A performance model of the Trusted Cloud Computing Platform VM Launch Protocol
Journal Title: EAI Endorsed Transactions on Cloud Systems - Year 2016, Vol 2, Issue 6
Abstract
The adoption of the cloud computing paradigm is associated with increasing security concerns. Cloud computing service models (SaaS, PaaS and IaaS) are exposed to different security threats in each level of services. The Trusted Cloud Computing Platform (TCCP) proposes a security model that protects customers VMs at the IaaS level. In this paper, we investigate methodologies for the specification and scalability of a performance model and evaluation of the VM Launch security protocol within the TCCP model. The Markovian process algebra PEPA has been used to specify and analyse the VM Launch protocol.
Authors and Affiliations
Said Kamil, Nigel Thomas
Authenticated Mobile Groups To Secure The Backhaul: A New Paradigm And Challenges
In this paper, it is proposed to use group communication cryptographic protocols as a new security paradigm. This new paradigm aims at redesigning the security of small cell communications over an insecure mobile backhau...
Indoor Positioning using cellular network and relay node for wearables
One of the key requirements in public safety domain is to know the exact location of user or wearable device. There are a plethora of Internet of Things based wearable devices which are getting used for geo-fencing and f...
Design Approach for CCSDS Complied Command Operation and Frame Operation Procedure for Integrated Spacecraft Checkout
Consultative Committee for Space Data Systems (CCSDS) complied Telemetry and Telecommand Processor’s (TTCP) development was taken up by Spacecraft Checkout Group (SCG) of U. R. Rao Satellite Centre, Indian Space Research...
Towards Automated Data-Driven Model Creation for Cloud Computing Simulation
The increasing complexity and scale of cloud computing environments due to widespread data centre heterogeneity makes measurement-based evaluations highly difficult to achieve. Therefore the use of simulation tools to su...
A Counterfeit Solution for Pharma Supply Chain
This paper provides a detailed overview of the blockchain technology and how it can be used to build a foolproof system in eliminating counterfeit products in pharmaceutical industries. Study by various reports indicate...