include infrastructures, software, applications, and business. However, Cloud Computing is still a matter of great concern for a cloud user to trust security and reliability of cloud services. Cloud Computing is undergoing an incontestable success, which could be indeed compromised by concerns about the risks related to potential misuse of this model aimed at conducting illegal activities. There is major need of bringing security, transparency and reliability in cloud model for client satisfaction. One of the security issues is how to reduce the impact of any type of intrusion in this environment. To overcome these kinds of attacks, we propose a framework of cooperative Hybrid Intrusion Detection System (Hy-IDS) and Mobile Agents. Then, our Hybrid IDS consists of two types of IDS, which are dispatched over three layer of cloud computing. Therefore, in the first layer our framework allows to collect, analyze and detect malicious data using the first type of IDS and Mobile Agents. In case of attack, we collect at the level of the second layer all the malicious data detected in the first layer for the generation of new signatures, based on a Signature Generation Algorithm (SGA) and network intrusion detection system (NIDS). However, these new signatures are used to update the database of the IDS. The mobile agents play an important role in this collaboration. They are used in our framework for investigation of hosts, transfer data malicious and transfer update of a database of neighboring IDS in the cloud. Therefore, the neighboring IDS will use these new signatures to protect their area of control against the same type of attack. Applying this close-loop control, the collaborative network security management framework could identify and address new distributed attacks more quickly and effectively.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127841246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Connectivity-aware service provision in vehicular cloud 车载云中的连接感知服务提供
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7337017
Rayane El Sibai, T. Atéchian, J. B. Abdo, R. Tawil, J. Demerjian
In the last twenty years, vehicles have become equipped with various sensors and resources, making them capable to communicate, to share resources and to behave cooperatively. This gave rise to the concept of vehicular cloud (VC). Vehicular cloud can be described from the standpoint of applications and services offered by vehicles that belong to a Vehicular Ad hoc Network (VANET). Because of the limitation of computation, storage and bandwidth resources for complex in-vehicle multimedia, entertainment applications, it is important to request services from service provider vehicles in the network, forming a cloud. However, the main challenge of vehicular networks is how to maintain the connectivity between the vehicles during service provision process. It is important to note that, to fully provide a service without interruption, it is necessary to ensure that the connectivity duration between the requestor and the service provider vehicles is sufficient for a complete end-to-end transmission. In this paper, a connectivity-aware service provision mechanism is proposed for VANET, where the service provider vehicle is selected based on several parameters such as the availability of the requested service and the mobility of the vehicles.
在过去的二十年里,车辆已经配备了各种传感器和资源,使它们能够通信,共享资源和合作行为。这就产生了车载云(VC)的概念。车辆云可以从属于车辆自组织网络(VANET)的车辆提供的应用程序和服务的角度来描述。由于复杂的车载多媒体、娱乐应用的计算、存储和带宽资源的限制,向网络中的服务提供商车辆请求服务,形成云是很重要的。然而,车辆网络的主要挑战是如何在服务提供过程中保持车辆之间的连通性。值得注意的是,要完全不中断地提供服务,有必要确保请求者和服务提供者车辆之间的连接持续时间足以完成端到端传输。本文提出了一种基于连接感知的服务提供机制,该机制基于所请求服务的可用性和车辆的移动性等多个参数选择服务提供者车辆。
