The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
as data size is growing up, cloud storage is becoming more familiar to store a significant amount of private information. Government and private organizations require transferring plenty of business files from one end to another. However, we will lose privacy if we exchange information without data encryption and communication mechanism security. To protect data from hacking, we can use Asymmetric...
With the rapid development of cloud services, the techniques for securely outsourcing the prohibitively expensive computations to untrusted servers are getting more and more attention in the scientific community. Exponentiations modulo a large prime have been considered the most expensive operations in discrete-logarithm-based cryptographic protocols, and they may be burdensome for the resource-limited...
Cloud Computing is a recent paradigm that is creating high expectations about benefits such as the pay-per-use model and elasticity of resources. However, with this optimism come also concerns about security. In a public cloud, the user's data storage and processing is no longer done inside its premises, but in data centers owned and administrated by the cloud provider. This may be a concern for organizations...
This paper studies the possibility of using TCG (Trusted Computing Group) specifications to establish trust in Cloud Computing, especially between the provider of Cloud Computing infrastructures and his customers. The first part describes the context and the motivations that led to TCG specifications. The second part describes the architecture, the functions and the properties of TPM (Trusted Platform...
Software-as-a-service (SaaS) provides developers a new convenient venue to distribute software by utilizing a cloud computing infrastructure. But as vendors start to deploy applications, and users upload data in cloud to utilize them, a new privacy concern arises, because data users would like to preserve their data (and maybe even their identities) private from the software provider. While cloud...
The cloud is a next generation platform that provides dynamic resource pools, virtualization, and high availability. Today, we have the ability to utilize scalable, distributed computing environments within the confines of the Internet, a practice known as cloud computing. Cloud computing is the Concept Implemented to decipher the Daily Computing Problems, likes of Hardware Software and Resource Availability...
We propose a framework of data center consolidation with virtual private network and discuss the benefits and challenges of the proposed framework. After reviewing related background such as cloud computing and virtual private network, a preliminary case study in food industry by using our proposed framework is present to validate our idea. We believe that it paves the way to the future enterprise...
Any endpoint with network connection may be our workbench as new computing models like cloud computing arise. We've designed a protocol to establish the user's trust in public endpoints covering hardware, firmware as well as software components. Three parties are involved for trust establishment: the user with a chip (MTPCM) to actively measure the platform, the endpoint owners who offer the platforms...
The commercial success of Cloud computing and recent developments in Grid computing have brought platform virtualization technology into the field of high performance computing. Virtualization offers both more flexibility and security through custom user images and user isolation. In this paper, we deal with the problem of distributing virtual machine (VM) images to a set of distributed compute nodes...
In this paper we present PasS (privacy as a service); a set of security protocols for ensuring the privacy and legal compliance of customer data in cloud computing architectures. PasS allows for the secure storage and processing of users' confidential data by leveraging the tamper-proof capabilities of cryptographic coprocessors. Using tamper-proof facilities provides a secure execution domain in...
Cloud computing is a new computing style which provides IT infrastructure and software as dynamic, scalable, and pay-per-use services. One of its characteristics is that enterprise data are hosted by storage service providers in the cloud. Hence strong data security must be taken into account for planning migration of business applications into the cloud. In this paper we analyze privacy requirements...
Software license management allows independent software vendors (ISVs) to control the access of their products. It is a fundamental part of the ISVs' business strategy. A wide range of products has been developed in order to address license management. There are, however, only few ongoing works with regard to license management in grid and cloud computing environments. This paper presents our work...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.