Title :
Application of a Distributed Security Method to End-2-End Services Security in Independent Heterogeneous Cloud Computing Environments
Abstract :
Security of service usage in a heterogeneous independently-operated interoperable cloud computing environments (ICE), is a multi-faceted problem, from trust in service performance in conformance with the service specification, to trust in and security of the interaction between the service requestor and service. These issues are compounded in an ICE as there may not be a single source of trust or guarantor or centralized enforcer of security and other control mechanisms. This paper proposes a solution to the problem of trust and security of the interaction between the service requestor and service provider in an ICE, and presents its performance under various threat scenarios.
Keywords :
cloud computing; open systems; security of data; ICE; distributed security method; end-2-end services security; interoperable cloud computing environments; multi-faceted problem; service specification; threat; trust problem; Access control; Cloud computing; Ice; Privacy; Public key; end-to-end security; heterogeneous clouds; interoperable clouds;
Conference_Titel :
Services (SERVICES), 2011 IEEE World Congress on
Conference_Location :
Washington, DC
Print_ISBN :
978-1-4577-0879-4
Electronic_ISBN :
978-0-7695-4461-8
DOI :
10.1109/SERVICES.2011.34