2014 IEEE Conference on Open Systems (ICOS) 2014
DOI: 10.1109/icos.2014.7042634
|View full text |Cite
|
Sign up to set email alerts
|

Achieving trust in cloud computing using secure data provenance

Abstract: Cloud computing is the next generation computer system which extends network architecture into dynamic and large scale capacity by using visualization techniques. Transparent and secure data provenance will enhance the level of trust in the Cloud. Recent literature on securing data provenance focuses only on providing partial part of security elements in their mechanisms, thus they could not provide full protection to the data provenance as a whole. This paper presents the provenance description and challenges… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…The accumulation and access of data provenance are additionally essential to be a verified procedure. The proposed trust model is portrayed for cloud computing in [6]. High trust can be accomplished utilizing a similar model in IoT condition.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The accumulation and access of data provenance are additionally essential to be a verified procedure. The proposed trust model is portrayed for cloud computing in [6]. High trust can be accomplished utilizing a similar model in IoT condition.…”
Section: Related Workmentioning
confidence: 99%
“…The data provenance can be imitated or altered by an unapproved party if the provenance isn't appropriately ensured by executing unproductive security methods. So as to build up the trust of IoT, a solution for security ought to be planned which is light-weight and profoundly verified [6]. The majority of the security algorithms and cryptography procedures utilized today comprises of huge computational complexity with heightened energy utilization.…”
Section: Introductionmentioning
confidence: 99%
“…Based on experiments conducted using objects {A,B} and {A,C}, {D,E}, {F,G}, {F,H} the solution converges to different figures when [1,2], [2,3], [2,4], [2,5], [2,6] root interval are used. Table 3 shows the convergence and functional values of the experiments …”
Section: Data Sets For Conducted Experimentsmentioning
confidence: 99%
“…The testing experiments have generated five different scenarios for the objects {A,B} and {A,C}, {D,E}, {F,G}, {F,H} and the test values [1,2], [2,3], [2,4], [2,5] and [2,6] respectively. The authors chose to carry out these separate tests for two main reasons: To find the convergence of the roots that are treated as data objects that move within the cloud and to find the functional object that will help to show how closeness the objects can be during data provenance.…”
Section: Concept Evaluationmentioning
confidence: 99%
See 1 more Smart Citation