Szczegóły publikacji

Opis bibliograficzny

Analysis of selected cryptographic services for processing batch tasks in Cloud Computing systems / Agnieszka Jakóbik, Jacek TCHÓRZEWSKI // W: Modeling and simulation in HPC and cloud systems / eds. Joanna Kołodziej, Florin Pop, Ciprian Dobre. — Cham : Springer International Publishing AG, cop. 2018. — (Studies in Big Data ; ISSN 2197-6503 ; vol. 36). — ISBN: 978-3-319-73766-9; e-ISBN: 978-3-319-73767-6. — S. 135–155. — Bibliogr. s. 154–155, Abstr. — Publikacja dostępna online od: 2018-02-01. — J. Tchórzewski - pierwsza afiliacja: Tadeusz Kościuszko Cracow University of Technology


Autorzy (2)


Dane bibliometryczne

ID BaDAP112321
Data dodania do BaDAP2018-02-20
Tekst źródłowyURL
DOI10.1007/978-3-319-73767-6_8
Rok publikacji2018
Typ publikacjifragment książki
Otwarty dostęptak
WydawcaSpringer
Czasopismo/seriaStudies in Big Data

Abstract

This chapter evaluates the features and a computational load of two proposed cryptographic procedures which aim to protect confidentiality and data integrity in Cloud Computing (CC) systems. It should be kept in mind that a bad use of some cryptographic tools may negatively impact the overall CC operation. Regarding this, meeting the Quality of Service (QoS) requirements is only possible when the security layer applied does not interrupt the computing process. The security layer applied to tasks should also fulfill the advanced security conditions present in CC systems. Thus, the solutions aiming to protect both the user data as well as the whole system have to deliver the scalability, multi-tenancy and complexity that these systems demand. We present a cryptographic service based on blind RSA algorithm and Shamir secret sharing that supports batch tasks processing. Hence, this service is suitable for CC systems equipped with a monolithic central scheduler and many Virtual Machines (VMs) as working nodes. Blind RSA cryptographic system is used to encrypt the data without actually knowing any details about the tasks content. Shamir secret sharing procedure is proposed in order to assure whether all VMs in the system gave back their shares after deploying the batch of tasks on them or not.

Publikacje, które mogą Cię zainteresować

fragment książki
Virtualization model for processing of the sensitive mobile data / Andrzej WILCZYŃSKI, Joanna Kołodziej // W: Modeling and simulation in HPC and cloud systems / eds. Joanna Kołodziej, Florin Pop, Ciprian Dobre. — Cham : Springer International Publishing AG, cop. 2018. — (Studies in Big Data ; ISSN 2197-6503 ; vol. 36). — ISBN: 978-3-319-73766-9; e-ISBN: 978-3-319-73767-6. — S. 121–133. — Bibliogr. s. 132–133, Abstr. — Publikacja dostępna online od: 2018-02-01. — A. Wilczyński - pierwsza afiliacja: Cracow University of Technology
fragment książki
Cognitive codes for authentication and management in cloud computing infrastructures / Marek R. OGIELA, Lidia Ogiela // W: Advances on P2P, Parallel, Grid, Cloud and Internet Computing : proceedings of the 13th international conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC-2018) / eds. Fatos Xhafa [et al.]. — Cham : Springer Nature Switzerland, cop. 2019. — (Lecture Notes on Data Engineering and Communications Technologies ; ISSN 2367-4512 ; vol. 24). — ISBN: 978-3-030-02606-6; e-ISBN: 978-3-030-02607-3. — S. 160–166. — Bibliogr. s. 165–166, Abstr. — Publikacja dostępna online od: 2018-10-17. — L. Ogiela - afiliacja: Pedagogical University of Cracow