Public key encryption in the cloud computing environments: trust and untrust

With the development of data storage technology and the computerized process of an internet-based technology. Cloud computing systems allow users to store and process data virtually. Users also do not need to prepare a platform or supporting infrastructure, but only need to use existing platforms. F...

Full description

Saved in:
Bibliographic Details
Main Authors: Nanang, Herlino, Durachman, Yusuf, Misman, Ahmad Fatzilah, Zulkifli, Zahidah, Sukmana, Husni Teja
Format: Conference or Workshop Item
Language:English
English
Published: IEEE 2021
Subjects:
Online Access:http://irep.iium.edu.my/95842/1/95842_Public%20key%20encryption%20in%20the%20cloud%20computing.pdf
http://irep.iium.edu.my/95842/7/95842_Public%20Key%20Encryption_Scopus.pdf
http://irep.iium.edu.my/95842/
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9588879
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Islam Antarabangsa Malaysia
Language: English
English
id my.iium.irep.95842
record_format dspace
spelling my.iium.irep.958422022-02-08T02:55:29Z http://irep.iium.edu.my/95842/ Public key encryption in the cloud computing environments: trust and untrust Nanang, Herlino Durachman, Yusuf Misman, Ahmad Fatzilah Zulkifli, Zahidah Sukmana, Husni Teja T Technology (General) T173.2 Technological change With the development of data storage technology and the computerized process of an internet-based technology. Cloud computing systems allow users to store and process data virtually. Users also do not need to prepare a platform or supporting infrastructure, but only need to use existing platforms. For the establishment of a trust relationship between entities as an important part of establishing security mechanisms in the cloud computing environment. This article introduces a trust management model in cloud computing using public key encryption. Measurement and computation of trust, and the chain of trust where similarity of trust issues is recommended have been addressed to prevent fraudulent user behavior. This model is geared towards cloud users who make decisions about whether to use a cloud computing service provider by giving them confidence. The purpose of this article motivates us to try proposes new ideas and methods of trust management in cloud computing using public key encryption. IEEE 2021-11-13 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/95842/1/95842_Public%20key%20encryption%20in%20the%20cloud%20computing.pdf application/pdf en http://irep.iium.edu.my/95842/7/95842_Public%20Key%20Encryption_Scopus.pdf Nanang, Herlino and Durachman, Yusuf and Misman, Ahmad Fatzilah and Zulkifli, Zahidah and Sukmana, Husni Teja (2021) Public key encryption in the cloud computing environments: trust and untrust. In: 2021 9th International Conference on Cyber and IT Service Management (CITSM), 22-23 September 2021, Bengkulu, Indonesia (Virtual). https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9588879 10.1109/CITSM52892.2021.9588879
institution Universiti Islam Antarabangsa Malaysia
building IIUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider International Islamic University Malaysia
content_source IIUM Repository (IREP)
url_provider http://irep.iium.edu.my/
language English
English
topic T Technology (General)
T173.2 Technological change
spellingShingle T Technology (General)
T173.2 Technological change
Nanang, Herlino
Durachman, Yusuf
Misman, Ahmad Fatzilah
Zulkifli, Zahidah
Sukmana, Husni Teja
Public key encryption in the cloud computing environments: trust and untrust
description With the development of data storage technology and the computerized process of an internet-based technology. Cloud computing systems allow users to store and process data virtually. Users also do not need to prepare a platform or supporting infrastructure, but only need to use existing platforms. For the establishment of a trust relationship between entities as an important part of establishing security mechanisms in the cloud computing environment. This article introduces a trust management model in cloud computing using public key encryption. Measurement and computation of trust, and the chain of trust where similarity of trust issues is recommended have been addressed to prevent fraudulent user behavior. This model is geared towards cloud users who make decisions about whether to use a cloud computing service provider by giving them confidence. The purpose of this article motivates us to try proposes new ideas and methods of trust management in cloud computing using public key encryption.
format Conference or Workshop Item
author Nanang, Herlino
Durachman, Yusuf
Misman, Ahmad Fatzilah
Zulkifli, Zahidah
Sukmana, Husni Teja
author_facet Nanang, Herlino
Durachman, Yusuf
Misman, Ahmad Fatzilah
Zulkifli, Zahidah
Sukmana, Husni Teja
author_sort Nanang, Herlino
title Public key encryption in the cloud computing environments: trust and untrust
title_short Public key encryption in the cloud computing environments: trust and untrust
title_full Public key encryption in the cloud computing environments: trust and untrust
title_fullStr Public key encryption in the cloud computing environments: trust and untrust
title_full_unstemmed Public key encryption in the cloud computing environments: trust and untrust
title_sort public key encryption in the cloud computing environments: trust and untrust
publisher IEEE
publishDate 2021
url http://irep.iium.edu.my/95842/1/95842_Public%20key%20encryption%20in%20the%20cloud%20computing.pdf
http://irep.iium.edu.my/95842/7/95842_Public%20Key%20Encryption_Scopus.pdf
http://irep.iium.edu.my/95842/
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9588879
_version_ 1724607793443373056