Abstract
The advent of internet and rapid growth of digital media has vastly increased concerns of cloud computing as source of data and information storage ever than before. It allows users to setup their own private clouds since the public clouds available, can’t surpass their expectations at affordable costs. With private cloud computing, users do not need to be in a physical location when accessing personified cloud resources, thus; leading to cost reduction, improved user experience (ux), staff effectiveness, and file sharing with organizational collaborations from remote sites. Despite lots of benefits offered, there have been constant challenges associated with cloud computing from Data loss & breaches, service vulnerabilities, insufficient due diligence, identity, access and credential management, poor footprint tracking for threats & malicious insider attacks etc. which threatens network security. This proposed application is set out to provide immediate solution to help fight against cloud insecurity, particularly in private cloud domains through restriction of access to cloud resources, giving access to only trusted members to prove their identities through Footprint Notifications, Logging Encryption and activities of the authenticated users, as it is essential to monitor information flow on the cloud for information assessment purposes. The implementation of a secured Private-Cloud Computing System is the central focus of this project; the application is designed by using advanced features of HTML, CSS, JAVASCRIPT, & JQUERY for the frontend interface while PHP & MYSQL were used to design the backend of the application and its log encryption.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Change history
28 October 2019
In the originally published version of the paper on p. 158, the name of the Author was incorrect. The name of the Author has been corrected as “Pramote Kuacharoen”.
In the originally published version of the paper on p. 357, the affiliation of the Author was incorrect. The affiliation has been corrected as “Universidad Distrital Francisco Jose de Caldas, Bogota, Colombia”.
In the originally published version of the paper on p. 373, the affiliation of the Author was incorrect. The affiliation has been corrected as “Universidad Distrital Francisco Jose de Caldas, Bogota, Colombia”.
References
Zhou, J.: Analysis of Cloud Computing Security Problem. In: APSEC 2013 Cloud Workshop; Sydney, Australia (2013)
Yang, Y.: ‘State of the Public Cloud: The Cloud Adopters’ Perspective (2014). http://thecloud.appirio.com/rs/appirio/images/State_of_the_Public_Cloud_Results_FINAL-102910.pdf
Pallis, G.: Cloud computing: the new frontier of internet computing. IEEE Internet Comput. 14(5), 70–73 (2010). ISSN 1089 7801
Dhamija, R., Dusseault, L.: Seven flaws of identity management: usability and security challenges. IEEE Secur. Priv. 6, 24–29 (2008)
Zhang, G.: Toward a unified ontology of cloud computing environments. Int. J. Comput. Eng. (IOSRJCE), 1(1), 1–8 (2015)
Wolman, N.: An intro to cloud computing for contemporary business environment. (IOSRJCE), 1(1) (2013)
John Wiley: Cloud Computing Footprints, pp. 22–27. Hoboken, New Jersey, USA (2014)
Dennis, Y.: A History of Cloud Computing, p. 23 (2016)
Gopalakrishnan, H.: Dispersed identity for secure service interaction. In: IEEE, Piscataway, New Jersey, United States, pp. 56–59 (2013)
Grance, C.: Enhancing user authentication in claim-based identity management. In: (CTS), International Symposium IEEE, Piscataway, New Jersey, United States, pp. 75–83 (2013)
Ibrahim, B.: Auditing Cloud Computing: a Security and Privacy Guide, vol. 21 (2014)
Mambo, B.: CA Technologies Predicts Key Trends for Identity and Access Management (2016). http://www.ca.com/us/news/press-releases/na/2014/ca-technologies-predicts-key-trends-for-identity-and-access-management-in-2014.aspx. Accessed 2 June 2016
Meier, P.: How Cloud Computing Works, HowStaffWoks.com. http://howstuffworks.com/cloud-computing/cloudcomputing3.html Accessed 24 Nov 2014
Paul, P.: Security and cloud computing: identity management infrastructure for collaborative enterprises. In: 11th IEEE, Piscataway, New Jersey, United States, pp. 26–29 (2013)
Ranchal, K.: Evolution of cloud storage as cloud computing infrastructure. Int. J. Comput. Eng. (IOSRJCE), 1(1) (2015)
Sharma, Q.: A proposed architecture of cloud computing for education system in bangladesh and the impact on current education system. IEEE, Int. J. Comput. Sci. pp. 21–27 (2014)
William, K.: Above the Clouds: a Berkeley View of Cloud Computing. Dept. Electrical Eng. and Comput. Sciences, University of California, Berkeley, pp. 2–5 (2018)
Odun-Ayo, I., Misra, S., Omoregbe, N., Onibere, E., Bulama, Y., Damasevicius, R.: Cloud-based security-driven human resources management system. Front. Artif. Intell. Appl. 295, 96–106 (2017)
Jambhekar, N.D., Misra, S., Dhawale, C.A.: Cloud computing security with collaborating encryption. Indian J. Sci. Technol. 9(21), 1–7 (2016)
Acknowledgement
The authors of this research appreciate the immense contribution of Covenant University Centre for Research, Innovation, and Discovery (CUCRID) for its support for this research.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Olowu, M., Yinka-Banjo, C., Misra, S., Florez, H. (2019). A Secured Private-Cloud Computing System. In: Florez, H., Leon, M., Diaz-Nafria, J., Belli, S. (eds) Applied Informatics. ICAI 2019. Communications in Computer and Information Science, vol 1051. Springer, Cham. https://doi.org/10.1007/978-3-030-32475-9_27
Download citation
DOI: https://doi.org/10.1007/978-3-030-32475-9_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-32474-2
Online ISBN: 978-3-030-32475-9
eBook Packages: Computer ScienceComputer Science (R0)