CINXE.COM

Confidential Computing in Edge- Cloud Hierarchy

<!DOCTYPE html> <html> <head><meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <title>Confidential Computing in Edge- Cloud Hierarchy</title> <!-- common meta tags --> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta http-equiv="X-UA-Compatible" content="ie=edge"> <meta name="title" content="Confidential Computing in Edge- Cloud Hierarchy"> <meta name="description" content="The paper introduces confidential computing approaches focused on protecting hierarchical data within edge-cloud network. Edge-cloud network suggests splitting and sharing data between the main cloud and the range of networks near the endpoint devices. The proposed solutions allow data in this two-level hierarchy to be protected via embedding traditional encryption at rest and in transit while leaving the remaining security issues, such as sensitive data and operations in use, in the scope of trusted execution environment. Hierarchical data for each network device are linked and identified through distinct paths between edge and main cloud using individual blockchain. Methods for data and cryptographic key splitting between the edge and the main cloud are based on strong authentication techniques ensuring the shared data confidentiality, integrity and availability." /> <meta name="keywords" content="Edge-cloud architecture, hierarchical data, confidential computing, key splitting, authentication, blockchain, Proceedings, Computer Science, Technology"/> <!-- end common meta tags --> <!-- Dublin Core(DC) meta tags --> <meta name="dc.title" content="Confidential Computing in Edge- Cloud Hierarchy "> <meta name="citation_authors" content="Yeghisabet Alaverdyan"> <meta name="citation_authors" content="Suren Poghosyan"> <meta name="citation_authors" content="Vahagn Poghosyans"> <meta name="dc.type" content="Article"> <meta name="dc.source" content="International Journal of Computer Science & Information Technology (IJCSIT) Vol. 15, No.3"> <meta name="dc.date" content="2023/06/30"> <meta name="dc.identifier" content="10.5121/ijcsit.2023.15302"> <meta name="dc.publisher" content="AIRCC Publishing Corporation"> <meta name="dc.rights" content="http://creativecommons.org/licenses/by/3.0/"> <meta name="dc.format" content="application/pdf"> <meta name="dc.language" content="en"> <meta name="dc.description" content="The paper introduces confidential computing approaches focused on protecting hierarchical data within edge-cloud network. Edge-cloud network suggests splitting and sharing data between the main cloud and the range of networks near the endpoint devices. The proposed solutions allow data in this two-level hierarchy to be protected via embedding traditional encryption at rest and in transit while leaving the remaining security issues, such as sensitive data and operations in use, in the scope of trusted execution environment. Hierarchical data for each network device are linked and identified through distinct paths between edge and main cloud using individual blockchain. Methods for data and cryptographic key splitting between the edge and the main cloud are based on strong authentication techniques ensuring the shared data confidentiality, integrity and availability."/> <meta name="dc.subject" content="Edge-cloud architecture"> <meta name="dc.subject" content="hierarchical data"> <meta name="dc.subject" content="confidential computing"> <meta name="dc.subject" content="key splitting"> <meta name="dc.subject" content="authentication"> <meta name="dc.subject" content="blockchain"> <meta name="dc.subject" content="Proceedings"> <meta name="dc.subject" content="Computer Science"> <meta name="dc.subject" content="Technology"> <!-- End Dublin Core(DC) meta tags --> <!-- Prism meta tags --> <meta name="prism.publicationName" content="International Journal of Computer Science & Information Technology (IJCSIT) "> <meta name="prism.publicationDate" content="2023/06/30"> <meta name="prism.volume" content="15"> <meta name="prism.number" content="3"> <meta name="prism.section" content="Article"> <meta name="prism.startingPage" content="21"> <!-- End Prism meta tags --> <!-- citation meta tags --> <meta name="citation_journal_title" content="International Journal of Computer Science & Information Technology (IJCSIT)"> <meta name="citation_publisher" content="AIRCC Publishing Corporation"> <meta name="citation_authors" content="Yeghisabet Alaverdyan, Suren Poghosyan and Vahagn Poghosyans"> <meta name="citation_title" content="Confidential Computing in Edge- Cloud Hierarchy"> <meta name="citation_online_date" content="2023/06/30"> <meta name="citation_issue" content="15"> <meta name="citation_firstpage" content="21"> <meta name="citation_authors" content="Yeghisabet Alaverdyan"> <meta name="citation_authors" content="Suren Poghosyan"> <meta name="citation_authors" content="Vahagn Poghosyans"> <meta name="citation_doi" content="10.5121/ijcsit.2023.15302"> <meta name="citation_abstract_html_url" content="https://aircconline.com/abstract/ijcsit/v15n3/15323ijcsit02.html"> <meta name="citation_pdf_url" content="https://aircconline.com/ijcsit/V15N3/15323ijcsit02.pdf"> <!-- end citation meta tags --> <!-- Og meta tags --> <meta property="og:site_name" content="AIRCC" /> <meta property="og:type" content="article" /> <meta property="og:url" content="https://aircconline.com/abstract/ijcsit/v15n3/15323ijcsit02.html"> <meta property="og:title" content="Confidential Computing in Edge- Cloud Hierarchy "> <meta property="og:description" content="The paper introduces confidential computing approaches focused on protecting hierarchical data within edge-cloud network. Edge-cloud network suggests splitting and sharing data between the main cloud and the range of networks near the endpoint devices. The proposed solutions allow data in this two-level hierarchy to be protected via embedding traditional encryption at rest and in transit while leaving the remaining security issues, such as sensitive data and operations in use, in the scope of trusted execution environment. Hierarchical data for each network device are linked and identified through distinct paths between edge and main cloud using individual blockchain. Methods for data and cryptographic key splitting between the edge and the main cloud are based on strong authentication techniques ensuring the shared data confidentiality, integrity and availability."/> <!-- end og meta tags --> <!-- Start of twitter tags --> <meta name="twitter:card" content="Proceedings" /> <meta name="twitter:site" content="AIRCC" /> <meta name="twitter:title" content="Confidential Computing in Edge- Cloud Hierarchy " /> <meta name="twitter:description" content="The paper introduces confidential computing approaches focused on protecting hierarchical data within edge-cloud network. Edge-cloud network suggests splitting and sharing data between the main cloud and the range of networks near the endpoint devices. The proposed solutions allow data in this two-level hierarchy to be protected via embedding traditional encryption at rest and in transit while leaving the remaining security issues, such as sensitive data and operations in use, in the scope of trusted execution environment. Hierarchical data for each network device are linked and identified through distinct paths between edge and main cloud using individual blockchain. Methods for data and cryptographic key splitting between the edge and the main cloud are based on strong authentication techniques ensuring the shared data confidentiality, integrity and availability." /> <meta name="twitter:image" content="https://airccse.org/img/aircc-logo1.jpg" /> <!-- End of twitter tags --> <!-- INDEX meta tags --> <meta name="google-site-verification" content="t8rHIcM8EfjIqfQzQ0IdYIiA9JxDD0uUZAitBCzsOIw" /> <meta name="yandex-verification" content="e3d2d5a32c7241f4" /> <!-- end INDEX meta tags --> <style type="text/css"> a{ color:white; text-decoration:none; } ul li a{ font-weight:bold; color:#000; list-style:none; text-decoration:none; size:10px;} .imagess { height:90px; text-align:left; margin:0px 5px 2px 8px; float:right; border:none; } #left p { font-size:0.90pc; margin-left: 20px; } .right { margin-right: 20px; } #button{ float: left; font-size: 17px; margin-left: 10px; height: 28px; width: 100px; background-color: #1e86c6; } </style> <link rel="icon" type="image/ico" href="/abstract/ico.ico"/> <link rel="stylesheet" type="text/css" href="../main.css" /> </head> <body> <div id="wap"> <div id="page"> <div id="top"> <table width="100%" cellspacing="0" cellpadding="0" > <tr><td colspan="3" valign="top"><img src="../top3.gif" /></td></tr> </table> </div> <div id="menu"> <a href="http://airccse.org/journal/ijcsit.html">Home</a> <a href="http://airccse.org/journal/eboard.html">Editorial</a> <a href="http://airccse.org/journal/papersub.html">Submission</a> <a href="http://airccse.org/journal/jcsit_index.html">Indexing</a> <a href="http://airccse.org/journal/specialissue.html">Special Issue</a> <a href="http://airccse.org/journal/contacts.html">Contacts</a> <a href="http://airccse.org/" target="blank">AIRCC</a></div> <div id="content"> <div id="left"> <h2>Volume 15, Number 3</h2> <h4 style="text-align:center;height:auto"><a>Confidential Computing in Edge- Cloud Hierarchy</a></h4> <h3>&nbsp;&nbsp;Authors</h3> <p class="#left">Yeghisabet Alaverdyan<sup>1,2</sup>, Suren Poghosyan<sup>2</sup> and Vahagn Poghosyans<sup>2,3</sup>, <sup>1</sup>EKENG CJSC, Armenia, <sup>2</sup>Institute for <br>Informatics and Automation Problems of NAS RA, Armenia, <sup>3</sup>Synopsys, Armenia </p> <h3>&nbsp;&nbsp;Abstract</h3> <p class="#left right" style="text-align:justify">The paper introduces confidential computing approaches focused on protecting hierarchical data within edge-cloud network. Edge-cloud network suggests splitting and sharing data between the main cloud and the range of networks near the endpoint devices. The proposed solutions allow data in this two-level hierarchy to be protected via embedding traditional encryption at rest and in transit while leaving the remaining security issues, such as sensitive data and operations in use, in the scope of trusted execution environment. Hierarchical data for each network device are linked and identified through distinct paths between edge and main cloud using individual blockchain. Methods for data and cryptographic key splitting between the edge and the main cloud are based on strong authentication techniques ensuring the shared data confidentiality, integrity and availability. </p> <h3>&nbsp;&nbsp;Keywords</h3> <p class="#left right" style="text-align:justify">Edge-cloud architecture, hierarchical data, confidential computing, key splitting, authentication, blockchain</p><br> <button type="button" id="button"><a target="blank" href="/ijcsit/V15N3/15323ijcsit02.pdf">Full Text</a></button> &nbsp;&nbsp;<button type="button" id="button"><a href="http://airccse.org/journal/ijcsit2023_curr.html">Volume 15</a></button> <br><br><br><br><br> </div> </div> <div id="right"> <div class="menu_right"> <ul><li><a href="http://airccse.org/journal/ijcsit.html">Scope &amp; Topics</a></li> <li><a href="http://airccse.org/ethics.html" target="_blank">Ethics</a></li> <li><a href="http://airccse.org/journal/csit_archives.html">Archives</a></li> <li><a href="http://airccse.org/journal/papersub.html">Paper Submission</a></li> <li><a href="http://airccse.org/journal/ijcsit_cited.html">Most Cited Articles</a></li> <li><a href="http://airccse.org/journal/IJCSITleaflet.pdf">Download leaflet</a></li> <li><a href="http://airccse.org/faq.html" target="_blank">FAQ</a></li> </ul> </div><br /> <p align="center">&nbsp;</p> <p align="center">&nbsp;</p> </div> <div class="clear"></div> <div id="footer"><table width="100%" ><tr><td height="25" colspan="2"><br /><p align="center">&copy; AIRCC Publishing Corporation</p></td></table> </div> </div> </div> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10