The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - Feb. (2013 vol.46)
pp: 76-84
Mukesh Singhal , University of California, Merced
Santosh Chandrasekhar , University of California, Merced
Tingjian Ge , University of Massachusetts Lowell
Ravi Sandhu , University of Texas at San Antonio
Ram Krishnan , University of Texas at San Antonio
Gail-Joon Ahn , Arizona State University
Elisa Bertino , Purdue University
ABSTRACT
A proposed proxy-based multicloud computing framework allows dynamic, on-the-fly collaborations and resource sharing among cloud-based services, addressing trust, policy, and privacy issues without preestablished collaboration agreements or standardized interfaces.
INDEX TERMS
Cloud computing, Collaboration, Resource management, Standards, Contracts, Privacy, Network security, security and privacy, cloud computing
CITATION
Mukesh Singhal, Santosh Chandrasekhar, Tingjian Ge, Ravi Sandhu, Ram Krishnan, Gail-Joon Ahn, Elisa Bertino, "Collaboration in Multicloud Computing Environments: Framework and Security Issues", Computer, vol.46, no. 2, pp. 76-84, Feb. 2013, doi:10.1109/MC.2013.46
REFERENCES
1. P. Mell and T. Grance, The NIST Definition of Cloud Computing, special publication 800-145, Nat'l Inst. Standards and Technology, 2011, p. iii + 3.
2. D. Bernstein and D. Vij, “Intercloud Security Considerations,” Proc. 2nd Int'l Conf. Cloud Computing (CloudCom 10), IEEE Press, 2010, pp. 537-544.
3. R. Buyya et al., “Market-Oriented Cloud Computing: Vision, Hype, and Reality of Delivering Computing as the 5th Utility,” Proc. 9th IEEE/ACM Int'l Symp. Cluster Computing and the Grid (CCGRID 09), IEEE CS, 2009, pp. 599-616.
4. B. Rochwerger et al., “Reservoir—When One Cloud Is Not Enough,” Computer, Mar. 2011, pp. 44-51.
5. M.P. Papazoglou and W. van den Heuvel,“Blueprinting the Cloud,” IEEE Internet Computing, Nov./Dec 2011, pp. 74-79.
6. S. Ortiz Jr., “The Problem with Cloud Computing Standardization,” Computer, July 2011, pp. 13-16.
7. P. Mell and T. Grance, “Perspectives on Cloud Computing and Standards, NIST Information Technology Laboratory,” Nat'l Inst. Standards and Technology, 2008; http://csrc.nist.gov/groups/SMA/ispab/documents/ minutes/2008-12cloud-computing-standards_ISPAB-Dec2008_P-Mell.pdf .
8. W. Jansen and T. Grance, Guidelines on Security and Privacy in Public Cloud Computing, special publication 800-144, Nat'l Inst. Standards and Technology, 2011, p. x + 70.
9. S. Chandrasekhar et al., “Efficient Proxy Signatures Based on Trapdoor Hash Functions,” IET Information Security, Dec. 2010, pp. 322-332.
10. C.M. Ellison et al., SPKI Certificate Theory, IETF RFC 2693, Sept. 1999; www.ietf.org/rfcrfc2693.txt.
11. E. Hammer-Lahav ed., The OAuth 1.0 Protocol, IETF RFC 5849, Apr. 2010; http://tools.ietf.org/htmlrfc5849.
12. Y. Zhang and J.B.D. Joshi, “Access Control and Trust Management for Emerging Multidomain Environments,” Ann. Emerging Research in Information Assurance, Security and Privacy Services, Emerald Group Publishing, 2009, pp. 421-452.
13. J. Jin et al., “Patient-Centric Authorization Framework for Electronic Healthcare Services,” Computers & Security, Mar.-May 2011, pp. 116-127.
14. R. Wu, G.J. Ahn, and H. Hu, “Towards HIPAA-Compliant Healthcare Systems,” Proc. 2nd ACM Int'l Symp. Health Informatics (IHI 12), ACM, 2012, pp. 593-602.
15. N.R. Adam and J.C. Wortmann, “Security-Control Methods for Statistical Databases: A Comparative Study,” ACM Computing Surveys, Mar. 1989, pp. 515-556.
16. L. Xiong, S. Chitti, and L. Liu, “Preserving Data Privacy in Outsourcing Data Aggregation Services,” ACM Trans. Internet Technology, Aug. 2007, p. 17.
17. D.J. Abadi, S. Madden, and M. Ferreira, “Integrating Compression and Execution in Column-Oriented Database Systems,” Proc. ACM SIGMOD Int'l Conf. Management of Data (SIGMOD 06), ACM, 2006, pp. 671-682.
31 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool