Abstract
In this paper, we propose an architecture for the service accountability in order to provide the trustworthy cloud services for the Cloud End Consumers and also define the structure of document to represent the policy of service accountability. As a result, we show the proposed scheme makes more effective system performance by compared with some exist schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Macko, P., Chiarini, M., Seltzer, M.: Collecting provenance via the xen hypervisor. In: Proceedings of 3rd USENIX Workshop on the Theory and Practice of Provenance (TaPP 2011) (2011)
Muniswamy-Reddy, K., Macko, P., Seltzer, M.: Provenance for the Cloud (2010). https://www.usenix.org/legacy/event/fast10/tech/full_papers/muniswamy-reddy.pdf
Muniswamy-Reddy, K., Braun, U., Holland, D.A., Macko, P., Maclean, D., Margo, D., Seltzer, M., Smogor, R.: Layering in provenance systems. In: Proceedings of the 2009 USENIX Annual Technical Conference (USENIX 2009) (2009)
Ko, R.K.L.: Data accountability in cloud systems. In: Security. Privacy and Trust in Cloud Systems, pp. 211–238. Springer-Verlag (2014)
Ko, R.K.L., et al.: TrustCloud: a framework for accountability and trust in cloud computing. In: 2011 IEEE World Congress on Services, pp. 584–588 (2011)
Zhan, O.Q., Krichberg, M., Ko, R.K.L., Lee, B.S.: How to track your data: the case for cloud computing provenance. In: 2011 IEEE International Conference on Cloud Computing Technology and Science, pp. 446–453 (2011)
Zhang, O.Q., Ko, R.K.L., Kirchberg, M., Suen, C.H., Jagadpramana, P., Lee, B.S.: How to track your data: rule-based data provenance tracing algorithms. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communication, pp. 1429–1437 (2012)
Ko, R.K.L., Jagadpramana, P., Lee, B.S.: Flogger: a file-centric logger for monitoring file access and transfers within cloud computing environments. In: 2011 IEEE 10th International Conference of on Trust, Security and Privacy in Computing and Communications(TrustCom), pp. 765–771 (2011)
Pearson, S., et al.: Accountability for cloud and other future internet services. In: IEEE 5th International Conference on Cloud Computing Technology and Science, pp. 629–632 (2012)
A4Cloud Project. http://www.a4cloud.eu/
Papanikolaou, N., Pearson, S., Mont, M.C., Ko, R.K.L.: A Toolkit for Automating Compliance in Cloud Computing Services. International Journal of Cloud Computing 3(1), 46–68 (2014)
Accorsi, R.: A secure log architecture to support remote auditing. Mathematical and Computer Modelling 57, 1578–1791 (2013)
Gehani, A., Ciocarlie, G.F., Shankar, N.: Accountable clouds. In: 2013 IEEE International Conference on Technologies for Homeland Security(HST), pp. 403–407 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media Singapore
About this paper
Cite this paper
Lee, H., Kim, Hi., Seo, C., Shin, S.U. (2015). Framework of Service Accountability and Policy Representation for Trustworthy Cloud Services. In: Park, DS., Chao, HC., Jeong, YS., Park, J. (eds) Advances in Computer Science and Ubiquitous Computing. Lecture Notes in Electrical Engineering, vol 373. Springer, Singapore. https://doi.org/10.1007/978-981-10-0281-6_63
Download citation
DOI: https://doi.org/10.1007/978-981-10-0281-6_63
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0280-9
Online ISBN: 978-981-10-0281-6
eBook Packages: Computer ScienceComputer Science (R0)