Trusted third party services for health care in Europe
Future Generation Computer Systems
Security models for web-based applications
Communications of the ACM
Security in Computing
A survey of trust in computer science and the Semantic Web
Web Semantics: Science, Services and Agents on the World Wide Web
Grid and Cloud Computing: A Business Perspective on Technology and Applications
Grid and Cloud Computing: A Business Perspective on Technology and Applications
Service selection decision support in the internet of services
GECON'10 Proceedings of the 7th international conference on Economics of grids, clouds, systems, and services
Dynamic trust enhanced security model for trusted platform based services
Future Generation Computer Systems
Establishing and managing trust within the public key infrastructure
Computer Communications
CyberGuarder: A virtualization security assurance architecture for green cloud computing
Future Generation Computer Systems
Editorial: Infrastructure and Network-aware Grids and Service Oriented Architectures
Future Generation Computer Systems
Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm
Future Generation Computer Systems
Towards a Generic Security Framework for Cloud Data Management Environments
International Journal of Distributed Systems and Technologies
Journal of Computer and System Sciences
Collaborative learning in the clouds
Information Systems Frontiers
Embedded systems for global e-Social Science: Moving computation rather than data
Future Generation Computer Systems
Towards secure mobile cloud computing: A survey
Future Generation Computer Systems
Future Generation Computer Systems
Robust and flexible tunnel management for secure private cloud
ACM SIGAPP Applied Computing Review
Survey Cloud monitoring: A survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Controllable privacy preserving search based on symmetric predicate encryption in cloud storage
Future Generation Computer Systems
The technical security issues in cloud computing
International Journal of Information and Communication Technology
Proceedings of the 6th International Conference on Security of Information and Networks
GMonE: A complete approach to cloud monitoring
Future Generation Computer Systems
Design and implementation of a trusted monitoring framework for cloud platforms
Future Generation Computer Systems
Management Issues with Cloud Computing
Proceedings of the Second International Conference on Innovative Computing and Cloud Computing
Efficient multi-keyword ranked query over encrypted data in cloud computing
Future Generation Computer Systems
Improving cloud network security using the Tree-Rule firewall
Future Generation Computer Systems
Architecture and protocol for intercloud communication
Information Sciences: an International Journal
Editorial: The management of cloud systems
Future Generation Computer Systems
CloRExPa: Cloud resilience via execution path analysis
Future Generation Computer Systems
Review: Cloud computing service composition: A systematic literature review
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
The recent emergence of cloud computing has drastically altered everyone's perception of infrastructure architectures, software delivery and development models. Projecting as an evolutionary step, following the transition from mainframe computers to client/server deployment models, cloud computing encompasses elements from grid computing, utility computing and autonomic computing, into an innovative deployment architecture. This rapid transition towards the clouds, has fuelled concerns on a critical issue for the success of information systems, communication and information security. From a security perspective, a number of unchartered risks and challenges have been introduced from this relocation to the clouds, deteriorating much of the effectiveness of traditional protection mechanisms. As a result the aim of this paper is twofold; firstly to evaluate cloud security by identifying unique security requirements and secondly to attempt to present a viable solution that eliminates these potential threats. This paper proposes introducing a Trusted Third Party, tasked with assuring specific security characteristics within a cloud environment. The proposed solution calls upon cryptography, specifically Public Key Infrastructure operating in concert with SSO and LDAP, to ensure the authentication, integrity and confidentiality of involved data and communications. The solution, presents a horizontal level of service, available to all implicated entities, that realizes a security mesh, within which essential trust is maintained.