User Security Guarantees in Public Infrastructure Clouds
Author(s):
A.Mahendra, M. Shalima Sulthana
Keywords:
Mobile ad hoc networks, query processing, routing, traffic, data replacement attack, node grouping.
Abstract
In this paper, we describe a framework for data and operation security in IaaS, consisting of protocols for trusted launch of virtual machines and domain-based storage protection. The protocols allow trust to be established by remotely attesting host platform configuration prior to launching guest virtual machines and ensure confidentiality of data in remote storage, with encryption keys maintained outside of the IaaS domain. The protocols allow trust to be established by remotely attesting host platform configuration prior to launching guest virtual machines and ensure confidentiality of data in remote storage, with encryption keys maintained outside of the IaaS domain. Presented experimental results demonstrate the validity and efficiency of the proposed protocols. The framework prototype was implemented on a test bed operating a public electronic health record system, showing that the proposed protocols can be integrated into existing cloud environments.
Article Details
Unique Paper ID: 145396

Publication Volume & Issue: Volume 4, Issue 9

Page(s): 401 - 406
Article Preview & Download


Share This Article

Join our RMS

Conference Alert

NCSEM 2024

National Conference on Sustainable Engineering and Management - 2024

Last Date: 15th March 2024

Call For Paper

Volume 10 Issue 10

Last Date for paper submitting for March Issue is 25 June 2024

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews