Trust and security have prevented businesses from fully accepting cloud platforms. To protect clouds, providers must first secure virtualized data-center resources, uphold user privacy, and preserve data integrity. The authors suggest using a trust-overlay network over multiple data centers to implement a reputation system for establishing trust between service providers and data owners. Data coloring and software watermarking techniques protect shared data objects and massively distributed software modules. These techniques safeguard multi-way authentications, enable single sign-on in the cloud, and tighten access control for sensitive data in both public and private clouds. Defense against tampering is tamper-proofing, so that unauthorized modifications to software (for example, to remove a watermark) will result in nonfunctional code. We briefly survey the available technology for each type of defense. Our work opens up the low-cost P2P technology for copyrighted content delivery. The advantage lies mainly in minimum delivery cost, higher content availability, and copyright compliance in exploring P2P network resources.
[1]
Tim Mather,et al.
Cloud Security and Privacy - An Enterprise Perspective on Risks and Compliance
,
2009,
Theory in practice.
[2]
John W. Rittinghouse,et al.
Cloud Computing: Implementation, Management, and Security
,
2009
.
[3]
Kai Hwang,et al.
Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement
,
2009,
2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[4]
Shanshan Song,et al.
Trusted P2P transactions with fuzzy reputation aggregation
,
2005,
IEEE Internet Computing.
[5]
Kai Hwang,et al.
Collusive Piracy Prevention in P2P Content Delivery Networks
,
2009,
IEEE Transactions on Computers.