Security from the Transparent Computing Aspect Conference Paper uri icon

abstract

  • Transparent computing is an emerging computing paradigm where the users can enjoy any kind of service over networks on-demand with any devices, without caring about the underlying deployment details. In transparent computing, all software resources (even the OS) are stored on remote servers, from which the clients can request the resources for local execution in a block-streaming way. This paradigm has many benefits including cross-platform experience, user orientation, and platform independence. However, due to its fundamental features, e.g., separation of computation and storage in clients and servers respectively, and block-streaming-based scheduling and execution, transparent computing faces many new security challenges that may become its biggest obstacle. In this paper, we propose a Transparent Computing Security Architecture (TCSA), which builds user-controlled security for transparent computing by allowing the users to configure the desired security environments on demand. We envision, TCSA, which allows the users to take the initiative to protect their own data, is a promising solution for data security in transparent computing. 2014 IEEE.

name of conference

  • 2014 International Conference on Computing, Networking and Communications (ICNC)

published proceedings

  • 2014 International Conference on Computing, Networking and Communications (ICNC)

author list (cited authors)

  • Wang, G., Liu, Q., Xiang, Y., & Chen, J.

citation count

  • 7

complete list of authors

  • Wang, Guojun||Liu, Qin||Xiang, Yang||Chen, Jianer

publication date

  • February 2014