An anonymous remote attestation for trusted cloud computing

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Cloud computing provides users and companies a cost-efficient and flexible service. However, for a cloud computing client, one of most worrying problems is that IT infrastructure is under control of the cloud provider. To secure cloud users' computation, efficient remote attestation protocol is required. In this paper, by combining trusted computing and dynamic accumulators, we put forward an anonymous remote attestation scheme for cloud computing service provider. Under the help of online or offline trusted third parties, a user can attest remote trusted nodes and establish a secure communication. In addition, the scheme can also protect privacy of trusted nodes and greatly reduce the cost of storage and management.

Original languageEnglish
Title of host publicationProceedings - 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, IEEE CCIS 2012
Pages426-429
Number of pages4
DOIs
StatePublished - 13 Nov 2013
Event2012 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, IEEE CCIS 2012 - Hangzhou, China
Duration: 30 Oct 20121 Nov 2012

Publication series

NameProceedings - 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, IEEE CCIS 2012
Volume1

Conference

Conference2012 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, IEEE CCIS 2012
Country/TerritoryChina
CityHangzhou
Period30/10/121/11/12

Keywords

  • Cloud computing
  • Remote attestation

Fingerprint

Dive into the research topics of 'An anonymous remote attestation for trusted cloud computing'. Together they form a unique fingerprint.

Cite this