The Community for Technology Leaders
RSS Icon
Issue No.05 - September/October (2010 vol.14)
pp: 14-22
Kai Hwang , University of Southern California, Los Angeles
Deyi Li , Tsinghua University, Beijing
Trust and security have prevented businesses from fully accepting cloud platforms. To protect clouds, providers must first secure virtualized data-center resources, uphold user privacy, and preserve data integrity. The authors suggest using a trust-overlay network over multiple data centers to implement a reputation system for establishing trust between service providers and data owners. Data coloring and software watermarking techniques protect shared data objects and massively distributed software modules. These techniques safeguard multi-way authentications, enable single sign-on in the cloud, and tighten access control for sensitive data in both public and private clouds.
Internet clouds, data centers, network security, trust overlays, reputation system, data coloring, software watermarking
Kai Hwang, Deyi Li, "Trusted Cloud Computing with Secure Resources and Data Coloring", IEEE Internet Computing, vol.14, no. 5, pp. 14-22, September/October 2010, doi:10.1109/MIC.2010.86
1. K. Hwang, G. Fox, and J. Dongarra, Distributed Systems and Cloud Computing: Clusters, Grids/P2P, and Internet Clouds, Morgan Kaufmann, to appear, 2010.
2. K. Hwang, S. Kulkarni, and Y. Hu, "Cloud Security with Virtualized Defense and Reputation-Based Trust Management," IEEE Int'l Conf. Dependable, Autonomic, and Secure Computing (DASC 09), IEEE CS Press, 2009.
3. J. Nick, "Journey to the Private Cloud: Security and Compliance," tech. presentation, EMC, Tsinghua Univ., 25 May 2010.
4. S. Song et al., "Trusted P2P Transactions with Fuzzy Reputation Aggregation," IEEE Internet Computing, vol. 9, no. 6, 2005, pp. 24–34.
5. "Security Guidance for Critical Areas of Focus in Cloud Computing," Cloud Security Alliance, Apr. 2009; .
6. T. Mather, S. Kumaraswamy, and S. Latif, Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, O'Reilly Media, 2009.
7. J. Rittinghouse and J. Ransome, Cloud Computing: Implementation, Management and Security, CRC Publisher, 2010.
8. X. Lou and K. Hwang, "Collusive Piracy Prevention in P2P Content Delivery Networks," IEEE Trans. Computers, July 2009, pp. 970–983.
9. C. Clark et al., "Live Migration of Virtual Machines," Proc. Symp. Networked Systems Design and Implementation, 2005, pp. 273–286.
10. L. Xiong and L. Liu, "PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities," IEEE Trans. Knowledge and Data Eng., July 2004, pp. 843–857.
11. R. Zhou and K. Hwang, "PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing," IEEE Trans. Parallel and Distributed Systems, Apr. 2007, pp. 460–473.
12. C. Collberg and C. Thomborson, "Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection," IEEE Trans. Software Eng., vol. 28, 2002, pp. 735–746.
13. D. Li, C. Liu, and W. Gan, "A New Cognitive Model: Cloud Model," Int'l J. Intelligent Systems, Mar. 2009, pp. 357–375.
14. D. Li and Y. Du, Artificial Intelligence with Uncertainty, Chapman & Hall, 2008.
481 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool