A framework for cryptography based accountability and service invocation control for service composition in a multicloud architecture

Gwan Hwan Hwang, Kuh Yih Huang, Yu Cheng Hsiao

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper we address how to achieve cryptography based accountability and service invocation control in a multicloud architecture. The detection and prevention of failures for a composed service is complicated because service composition spans multiple service providers from different and independent clouds for inter-cloud collaborations. Our system supports strong accountability in which any failure or misbehavior can always be identified and associated with responsible (or guilty) entity(s) because cryptographic proofs are collected during dynamic service composing. These proofs can also be applied to service invocation control. Compared with previous work, the proposed framework does not rely on any on-line or in-line trust third party. Implementation and experimental results are presented that demonstrate the feasibility of the proposed scheme.

Original languageEnglish
Title of host publicationProceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1116-1121
Number of pages6
ISBN (Electronic)9781467379519
DOIs
Publication statusPublished - 2015 Dec 2
Event14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015 - Helsinki, Finland
Duration: 2015 Aug 202015 Aug 22

Publication series

NameProceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015
Volume1

Other

Other14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015
Country/TerritoryFinland
CityHelsinki
Period2015/08/202015/08/22

Keywords

  • Cloud Accountability
  • Cloud trust
  • Nonrepudiation
  • Proof of violation
  • Security

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'A framework for cryptography based accountability and service invocation control for service composition in a multicloud architecture'. Together they form a unique fingerprint.

Cite this