Privacy preserved entrust mechanism in cloud computing environment

Jongyoul Park, Seungyun Lee

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Cloud computing technology enables service to add special characteristics such as remote execution, service mobility and virtual workspace in a handheld device. However, it has a limitation on application areas for the reason that mobile applications distinctly need a help of the host computer. To eliminate those threats, hash chain based approaches are proposed [1][2]. However, it also has some restriction that a mobile device sends request messages to each server when the device needs a multi-entity co-operative work. Therefore, this paper introduces a concept of secure entrustment, which provides most near and trusted servers whenever your mobile devices want to use a trusted computing.

Original languageEnglish
Title of host publicationProceedings - 6th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2011
Pages653-658
Number of pages6
StatePublished - 2011
Event6th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2011 - Seogwipo, Jeju Island, Korea, Republic of
Duration: 29 Nov 20111 Dec 2011

Publication series

NameProceedings - 6th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2011

Conference

Conference6th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2011
Country/TerritoryKorea, Republic of
CitySeogwipo, Jeju Island
Period29/11/111/12/11

Fingerprint

Dive into the research topics of 'Privacy preserved entrust mechanism in cloud computing environment'. Together they form a unique fingerprint.

Cite this