Skip to main content

A Secured Private-Cloud Computing System

  • Conference paper
  • First Online:
Applied Informatics (ICAI 2019)
  • The original version of this chapter was revised: The affiliation of the Author has been corrected as “Universidad Distrital Francisco Jose de Caldas, Bogota, Colombia”. The correction to this chapter is available at https://doi.org/10.1007/978-3-030-32475-9_39

Abstract

The advent of internet and rapid growth of digital media has vastly increased concerns of cloud computing as source of data and information storage ever than before. It allows users to setup their own private clouds since the public clouds available, can’t surpass their expectations at affordable costs. With private cloud computing, users do not need to be in a physical location when accessing personified cloud resources, thus; leading to cost reduction, improved user experience (ux), staff effectiveness, and file sharing with organizational collaborations from remote sites. Despite lots of benefits offered, there have been constant challenges associated with cloud computing from Data loss & breaches, service vulnerabilities, insufficient due diligence, identity, access and credential management, poor footprint tracking for threats & malicious insider attacks etc. which threatens network security. This proposed application is set out to provide immediate solution to help fight against cloud insecurity, particularly in private cloud domains through restriction of access to cloud resources, giving access to only trusted members to prove their identities through Footprint Notifications, Logging Encryption and activities of the authenticated users, as it is essential to monitor information flow on the cloud for information assessment purposes. The implementation of a secured Private-Cloud Computing System is the central focus of this project; the application is designed by using advanced features of HTML, CSS, JAVASCRIPT, & JQUERY for the frontend interface while PHP & MYSQL were used to design the backend of the application and its log encryption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Change history

  • 28 October 2019

    In the originally published version of the paper on p. 158, the name of the Author was incorrect. The name of the Author has been corrected as “Pramote Kuacharoen”.

    In the originally published version of the paper on p. 357, the affiliation of the Author was incorrect. The affiliation has been corrected as “Universidad Distrital Francisco Jose de Caldas, Bogota, Colombia”.

    In the originally published version of the paper on p. 373, the affiliation of the Author was incorrect. The affiliation has been corrected as “Universidad Distrital Francisco Jose de Caldas, Bogota, Colombia”.

References

  1. Zhou, J.: Analysis of Cloud Computing Security Problem. In: APSEC 2013 Cloud Workshop; Sydney, Australia (2013)

    Google Scholar 

  2. Yang, Y.: ‘State of the Public Cloud: The Cloud Adopters’ Perspective (2014). http://thecloud.appirio.com/rs/appirio/images/State_of_the_Public_Cloud_Results_FINAL-102910.pdf

  3. Pallis, G.: Cloud computing: the new frontier of internet computing. IEEE Internet Comput. 14(5), 70–73 (2010). ISSN 1089 7801

    Article  Google Scholar 

  4. Dhamija, R., Dusseault, L.: Seven flaws of identity management: usability and security challenges. IEEE Secur. Priv. 6, 24–29 (2008)

    Article  Google Scholar 

  5. Zhang, G.: Toward a unified ontology of cloud computing environments. Int. J. Comput. Eng. (IOSRJCE), 1(1), 1–8 (2015)

    MathSciNet  Google Scholar 

  6. Wolman, N.: An intro to cloud computing for contemporary business environment. (IOSRJCE), 1(1) (2013)

    Google Scholar 

  7. John Wiley: Cloud Computing Footprints, pp. 22–27. Hoboken, New Jersey, USA (2014)

    Google Scholar 

  8. Dennis, Y.: A History of Cloud Computing, p. 23 (2016)

    Google Scholar 

  9. Gopalakrishnan, H.: Dispersed identity for secure service interaction. In: IEEE, Piscataway, New Jersey, United States, pp. 56–59 (2013)

    Google Scholar 

  10. Grance, C.: Enhancing user authentication in claim-based identity management. In: (CTS), International Symposium IEEE, Piscataway, New Jersey, United States, pp. 75–83 (2013)

    Google Scholar 

  11. Ibrahim, B.: Auditing Cloud Computing: a Security and Privacy Guide, vol. 21 (2014)

    Google Scholar 

  12. Mambo, B.: CA Technologies Predicts Key Trends for Identity and Access Management (2016). http://www.ca.com/us/news/press-releases/na/2014/ca-technologies-predicts-key-trends-for-identity-and-access-management-in-2014.aspx. Accessed 2 June 2016

  13. Meier, P.: How Cloud Computing Works, HowStaffWoks.com. http://howstuffworks.com/cloud-computing/cloudcomputing3.html Accessed 24 Nov 2014

  14. Paul, P.: Security and cloud computing: identity management infrastructure for collaborative enterprises. In: 11th IEEE, Piscataway, New Jersey, United States, pp. 26–29 (2013)

    Google Scholar 

  15. Ranchal, K.: Evolution of cloud storage as cloud computing infrastructure. Int. J. Comput. Eng. (IOSRJCE), 1(1) (2015)

    Google Scholar 

  16. Sharma, Q.: A proposed architecture of cloud computing for education system in bangladesh and the impact on current education system. IEEE, Int. J. Comput. Sci. pp. 21–27 (2014)

    Google Scholar 

  17. William, K.: Above the Clouds: a Berkeley View of Cloud Computing. Dept. Electrical Eng. and Comput. Sciences, University of California, Berkeley, pp. 2–5 (2018)

    Google Scholar 

  18. Odun-Ayo, I., Misra, S., Omoregbe, N., Onibere, E., Bulama, Y., Damasevicius, R.: Cloud-based security-driven human resources management system. Front. Artif. Intell. Appl. 295, 96–106 (2017)

    Google Scholar 

  19. Jambhekar, N.D., Misra, S., Dhawale, C.A.: Cloud computing security with collaborating encryption. Indian J. Sci. Technol. 9(21), 1–7 (2016)

    Article  Google Scholar 

Download references

Acknowledgement

The authors of this research appreciate the immense contribution of Covenant University Centre for Research, Innovation, and Discovery (CUCRID) for its support for this research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sanjay Misra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Olowu, M., Yinka-Banjo, C., Misra, S., Florez, H. (2019). A Secured Private-Cloud Computing System. In: Florez, H., Leon, M., Diaz-Nafria, J., Belli, S. (eds) Applied Informatics. ICAI 2019. Communications in Computer and Information Science, vol 1051. Springer, Cham. https://doi.org/10.1007/978-3-030-32475-9_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-32475-9_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-32474-2

  • Online ISBN: 978-3-030-32475-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics