Swinburne
Browse

An iterative hierarchical key exchange scheme for secure scheduling of big data applications in cloud computing

Download (444.01 kB)
conference contribution
posted on 2024-07-09, 16:31 authored by Chang Liu, Xuyun Zhang, Chengfei LiuChengfei Liu, Yun YangYun Yang, Rajiv Ranjan, Dimitrios GeorgakopoulosDimitrios Georgakopoulos, Jinjun ChenJinjun Chen
As the new-generation distributed computing platform, cloud computing environments offer high efficiency and low cost for data-intensive computation in big data applications. Cloud resources and services are available in payas- you-go mode, which brings extraordinary flexibility and costeffectiveness as well as zero investment in their own computing infrastructure. However, these advantages come at a price - people no longer have direct control over their own data. Based on this view, data security becomes a major concern in the adoption of cloud computing. Authenticated Key Exchange (AKE) is essential to a security system that is based on high efficiency symmetric-key encryption. With virtualization technology being applied, existing key exchange schemes such as Internet Key Exchange (IKE) becomes time-consuming when directly deployed into cloud computing environment. In this paper we propose a novel hierarchical key exchange scheme, namely Cloud Background Hierarchical Key Exchange (CBHKE). Based on our previous work, CBHKE aims at providing secure and efficient scheduling for cloud computing environment. In our new scheme, we design a two-phase layer-by-layer iterative key exchange strategy to achieve more efficient AKE without sacrificing the level of data security. Both theoretical analysis and experimental results demonstrate that when deployed in cloud computing environment, efficiency of the proposed scheme is dramatically superior to its predecessors CCBKE and IKE schemes.

Funding

Management of Large-Scale Models

Directorate for Computer & Information Science & Engineering

Find out more...

History

Available versions

PDF (Accepted manuscript)

ISBN

9780769550220

Journal title

Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013

Conference name

12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013

Location

Melbourne, VIC,

Start date

2013-07-16

End date

2013-07-18

Volume

81

Issue

3

Pagination

7 pp

Publisher

IEEE

Copyright statement

Copyright © 2013 IEEE. The accepted manuscript is reproduced in accordance with the copyright policy of the publisher. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

Language

eng

Usage metrics

    Publications

    Categories

    Keywords

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC