Security from the transparent computing aspect


Autoria(s): Wang,G; Liu,Q; Xiang,Y; Chen,J
Contribuinte(s)

[Unknown]

Data(s)

01/01/2014

Resumo

Transparent computing is an emerging computing paradigm where the users can enjoy any kind of service over networks on-demand with any devices, without caring about the underlying deployment details. In transparent computing, all software resources (even the OS) are stored on remote servers, from which the clients can request the resources for local execution in a block-streaming way. This paradigm has many benefits including cross-platform experience, user orientation, and platform independence. However, due to its fundamental features, e.g., separation of computation and storage in clients and servers respectively, and block-streaming-based scheduling and execution, transparent computing faces many new security challenges that may become its biggest obstacle. In this paper, we propose a Transparent Computing Security Architecture (TCSA), which builds user-controlled security for transparent computing by allowing the users to configure the desired security environments on demand. We envision, TCSA, which allows the users to take the initiative to protect their own data, is a promising solution for data security in transparent computing. © 2014 IEEE.

Identificador

http://hdl.handle.net/10536/DRO/DU:30072052

Idioma(s)

eng

Publicador

IEEE

Relação

http://dro.deakin.edu.au/eserv/DU:30072052/t045746-evid-securitypeerrvwspcfc-2014.pdf

http://dro.deakin.edu.au/eserv/DU:30072052/t052436-wang-gj-securityfromthetranspare.pdf

http://dro.deakin.edu.au/eserv/DU:30072052/t053442-evid-conficnc-2014.pdf

http://www.dx.doi.org/10.1109/ICCNC.2014.6785334

Direitos

2014, IEEE

Palavras-Chave #security architecture #Transparent computing #user-controlled cloud computing
Tipo

Conference Paper