Trusted E-Contracts In Collaborative Intra-Cloud Business-To-Business environments

Sufyan T. Faraj Al-Janabi*, Waleed Kareem Awad**, KashifKifayat***
*-** College of Computer, University of Anbar, Ramadi, Iraq.
*** School of Comp. & Math., LJMU , Liverpool, UK.
Periodicity:May - July'2013
DOI : https://doi.org/10.26634/jcs.2.3.2331

Abstract

Cloud computing is designed to provide services to the end users and to the owners of organizations over internet with little cost and with little configuration effort. There are many concerns about cloud computing especially in terms of security, privacy, and trust. These main issues have prevented business from fully accepting cloud platforms. Some of the confidential Business-to-Bussiness (B2B) collaborations require secure tunnels to secure the messaging between the services that are deployed within the same cloud. As organizations participating in B2B collaborations deploy their services in single or multiple clouds, businesses face security threat to their sensitive data both from outside and inside the cloud. This work is proposed to contribute in solving such problems. This paper presents an electronic contract (econtract) based solution that provides a secure Connectivity as a Service (CaaS) for intra-cloud communications. Our proposed model interestingly handles secure messaging for the services deployed within the same cloud. The basicinterction model has further been enhanced by adding a new service layer (Authentication Service) which is responsible for offering a high level of trust between collaborating parties by preventing any unauthorized party from joining the connectivity service. Indeed, our proposed system can prevent any involved organization from launching masquerade attacks. The added layer basically facilitates the integration of the basic model with the Public-Key Infrastructure (PKI). The proposed system can also be helpful in solving other attacks such as man-in-the-middle attack and modification of the messages attack.

Keywords

Cloud Computing, Authentication Service, Business-to-Business,PKI; e-contract

How to Cite this Article?

Al-Janabi, S. T. F., Awad, W. K., and Kifayat, K. (2013). Trusted E-Contracts In Collaborative Intra-Cloud Business-To-Business Environments. i-manager’s Journal on Communication Engineering and Systems, 2(3), 1-12. https://doi.org/10.26634/jcs.2.3.2331

References

[1]. Al-Janabi, S. & Kais, A. (2012). Development of certificate authority services for web applications. The First International Conference on Future Communication Networks (ICFCN '2012), Baghdad, Iraq, April 2012.
[2]. Bourne, V. (2010). Rising to the Challenge.2010 Global IT Leadership Report. Available at http:// networkworld.com (Accessed 10December 2012).
[3]. Chen, S., Nepal, S., and Liu, R. (2011). Secure connectivity for intra-cloud and inter-cloud communication. ICPP Workshops, 154-159.
[4]. ITU-T (2006). Information technology – Open Systems Interconnection – The Directory: Public-key and attribute certificate frameworks, ITU-T Recommendation X.509 (08/2005), International Telecommunication Union (ITU), Series X: Data Networks, Open System, Communications and Security.
[5]. Ko, R., Jagadpramana, P., Mowbray, M., Pearson, S., Kirchberg, M., Liang, Q., et al (2011). TrustCloud: A framework for accountability and trust in cloud computing. Cloud & Security Lab., 1-5.
[6]. Kumar, P., Sehgal, V., Chauhan, D., Gupta, P. and Diwakar, M. (2011). Effective ways of secure, private and trusted cloud computing. IJCSI International Journal of Computer Science, 8(2): 412-422 .
[7]. Nyoni, T.&Piderit, R. (2012). Enhancing trust in cloud computing. The 14thAnnual Conference on World Wide Web Applications, Durban, 7-9 November, 4-16.
[8]. Rao, S.,Rao, N., and Kumari, K. (2009). Cloud computing: An overview. Journal of Theoretical and Applied Information Technology, 9(1): 71-76.
[9]. Ragent, F., & Leach, C. (2010). Can you trust the cloud? A practical guide to the opportunities and challenges involved in cloud computing. Available at www.xerox.com/ (Accessed 20 December 2012).
[10]. Sadeghi, A., Schneider, T., and Winandy, M. (2010). Token-based cloud computing - Secure outsourcing of data and arbitrary computations with lower latency. The 3rdInternational Conference on Trust and Trustworthy Computing (TRUST'10) - Workshop on Trust in the Cloud, June 22, Berlin, Germany.
[11]. Yang, J. & Chen, Z. (2010). Cloud computing research and security issues. International Conference on Computational Intelligence and Software Engineering (CiSE), Wuhan, China, 1-3.
[12]. Yildiz, E.(2001). A proposal for Turkish government public key infrastructure trust model. M.Sc. Thesis, Informatics Institute, The Middle East Technical University, Turkey.
[13]. Zhang, Q., Cheng, L., and Boutaba, R. (2010). Cloud computing: State-of-the-art and research challenges”. Journal of Internet Services and Applications,1: 7–18, The Brazilian Computer Society.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.