DOI QR코드

DOI QR Code

Trust Assurance of Data in Cloud Computing Environment

클라우드 컴퓨팅 환경의 데이터 신뢰 확보

  • 정임영 (서울대학교 컴퓨터공학부 분산컴퓨팅시스템 연구실) ;
  • 조인순 (서울대학교 컴퓨터공학부 분산컴퓨팅시스템 연구실) ;
  • 유영진 (서울대학교 컴퓨터공학부 분산컴퓨팅시스템 연구실)
  • Received : 2011.05.25
  • Accepted : 2011.09.20
  • Published : 2011.09.30

Abstract

Cloud Computing Environment provides users with a blue print of IT Utopia with virtualization; unbounded computing power and data storage free from the cost and the responsibility of maintenance for the IT resources. But, there are several issues to be addressed for the Cloud Computing Environment to be realized as the blue print because users cannot control the IT resources provided by the Cloud Computing Environment but can only use them. One of the issues is how to secure and to trust data in the Cloud Computing Environment. In this paper, an efficient and practical trust assurance of data with provenance in Cloud Computing Environment.

가상화를 통해 원하는 만큼의 컴퓨팅 파워와 데이터 저장 공간을 제공하면서도 관련된 IT자원의 유지보수 비용과 관리에서는 사용자를 해방시켜주는 많은 장점에도 불구하고, 클라우드 컴퓨팅이 가까운 미래에 실질적인 서비스로 자리잡고 활성화를 위해서는 먼저 넘어야 할 장벽들이 있다. 즉, 사용자의 제어 너머에 있는 클라우드 컴퓨팅 환경이 IT서비스와 인프라에 대해 사용자에게는 이용권만을 주기 때문에 비롯되는 여러 문제들이 생기게 된다. 가장 큰 이슈 중의 하나는 클라우드에 저장되는 정보의 보호 및 신뢰성 확보이다. 본 논문에서는 provenance 통한 클라우드 상의 데이터 신뢰확보에 대한 효과적이고 유용한 해법을 제안한다.

Keywords

References

  1. Kiran-Kumar Muniswamy-Reddy, Peter Macko, and Margo Seltzer, "Provenance for the Cloud", in Proceedings of 8th USENIX Conference on File and Storage Technologies (FAST '10), Feb 2010
  2. Kiran-Kumar Muniswamy-Reddy and David A. Holland, "Causality-Based Versioning", ACM Transactions on Storage (ACM TOS), Dec 2009
  3. Wikipedia, http://en.wikipedia.org/wiki/Cloud_computing
  4. H. Erdogmus, "Cloud computing: Does nirvana hide behind the nebula?", IEEE Software 11, 2 (March-April 2009), pp.4-6.
  5. I. Foster, Y. Zhao, I. Raicu, and S. Lu, "Cloud computing and grid computing 360-degree compared", In Proceedings of Grid Computing Environments Workshop, GCE'08 (Austin, TX, 2008), pp.1-10.
  6. R. Gellman, "Privacy in the clouds: Risks to privacy and confidentiality from cloud computing", Tech. rep., February 2009
  7. Pubchem, http://pubchem.ncbi.nln.nih.gov/
  8. Genbank, Nucleic Acids Research 36 (Database Issue) (Jan. 2008)
  9. R. Hasan, R. Sion, and M. Winslett, "Introducing secure provenance: problems and challenges", In Proceedings of ACM workshop on Storage security and survivabilit, StorageSS '07 (Alexandria, Virginia, USA, October 2007), pp.13-18.
  10. L. M. Kaufman, "Data security in the world of cloud computing", IEEE Security & Privacy 7, 4 (July-Aug. 2009), pp.61-64. https://doi.org/10.1109/MSP.2009.87
  11. Luc Moreau, Ben Clifford, Juliana Freire, Joe Futrelle, Yolanda Gil, Paul Groth, Natalia Kwasnikowska, Simon Miles, Paolo Missier, Jim Myers, Beth Plale, Yogesh Simmhan, Eric Stephan, Jan Van den Bussche, "The Open Provenance Model core specification (v1.1)", Future Generation Computer Systems, 2010, doi:10.1016/j.future. 2010. 07. 005
  12. T. Sterling, and D. Stark, "A high-performance computing forecast: Partly cloudy", Computing in Science & Engineering 11, 4 (July-Aug. 2009), pp.42-49. https://doi.org/10.1109/MCSE.2009.111
  13. J. Voas, and J. Zhang, "Cloud computing: New wine or just a new bottle?", IT Professional 11, 2 (March-April 2009), pp.15-17. https://doi.org/10.1109/MITP.2009.23
  14. Crypto++ library 5.5.2, available at http://www.cryptopp.com/
  15. QuickHash Library, available at http://www.slavasoft.com/quickhash/index.htm
  16. Z. CHEN, AND L. MOREAU, "Implementation and evaluation of a protocol for recording process documentation in the presence of failures." In Proceedings of Second International Provenance and Annotation Workshop (IPAW'08).
  17. I. FOSTER, J. VOECKLER, M. WILDE, AND Y. ZHAO, "The Virtual Data Grid: A New Model and Architecture for Data-Intensive Collaboration.", In CIDR (Asilomar, CA, Jan. 2003).
  18. P. GROTH, L. MOREAU, AND M. LUCK, "Formalising a protocol for recording provenance in grids. In Proceedings of the UK OST e-Science Third All Hands Meeting 2004 (AHM'04) (Nottingham,UK, Sept. 2004). Accepted for publication.
  19. Y. L. SIMMHAN, B. PLALE, AND D. GANNON, "A framework for collecting provenance in data-centric scientific workflows", In ICWS '06: Proceedings of the IEEE International Conference on Web Services (2006).
  20. R. Bose, "A conceptual framework for composing and managing scientific data lienage", In Proceedings of the 14th International Conference on Scientific and Statistical Database Management, pp.15–19, 2002.
  21. A. de Keijzer and M. van Keulen, "Quality measures in uncertain data management", Scalable Uncertainty Management, 4772:pp.104-115, 2007. https://doi.org/10.1007/978-3-540-75410-7_8
  22. A. Chapman, B. Blaustein and C. Elsaesser, "Provenance based belief", in Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, July 2010.