By Topic

Privacy preserved entrust mechanism in cloud computing environment

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Jongyoul Park ; Electronics and Telecommunications Research Institute, 218 Gajeong-ro, Yuseong-gu, Daejeon, 305-700, Korea ; Seungyun Lee

Cloud computing technology enables service to add special characteristics such as remote execution, service mobility and virtual workspace in a handheld device. However, it has a limitation on application areas for the reason that mobile applications distinctly need a help of the host computer. To eliminate those threats, hash chain based approaches are proposed [1][2]. However, it also has some restriction that a mobile device sends request messages to each server when the device needs a multi-entity co-operative work. Therefore, this paper introduces a concept of secure entrustment, which provides most near and trusted servers whenever your mobile devices want to use a trusted computing.

Published in:

Computer Sciences and Convergence Information Technology (ICCIT), 2011 6th International Conference on

Date of Conference:

Nov. 29 2011-Dec. 1 2011