An authenticated key exchange scheme for efficient security-aware scheduling of scientific applications in cloud computing

Chang Liu, Xuyun Zhang, Jinjun Chen, Chi Yang

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

6 Citations (Scopus)

Abstract

Instead of purchasing and maintaining their own computing infrastructure, scientists can now run data-intensive scientific applications in cloud computing environment by facilitating its vast storage and computation capabilities. During the scheduling of such scientific applications for execution, various computation data flows will happen between the controller and computing server instances. Amongst various quality-of-service (QoS) metrics, data security is one of the greatest concerns to scientists because their data may be intercepted or stolen by malicious parties during those data flows. An existing typical method for addressing this issue is to apply Internet Key Exchange (IKE) scheme to generate and exchange session keys, and then to apply these keys for performing symmetric-key encryption which will encrypt those data flows. However, the IKE scheme suffers from low efficiency due to its low performance of asymmetric-key crypto logical operations over a large amount of data and high-density operations which are exactly the characteristics of scientific applications. In this paper, we propose Cloud Computing Background Key Exchange (CCBKE), a novel authenticated key exchange scheme that aims at efficient security-aware scheduling of scientific applications. Our scheme is designed based on randomness-reuse strategy and Internet Key Exchange (IKE) scheme. Theoretical analyses and simulation results demonstrate that, compared with the IKE scheme, our CCBKE scheme can significantly improve the efficiency by dramatically reducing time consumption and computation load without sacrificing the level of security.
Original languageEnglish
Title of host publication2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing
EditorsJinjun Chen, Wanchun Dou, Jianxun Liu, Laurence T. Yang, Jianhua Ma
Place of PublicationLos Alamitos, CA
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages372-379
Number of pages8
ISBN (Electronic)9780769546124
ISBN (Print)9781467300063
DOIs
Publication statusPublished - 2011
Externally publishedYes
Event9th IEEE Int. Conf. on Dependable, Autonomic and Secure Comput., DASC 2011, incl. 9th Int. Conf. on Pervasive Intelligence and Computing, PICom 2011, 9th Int. Symp. on Embedded Computing, EmbeddedCom 2011, 1st Int. Conf. on Cloud and Green Comput.CGC - Sydney, NSW, Australia
Duration: 12 Dec 201114 Dec 2011

Other

Other9th IEEE Int. Conf. on Dependable, Autonomic and Secure Comput., DASC 2011, incl. 9th Int. Conf. on Pervasive Intelligence and Computing, PICom 2011, 9th Int. Symp. on Embedded Computing, EmbeddedCom 2011, 1st Int. Conf. on Cloud and Green Comput.CGC
Country/TerritoryAustralia
CitySydney, NSW
Period12/12/1114/12/11

Keywords

  • cloud computing
  • efficiency
  • communication security
  • authenticated key exchange

Fingerprint

Dive into the research topics of 'An authenticated key exchange scheme for efficient security-aware scheduling of scientific applications in cloud computing'. Together they form a unique fingerprint.

Cite this