Cloud computing provides computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services. Some companies and organizations are becoming increasingly concerned about the costs of creating and maintaining applications in traditional ways, and are considering running their applications in a cloud computing environment maintained by cloud providers. In the development of cloud computing system, establishing trust and mutual non-repudiation becomes one of the most important research topics. Some organizations, governments, companies, and users do not dare to use the services from cloud system because they concern the security of the cloud system. If we can successfully establish mutual non-repudiation and trust in the cloud system, we can increase the popular of the cloud system. In this project, we focus on the real-time auditing and proof-of-violation for Cloud database systems. The developed auditing schemes by previous researchers including Merkle hash tree, aggregate signature, signature chain, and bloom filter cannot solve all the problems. We will develop a new scheme to solve this problem.
|Effective start/end date||2017/08/01 → 2018/07/31|
- Cloud Audit
- Cloud Trust
- Cloud Database
Explore the research topics touched on by this project. These labels are generated based on the underlying awards/grants. Together they form a unique fingerprint.