Improving the Security and Usability of Cloud Services with User-centric Security Models by Saman Zarandioon

نویسندگان

  • Saman Zarandioon
  • Vinod Ganapathy
چکیده

OF THE DISSERTATION Improving the security and usability of cloud services with user-centric security models by Saman Zarandioon Dissertation Director: Danfeng Yao and Vinod Ganapathy Cloud computing is a paradigm shift in the way we define software and hardware, and architect our IT solutions. The emerging cloud technologies, due to their various unique and attractive properties, are evolving with tremendous momentum and rapidly being adopted throughout the IT industry. In this dissertation, we identify security challenges that arise in integration of cloud-based services, and present a set of novel solutions to address them. We analyze the security of our solutions, demonstrate their usage and effectiveness, and evaluate their performance by extensive experimentation. To address the problem of access control in untrusted cloud storage, we introduce K2C (Key To Cloud) protocol, which is a cryptographic access control protocol based on our new key-updating scheme referred to as AB-HKU. To improve the security and usability of integrated cloud services, we introduce a flexible client-side integration framework called OMOS. This framework enables secure and seamless client-side integration of cloud-based resources and services. Finally, to address the problem of identity management in an integrated cloud environment, we present a user-centric identity management solution called Web2ID. Our Web2ID protocol, by leveraging secure client-side cryptography and communication, introduces a privacy-preserving and secure mechanism for user authentication, fine-grained access delegation and identity attribute exchange.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access

Security and privacy concerns hinder the adoption of cloud storage and computing in sensitive environments. We present a user-centric privacypreserving cryptographic access control protocol called K2C (Key To Cloud) that enables end-users to securely store, share, and manage their sensitive data in an untrusted cloud storage anonymously. K2C is scalable and supports the lazy revocation. It can ...

متن کامل

Usability evaluation of the user interface in electronic prescribing systems of Iran Health Insurance Organization and Social Security Organization

Introduction: The e-prescribing system is one of the basic technologies in the health system structure which was developed with the aim of properly managing healthcare resources and services, preventing common manual prescribing errors, and increasing patient safety. Given that the user interface of e-prescribing system is considered as the main factor of user acceptance, the purpose of the pre...

متن کامل

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

User centric cloud service model in public sectors: Policy implications of cloud services

This study examines the acceptance of cloud computing services in government agencies by focusing on the key characteristics that affect behavioral intent. The study expanded upon the technology acceptance model by incorporating contextual factors such as availability, access, security, and reliability. The research model was empirically verified by investigating the perception of users working...

متن کامل

Image flip CAPTCHA

The massive and automated access to Web resources through robots has made it essential for Web service providers to make some conclusion about whether the "user" is a human or a robot. A Human Interaction Proof (HIP) like Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) offers a way to make such a distinction. CAPTCHA is a reverse Turing test used by Web serv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012