The Journal of Supercomputing

, Volume 75, Issue 1, pp 109–122 | Cite as

A domain-divided configurable security model for cloud computing-based telecommunication services

  • Jinan Shen
  • Deqing ZouEmail author
  • Hai Jin
  • Bin Yuan
  • Weiqi Dai


Cloud computing emerges as one of the most promising technologies and is widely used in many fields. Cloud computing has been considered as an appropriate environment for telecommunication services. However, more threats appear in the migration of applications and telecommunication services from a traditional computing environment to a cloud platform. Traditional device-centric security systems are not effective as resources in the cloud are out of the users control. Data storage and processing for a telecommunication service in the cloud can be structured as a data service in PaaS (Platform-as-a-Service) level. Upper-level applications exchange data with the data service. In this paper, we propose a domain-divided security model in which different security policies are separately applied for three domains: the data storage domain, the data processing domain and the data transmission domain. In addition, security policies can be configured for upper-level applications based on their security requirements. Experimental results show that our proposed security model is both practical and lightweight as it can provide differentiated security protection for cloud computing-based telecommunication service with a low overhead.


Telecommunication service Cloud computing Security model Domain division 



This work is supported by National 973 Fundamental Basic Research Program under Grant No. 2014CB340600, National Science Foundation of China under Grant No. 61272072, and Program for New Century Excellent Talents in University Under Grant NCET-13-0241.


  1. 1.
    Zhu Z, Gupta P, Wang Q, Kalyanaraman S, Lin Y, Franke H, Sarangi S (2011) Virtual base station pool: towards a wireless network cloud for radio access networks. In: Proceedings of the 8th ACM international conference on computing frontiers. ACM, p 34Google Scholar
  2. 2.
    Campowsky K, Carella G, Magedanz T, Schreiner F (2012) Optimization of elastic cloud brokerage mechanisms for future telecommunication service environments. PIK-Praxis der Informationsverarbeitung und Kommunikation 35(3):153–159CrossRefGoogle Scholar
  3. 3.
    Khan AN, Kiah MM, Madani SA, Ali M et al (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Supercomput 66(3):1687–1706CrossRefGoogle Scholar
  4. 4.
    Nkosi M., Mekuria F (2010) Cloud computing for enhanced mobile health applications. In: 2010 IEEE second international conference on cloud computing technology and science (CloudCom). IEEE, pp 629–633Google Scholar
  5. 5.
    Ahmed M, Xiang Y (2010) Above the trust and security in cloud computing: a notion towards innovation. In: IEEE/IFIP 2010: proceedings of the IEEE/IFIP 8th international conference embedded and ubiquitous computing 2010. IEEE, pp 723–730Google Scholar
  6. 6.
    Cao N, Yang Z, Wang C, Ren K, Lou W (2011) Privacy-preserving query over encrypted graph-structured data in cloud computing. In: 2011 31st International conference on distributed computing systems (ICDCS). IEEE, pp 393–402Google Scholar
  7. 7.
    Mowbray M, Pearson S, Shen Y (2012) Enhancing privacy in cloud computing via policy-based obfuscation. J Supercomput 61(2):267–291CrossRefGoogle Scholar
  8. 8.
    Feng D-G, Zhang M, Zhang Y, Xu Z (2011) Study on cloud computing security. J Softw 22(1):71–83CrossRefGoogle Scholar
  9. 9.
    Chen D, Zhao H (2012) Data security and privacy protection issues in cloud computing. In: 2012 International conference on computer science and electronics engineering (ICCSEE), vol 1. IEEE, pp 647–651Google Scholar
  10. 10.
    Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11CrossRefGoogle Scholar
  11. 11.
    Angeli D, Masala E (2012) A cost-effective cloud computing framework for accelerating multimedia communication simulations. J Parallel Distrib Comput 72(10):1373–1385CrossRefGoogle Scholar
  12. 12.
    Bellavista P, Carella G, Foschini L, Magedanz T, Schreiner F, Campowsky K (2012) QoS-aware elastic cloud brokering for IMS infrastructures. In: 2012 IEEE symposium on computers and communications (ISCC). IEEE, pp 000157–000160Google Scholar
  13. 13.
    Khan AN, Kiah MM, Khan SU, Madani SA (2013) Towards secure mobile cloud computing: a survey. Future Gener Comput Syst 29(5):1278–1299CrossRefGoogle Scholar
  14. 14.
    Pan W, Duan Y (2010) Research of the application of cloud computing in telecommunication industry. Telecommun Sci 26(6):26–29Google Scholar
  15. 15.
    Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I et al (2010) A view of cloud computing. Commun ACM 53(4):50–58CrossRefGoogle Scholar
  16. 16.
    López-Ibáñez M, Prasad TD, Paechter B (2008) Ant colony optimization for optimal control of pumps in water distribution networks. J Water Resour Plan Manag 134(4):337–346CrossRefGoogle Scholar
  17. 17.
    Bagirov AM, Barton A, Mala-Jetmarova H, Al Nuaimat A, Ahmed S, Sultanova N, Yearwood J (2013) An algorithm for minimization of pumping costs in water distribution systems using a novel approach to pump scheduling. Math Comput Model 57(3):873–886CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  • Jinan Shen
    • 1
  • Deqing Zou
    • 1
    Email author
  • Hai Jin
    • 1
  • Bin Yuan
    • 1
  • Weiqi Dai
    • 1
  1. 1.Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and TechnologyHuazhong University of Science and TechnologyWuhanChina

Personalised recommendations