Heterogeneous Data Access Control based on Trust and Reputation in Mobile Cloud Computing

Zheng Yan, Xueyun Li, Raimo Kantola

Tutkimustuotos: Artikkeli kirjassa/konferenssijulkaisussaChapterScientificvertaisarvioitu

Abstrakti

Cloud computing, as an emerging computing paradigm for service provision on-demand, has blossomed into both academia and industry. One typical cloud service is cloud data storage and processing. By stepping into the era of 5G, Mobile Cloud Computing (MCC) becomes a perfect match to further leverage the limitations of resources and locations for advanced networking services. However, adopting mobile cloud implies placing critical applications and sensitive data in Cloud Service Providers (CSPs) and accessing them with mobile devices. This leads to serious security and usability issues, particularly on cloud data access control. In this chapter, we explore the objectives of data access control in MCC. Based on a literature review, we summarize open research issues in this area. In order to achieve secure and usable cloud data access, we adopt trust and reputation management and investigate three schemes for securing cloud data access based on trust and reputation that can be flexibly applied in different cloud data access scenarios. Furthermore, we evaluate the performance of the schemes through the analysis on security, complexity, scalability and flexibility, as well as scheme implementation. Particularly, important issues and challenges are also discussed in order to propose future research trends.
AlkuperäiskieliEnglanti
OtsikkoAdvances in Mobile Cloud Computing and Big Data under the 5G Era
ToimittajatConstandinos Mavromoustakis, George Mastorakis, Ciprian Dobre
KustantajaSpringer
Sivut65-113
ISBN (elektroninen)978-3-319-45145-9
ISBN (painettu)978-3-319-45143-5
DOI - pysyväislinkit
TilaJulkaistu - 2016
OKM-julkaisutyyppiA3 Kirjan osa tai toinen tutkimuskirja

Julkaisusarja

NimiStudies in Big Data
Vuosikerta22
ISSN (painettu)2197-6503

Sormenjälki

Sukella tutkimusaiheisiin 'Heterogeneous Data Access Control based on Trust and Reputation in Mobile Cloud Computing'. Ne muodostavat yhdessä ainutlaatuisen sormenjäljen.

Siteeraa tätä