Public key encryption in the cloud computing environments: trust and untrust
With the development of data storage technology and the computerized process of an internet-based technology. Cloud computing systems allow users to store and process data virtually. Users also do not need to prepare a platform or supporting infrastructure, but only need to use existing platforms. F...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
IEEE
2021
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/95842/1/95842_Public%20key%20encryption%20in%20the%20cloud%20computing.pdf http://irep.iium.edu.my/95842/7/95842_Public%20Key%20Encryption_Scopus.pdf http://irep.iium.edu.my/95842/ https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9588879 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Islam Antarabangsa Malaysia |
Language: | English English |
id |
my.iium.irep.95842 |
---|---|
record_format |
dspace |
spelling |
my.iium.irep.958422022-02-08T02:55:29Z http://irep.iium.edu.my/95842/ Public key encryption in the cloud computing environments: trust and untrust Nanang, Herlino Durachman, Yusuf Misman, Ahmad Fatzilah Zulkifli, Zahidah Sukmana, Husni Teja T Technology (General) T173.2 Technological change With the development of data storage technology and the computerized process of an internet-based technology. Cloud computing systems allow users to store and process data virtually. Users also do not need to prepare a platform or supporting infrastructure, but only need to use existing platforms. For the establishment of a trust relationship between entities as an important part of establishing security mechanisms in the cloud computing environment. This article introduces a trust management model in cloud computing using public key encryption. Measurement and computation of trust, and the chain of trust where similarity of trust issues is recommended have been addressed to prevent fraudulent user behavior. This model is geared towards cloud users who make decisions about whether to use a cloud computing service provider by giving them confidence. The purpose of this article motivates us to try proposes new ideas and methods of trust management in cloud computing using public key encryption. IEEE 2021-11-13 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/95842/1/95842_Public%20key%20encryption%20in%20the%20cloud%20computing.pdf application/pdf en http://irep.iium.edu.my/95842/7/95842_Public%20Key%20Encryption_Scopus.pdf Nanang, Herlino and Durachman, Yusuf and Misman, Ahmad Fatzilah and Zulkifli, Zahidah and Sukmana, Husni Teja (2021) Public key encryption in the cloud computing environments: trust and untrust. In: 2021 9th International Conference on Cyber and IT Service Management (CITSM), 22-23 September 2021, Bengkulu, Indonesia (Virtual). https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9588879 10.1109/CITSM52892.2021.9588879 |
institution |
Universiti Islam Antarabangsa Malaysia |
building |
IIUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
International Islamic University Malaysia |
content_source |
IIUM Repository (IREP) |
url_provider |
http://irep.iium.edu.my/ |
language |
English English |
topic |
T Technology (General) T173.2 Technological change |
spellingShingle |
T Technology (General) T173.2 Technological change Nanang, Herlino Durachman, Yusuf Misman, Ahmad Fatzilah Zulkifli, Zahidah Sukmana, Husni Teja Public key encryption in the cloud computing environments: trust and untrust |
description |
With the development of data storage technology and the computerized process of an internet-based technology. Cloud computing systems allow users to store and process data virtually. Users also do not need to prepare a platform or supporting infrastructure, but only need to use existing platforms. For the establishment of a trust relationship between entities as an important part of establishing security mechanisms in the cloud computing environment. This article introduces a trust management model in cloud computing using public key encryption. Measurement and computation of trust, and the chain of trust where similarity of trust issues is recommended have been addressed to prevent fraudulent user behavior. This model is geared towards cloud users who make decisions about whether to use a cloud computing service provider by giving them confidence. The purpose of this article motivates us to try proposes new ideas and methods of trust management in cloud computing using public key encryption. |
format |
Conference or Workshop Item |
author |
Nanang, Herlino Durachman, Yusuf Misman, Ahmad Fatzilah Zulkifli, Zahidah Sukmana, Husni Teja |
author_facet |
Nanang, Herlino Durachman, Yusuf Misman, Ahmad Fatzilah Zulkifli, Zahidah Sukmana, Husni Teja |
author_sort |
Nanang, Herlino |
title |
Public key encryption in the cloud computing environments: trust and untrust |
title_short |
Public key encryption in the cloud computing environments: trust and untrust |
title_full |
Public key encryption in the cloud computing environments: trust and untrust |
title_fullStr |
Public key encryption in the cloud computing environments: trust and untrust |
title_full_unstemmed |
Public key encryption in the cloud computing environments: trust and untrust |
title_sort |
public key encryption in the cloud computing environments: trust and untrust |
publisher |
IEEE |
publishDate |
2021 |
url |
http://irep.iium.edu.my/95842/1/95842_Public%20key%20encryption%20in%20the%20cloud%20computing.pdf http://irep.iium.edu.my/95842/7/95842_Public%20Key%20Encryption_Scopus.pdf http://irep.iium.edu.my/95842/ https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9588879 |
_version_ |
1724607793443373056 |