China ASEAN Economic Relations and USA Factor

Authors

  • Hadia Rahman  School of Social Sciences and Humanities, University of Management and Technology, Lahore, Pakistan

Keywords:

China; ASEAN; economy; CAFTA; United States; Asia Pacific.

Abstract

The implementation of CAFTA (China ASEAN Free Trade Agreement) in January 2010 marked an important milestone in relations of China and ASEAN member states. This specific agreement built on and extended the growing economic relationships between the two sides. However it also caused concern for United States influence in the region. The economic relations of both sides have been talked about from various angles at many occasions and conferences worldwide but how China and ASEAN economic terms are influencing United States influence in the region in the present times have rarely been discussed. This research focuses on the growing China- ASEAN economic relationship over the past decade and a half, especially under CAFTA umbrella, observes some of the major areas of this relationship, and considers the implications for U.S. interests in the region. The vastly growing economic relations of China ASEAN did create concerns for United States initially. The observant war on terror has got United States more involved with neighbouring regions of ASEAN and China i-e Afghanistan and Iraq. But since United States is refocusing on this region with its new strategies and engagement, it is proved that it has not lost its influence in the region which it was losing especially right after the 9/11 incident. At the same time, it is proved as well that China is constantly gaining importance in the region especially after the implementation of CAFTA.

References

  1. R.K.L. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M. Kirchberg, Q. Liang, and B.S. Lee, “Trustcloud: A Framework for Accountability and Trust in Cloud Computing,” HP Technical Report HPL-2011-38, http://www.hpl.hp.com/techreports/ 2011/HPL-2011-38.html, 2013.
  2. http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-cs-01-en.pdf, 2013.
  3. http://securesoftwaredev.com/2012/08/20/xacml-in-the-cloud, 2013.
  4. S. Ruj, M. Stojmenovic, and A. Nayak, “Privacy Preserving Access Control with Authentication for Securing Data in Clouds,” Proc. IEEE/ACM Int’l Symp. Cluster, Cloud and Grid Computing, pp. 556-563, 2012.
  5. C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward Secure and Dependable Storage Services in Cloud Computing,”
  6. IEEE Trans. Services Computing, vol. 5, no. 2, pp. 220-232, Apr.-June 2012.
  7.  F. Zhao, T. Nishide, and K. Sakurai, “Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems,” Proc. Seventh Int’l Conf. Information Security Practice and Experience (ISPEC), pp. 83-97, 2011.
  8. F. Zhao, T. Nishide, and K. Sakurai, “Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems,” Proc. Seventh Int’l Conf. Information Security Practice and Experience (ISPEC), pp. 83-97, 2011.
  9. S. Ruj, A. Nayak, and I. Stojmenovic, “DACC: Distributed Access Control in Clouds,” Proc. IEEE 10th Int’l Conf. Trust, Security and Privacy in Computing and Communications (TrustCom), 2011.
  10. S. Jahid, P. Mittal, and N. Borisov, “EASiER: Encryption-Based Access Control in Social Networks with Efficient Revocation,”
  11. Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), 2011.
  12. M. Green, S. Hohenberger, and B. Waters, “Outsourcing the Decryption of ABE Ciphertexts,” Proc. USENIX Security Symp., 2011.
  13. A.-R. Sadeghi, T. Schneider, and M. Winandy, “Token-Based Cloud Computing,” Proc. Third Int’l Conf. Trust and Trustworthy Computing (TRUST), pp. 417-429, 2010.
  14. R. Lu, X. Lin, X. Liang, and X. Shen, “Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing,” Proc. Fifth ACM Symp. Information, Computer and Comm. Security (ASIACCS), pp. 282-292, 2010.
  15. D.R. Kuhn, E.J. Coyne, and T.R. Weil, “Adding Attributes to Role-Based Access Control,” IEEE Computer, vol. 43, no. 6, pp. 79-81, June 2010.
  16. M. Li, S. Yu, K. Ren, and W. Lou, “Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-Owner Settings,” Proc. Sixth Int’l ICST Conf. Security and Privacy in Comm. Networks (SecureComm), pp. 89-106, 2010.
  17. S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute Based Data Sharing with Attribute Revocation,” Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), pp. 261-270, 2010.
  18. G. Wang, Q. Liu, and J. Wu, “Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Storage Services,” Proc. 17th ACM Conf. Computer and Comm. Security (CCS), pp. 735-737, 2010.
  19. J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy Keyword Search Over Encrypted Data in Cloud Computing,”
  20. Proc. IEEE INFOCOM, pp. 441-445, 2010.
  21. S. Kamara and K. Lauter, “Cryptographic Cloud Storage,” Proc. 14th Int’l Conf. Financial Cryptography and Data Security, pp. 136-149, 2010.

Downloads

Published

2015-11-05

Issue

Section

Research Articles

How to Cite

[1]
Hadia Rahman, " China ASEAN Economic Relations and USA Factor , International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 1, Issue 4, pp.286-298, September-October-2015.