2013 UKSim 15th International Conference on Computer Modelling and Simulation 2013
DOI: 10.1109/uksim.2013.39
|View full text |Cite
|
Sign up to set email alerts
|

A Trust Based Approach for Increasing Security in Cloud Computing Infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 25 publications
(10 citation statements)
references
References 2 publications
0
10
0
Order By: Relevance
“…To make the infrastructure secure TCCI approach is proposed which handles the nodes by third party known as Trusted Coordinator (TC). [9] In this paper to share the important data in public cloud securely mediated certificate less encryption scheme is used. This method is used to solve the problem of escrow in identity based and revocation in public key.…”
Section: Materials and Methodologymentioning
confidence: 99%
“…To make the infrastructure secure TCCI approach is proposed which handles the nodes by third party known as Trusted Coordinator (TC). [9] In this paper to share the important data in public cloud securely mediated certificate less encryption scheme is used. This method is used to solve the problem of escrow in identity based and revocation in public key.…”
Section: Materials and Methodologymentioning
confidence: 99%
“…Banirostam et al [13] presented a trust-based approach using trusted computing (TC) which is applied only at the IaaS layer, and as mentioned earlier a cloud end-user also wants security mechanisms configured across the layers of a cloud platform to enable the end-user make a more informed decision. Yang et al [14] proposed data access control mechanism but the security considerations were not sufficient.…”
Section: Related Workmentioning
confidence: 99%
“…Hamid Banirostam et.al [14] described one new approach named Trusted Cloud Computing Infrastructure (TCCI) which was based on Infrastructure security. TCCI approach describes that different nodes are required to run on secure environment so to keep hackers away.…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%