{"title":"Connectivity-aware service provision in vehicular cloud","authors":"Rayane El Sibai, T. Atéchian, J. B. Abdo, R. Tawil, J. Demerjian","doi":"10.1109/CLOUDTECH.2015.7337017","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337017","url":null,"abstract":"In the last twenty years, vehicles have become equipped with various sensors and resources, making them capable to communicate, to share resources and to behave cooperatively. This gave rise to the concept of vehicular cloud (VC). Vehicular cloud can be described from the standpoint of applications and services offered by vehicles that belong to a Vehicular Ad hoc Network (VANET). Because of the limitation of computation, storage and bandwidth resources for complex in-vehicle multimedia, entertainment applications, it is important to request services from service provider vehicles in the network, forming a cloud. However, the main challenge of vehicular networks is how to maintain the connectivity between the vehicles during service provision process. It is important to note that, to fully provide a service without interruption, it is necessary to ensure that the connectivity duration between the requestor and the service provider vehicles is sufficient for a complete end-to-end transmission. In this paper, a connectivity-aware service provision mechanism is proposed for VANET, where the service provider vehicle is selected based on several parameters such as the availability of the requested service and the mobility of the vehicles.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126244830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Management platform for Cloud Computing 云计算管理平台
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336968
Omar Sefraoui, Mohammed Aissaoui, M. Eleuldj
The Cloud Computing is a new concept in which dynamically scalable resources, virtualized and provided to users as a service over the Internet. It is primarily intended to meet the needs of users and allow them access to virtually unlimited resources. In fact, many researchers are motivated to develop solutions to improve performance and give users more tools to control the use of cloud computing. The cloud services offered is very diverse in terms of hardware and software, providing a wide range of configurations, and great flexibility., In this paper we propose a Management platform for Cloud Computing (Man4CC platform), aimed to act as an intermediate between users and Cloud environment. The main purpose of the Man4CC platform is to support cloud environment and offering additional components that enhance the functionality. The Man4CC platform is open source solution, scalable, interoperable and extensible. Also dealing with a management platform specification approach by capturing the user specifications and translate them into rules that will help to generate the cloud settings.
云计算是一个新概念,其中动态可伸缩的资源被虚拟化,并通过Internet作为服务提供给用户。它的主要目的是满足用户的需要,使他们能够获得几乎无限的资源。事实上,许多研究人员都有动力开发解决方案来提高性能,并为用户提供更多工具来控制云计算的使用。所提供的云服务在硬件和软件方面非常多样化,提供了广泛的配置和极大的灵活性。在本文中,我们提出了一个云计算管理平台(Man4CC平台),旨在充当用户和云环境之间的中介。Man4CC平台的主要目的是支持云环境,并提供增强功能的附加组件。Man4CC平台是一个开源的解决方案,具有可扩展性、互操作性和可扩展性。另外,通过捕获用户规范并将其转换为有助于生成云设置的规则来处理管理平台规范方法。
{"title":"Management platform for Cloud Computing","authors":"Omar Sefraoui, Mohammed Aissaoui, M. Eleuldj","doi":"10.1109/CLOUDTECH.2015.7336968","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336968","url":null,"abstract":"The Cloud Computing is a new concept in which dynamically scalable resources, virtualized and provided to users as a service over the Internet. It is primarily intended to meet the needs of users and allow them access to virtually unlimited resources. In fact, many researchers are motivated to develop solutions to improve performance and give users more tools to control the use of cloud computing. The cloud services offered is very diverse in terms of hardware and software, providing a wide range of configurations, and great flexibility., In this paper we propose a Management platform for Cloud Computing (Man4CC platform), aimed to act as an intermediate between users and Cloud environment. The main purpose of the Man4CC platform is to support cloud environment and offering additional components that enhance the functionality. The Man4CC platform is open source solution, scalable, interoperable and extensible. Also dealing with a management platform specification approach by capturing the user specifications and translate them into rules that will help to generate the cloud settings.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125182285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Decentralized attribute-based encryption scheme with scalable revocation for sharing data in public cloud servers 分布式基于属性的加密方案,具有可伸缩的撤销,用于在公共云服务器中共享数据
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336985
Adel Binbusayyis, Ning Zhang
With the rapid development of cloud computing, it is attractive for enterprise companies to outsource their data files for sharing in cloud servers, as cloud computing can offer desirable characteristics, such as on-demand self-service, broad network access, and rapid elasticity. However, by uploading data files onto cloud servers, data owners (i.e. the companies) will lose control over their own data. This makes it essential to use Attribute-based encryption (ABE) because it can help to protect the data confidentiality by uploading data files in encrypted form. In addition, it can help to facilitate granting access to data by allowing only authorized users to decrypt the encrypted data files based on a set of attributes. However, this ABE approach includes three key issues. The first one is the complexity of user secret key management for large-scale cloud environments. The second is the complexity of revoking the users access rights. The third is the computational complexity involved in assigning user rights, encrypting and accessing data files. This paper addresses these three issues by proposing a decentralized ciphertext-policy ABE scheme (CP-DABE) for a large-scale cooperative cloud environment. The scheme reduces the complexity of user secret key management by providing a secure attribute delegation services between a master authority and a number of multiple attribute authorities. The scheme also reduces the complexity of revocation process by using Proxy Re-encryption technique to revoke any users access right. In addition, by comparing with most relative work, the scheme reduces the computational requirements for assigning user rights, encrypting and accessing data files. The scheme can support any LSSS access structure. In this paper, the cryptographic construction of the CP-DABE scheme is presented, and its efficiency is analyzed and compared with most relative work. The security of the CP-DABE scheme is discussed and selectively proved against chosen-plaintext attacks under the decisional Bilinear Diffie-Hellman Exponent assumption. Finally, ideas to extend the CP-DABE scheme are discussed.
随着云计算的快速发展,将其数据文件外包到云服务器中共享对企业公司具有很大的吸引力,因为云计算可以提供所需的特性,如按需自助服务、广泛的网络访问和快速的弹性。然而,通过将数据文件上传到云服务器,数据所有者(即公司)将失去对自己数据的控制。这使得使用基于属性的加密(ABE)变得至关重要,因为它可以通过以加密形式上传数据文件来帮助保护数据机密性。此外,通过只允许授权用户基于一组属性解密加密的数据文件,它可以帮助简化对数据的访问。然而,这种ABE方法包括三个关键问题。第一个问题是大规模云环境中用户秘密密钥管理的复杂性。二是撤销用户访问权限的复杂性。第三是分配用户权限、加密和访问数据文件所涉及的计算复杂性。针对这三个问题,本文提出了一种用于大规模协作云环境的去中心化密文策略ABE方案(CP-DABE)。该方案通过在主授权机构和多个多属性授权机构之间提供安全的属性委托服务,降低了用户秘密密钥管理的复杂性。该方案还通过使用代理重加密技术撤销任何用户的访问权限,降低了撤销过程的复杂性。此外,与大多数相关工作相比,该方案减少了分配用户权限、加密和访问数据文件的计算量。该方案支持任意的LSSS访问结构。本文给出了CP-DABE方案的密码结构,并对其有效性进行了分析和比较。在决策双线性Diffie-Hellman指数假设下,讨论了CP-DABE方案的安全性,并有选择地证明了其抗选择明文攻击的安全性。最后,对CP-DABE方案的扩展进行了讨论。
{"title":"Decentralized attribute-based encryption scheme with scalable revocation for sharing data in public cloud servers","authors":"Adel Binbusayyis, Ning Zhang","doi":"10.1109/CLOUDTECH.2015.7336985","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336985","url":null,"abstract":"With the rapid development of cloud computing, it is attractive for enterprise companies to outsource their data files for sharing in cloud servers, as cloud computing can offer desirable characteristics, such as on-demand self-service, broad network access, and rapid elasticity. However, by uploading data files onto cloud servers, data owners (i.e. the companies) will lose control over their own data. This makes it essential to use Attribute-based encryption (ABE) because it can help to protect the data confidentiality by uploading data files in encrypted form. In addition, it can help to facilitate granting access to data by allowing only authorized users to decrypt the encrypted data files based on a set of attributes. However, this ABE approach includes three key issues. The first one is the complexity of user secret key management for large-scale cloud environments. The second is the complexity of revoking the users access rights. The third is the computational complexity involved in assigning user rights, encrypting and accessing data files. This paper addresses these three issues by proposing a decentralized ciphertext-policy ABE scheme (CP-DABE) for a large-scale cooperative cloud environment. The scheme reduces the complexity of user secret key management by providing a secure attribute delegation services between a master authority and a number of multiple attribute authorities. The scheme also reduces the complexity of revocation process by using Proxy Re-encryption technique to revoke any users access right. In addition, by comparing with most relative work, the scheme reduces the computational requirements for assigning user rights, encrypting and accessing data files. The scheme can support any LSSS access structure. In this paper, the cryptographic construction of the CP-DABE scheme is presented, and its efficiency is analyzed and compared with most relative work. The security of the CP-DABE scheme is discussed and selectively proved against chosen-plaintext attacks under the decisional Bilinear Diffie-Hellman Exponent assumption. Finally, ideas to extend the CP-DABE scheme are discussed.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133718405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Implementing knowledge management systems in cloud-based environments: A case study in a computer science high school 在基于云的环境中实现知识管理系统:一所计算机科学高中的案例研究
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7337008
M. Mostefai, Amina Annane, Lylia Kissoum, M. Ahmed-Nacer
Knowledge Management Systems are a special class of information systems that support the knowledge management processes. One of the most important barriers that could compromise the KMS implementation is the cost related to the acquisition and the maintenance of the required IT infrastructure. This paper presents how cloud computing could be an alternative to traditional on-premise based implementation project and discusses a case study where a KMS has been implemented in a high school context using a cloud-based environment.
知识管理系统是支持知识管理过程的一类特殊信息系统。可能危及KMS实现的最重要障碍之一是与所需IT基础设施的获取和维护相关的成本。本文介绍了云计算如何成为传统的基于内部部署的实施项目的替代方案,并讨论了一个案例研究,该案例研究使用基于云的环境在高中环境中实现了KMS。
{"title":"Implementing knowledge management systems in cloud-based environments: A case study in a computer science high school","authors":"M. Mostefai, Amina Annane, Lylia Kissoum, M. Ahmed-Nacer","doi":"10.1109/CLOUDTECH.2015.7337008","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337008","url":null,"abstract":"Knowledge Management Systems are a special class of information systems that support the knowledge management processes. One of the most important barriers that could compromise the KMS implementation is the cost related to the acquisition and the maintenance of the required IT infrastructure. This paper presents how cloud computing could be an alternative to traditional on-premise based implementation project and discusses a case study where a KMS has been implemented in a high school context using a cloud-based environment.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129653154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A performance comparison between parallel and lazy fetching in vertically distributed cloud databases 垂直分布的云数据库中并行抓取和延迟抓取的性能比较
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7337005
J. Kohler, Thomas Specht
The following work focuses on the severe performance issues that come along with the vertical data distribution approach of the SeDiCo framework. SeDiCo (A Secure and Distributed Cloud Data Store) is a framework that vertically distributes database data across several clouds in order to maintain data security, protection and privacy. However, this vertical data distribution requires joining data together before any client access. This join is extremely time-consuming and thus, this approach is currently not feasible in practical usage scenarios. In order to overcome those performance issues, this work proposes the introduction of a data cache architecture and two corresponding fetch procedures, i.e. lazy and parallel fetching. We further implemented both strategies, measured their performance and compared them to each other. Our results show that the parallel fetch strategy by far outperforms the lazy fetch strategy. Above that, this work outlines the entire caching architecture of our approach and discusses the two strategies in detail. Finally, this work concludes the measured results and discusses further challenges in the context of the SeDiCo framework as future work tasks.
下面的工作主要关注SeDiCo框架的垂直数据分布方法带来的严重性能问题。SeDiCo(安全分布式云数据存储)是一个框架,它将数据库数据垂直分布在多个云上,以维护数据的安全性、保护和隐私。但是,这种垂直数据分布需要在任何客户机访问之前将数据连接在一起。这种连接非常耗时,因此,这种方法目前在实际使用场景中是不可行的。为了克服这些性能问题,本工作建议引入一个数据缓存架构和两个相应的获取过程,即延迟和并行获取。我们进一步实施了这两种策略,测量了它们的表现并相互比较。我们的结果表明,并行获取策略远远优于延迟获取策略。在此之上,本文概述了我们方法的整个缓存架构,并详细讨论了这两种策略。最后,本工作总结了测量结果,并讨论了SeDiCo框架背景下的进一步挑战,作为未来的工作任务。
{"title":"A performance comparison between parallel and lazy fetching in vertically distributed cloud databases","authors":"J. Kohler, Thomas Specht","doi":"10.1109/CLOUDTECH.2015.7337005","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7337005","url":null,"abstract":"The following work focuses on the severe performance issues that come along with the vertical data distribution approach of the SeDiCo framework. SeDiCo (A Secure and Distributed Cloud Data Store) is a framework that vertically distributes database data across several clouds in order to maintain data security, protection and privacy. However, this vertical data distribution requires joining data together before any client access. This join is extremely time-consuming and thus, this approach is currently not feasible in practical usage scenarios. In order to overcome those performance issues, this work proposes the introduction of a data cache architecture and two corresponding fetch procedures, i.e. lazy and parallel fetching. We further implemented both strategies, measured their performance and compared them to each other. Our results show that the parallel fetch strategy by far outperforms the lazy fetch strategy. Above that, this work outlines the entire caching architecture of our approach and discusses the two strategies in detail. Finally, this work concludes the measured results and discusses further challenges in the context of the SeDiCo framework as future work tasks.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128755948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An overview of variability management in cloud services 云服务中可变性管理的概述
Pub Date : 2015-06-02 DOI: 10.1109/CLOUDTECH.2015.7336976
Khadija Aouzal, H. Hafiddi, Mohamed Dahchour
The Cloud Computing paradigm has enabled the multi-tenancy architectural approach in Cloud applications. In a multi-tenant application, one single instance is shared by many tenants (users). Since each client has its own and particular requirements and context, that are exposed to change in time, the process of realizing customizable and adaptable services becomes complex and difficult to handle. Handling variability has been subject of many research works in the domain of Service Oriented Computing, while less interest was given to variability in Cloud services. Therefore, managing variability in Cloud applications can take benefit from related works in service-oriented computing. In this paper, we present an overview of variability management in Cloud applications, in order to assess the pertinence of the different approaches proposed to tackle this issue.
云计算范式支持云应用程序中的多租户体系结构方法。在多租户应用程序中,单个实例由多个租户(用户)共享。由于每个客户端都有自己的特定需求和上下文,随时可能发生变化,因此实现可定制和可适应服务的过程变得复杂且难以处理。在面向服务的计算领域中,处理可变性一直是许多研究工作的主题,而对云服务中的可变性的兴趣较少。因此,管理云应用程序中的可变性可以从面向服务的计算中的相关工作中获益。在本文中,我们概述了云应用程序中的可变性管理,以评估提出的解决这一问题的不同方法的相关性。
{"title":"An overview of variability management in cloud services","authors":"Khadija Aouzal, H. Hafiddi, Mohamed Dahchour","doi":"10.1109/CLOUDTECH.2015.7336976","DOIUrl":"https://doi.org/10.1109/CLOUDTECH.2015.7336976","url":null,"abstract":"The Cloud Computing paradigm has enabled the multi-tenancy architectural approach in Cloud applications. In a multi-tenant application, one single instance is shared by many tenants (users). Since each client has its own and particular requirements and context, that are exposed to change in time, the process of realizing customizable and adaptable services becomes complex and difficult to handle. Handling variability has been subject of many research works in the domain of Service Oriented Computing, while less interest was given to variability in Cloud services. Therefore, managing variability in Cloud applications can take benefit from related works in service-oriented computing. In this paper, we present an overview of variability management in Cloud applications, in order to assess the pertinence of the different approaches proposed to tackle this issue.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132148817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2015 International Conference on Cloud Technologies and Applications (CloudTech)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1