Abstract
In the world of cloud computing, millions of people are using cloud computing for the purpose of business, education and socialization. Examples of cloud applications are: Google Drive for storage, Facebook for social networks, etc. Cloud users use the cloud computing infrastructure thinking that these services are easy and safe to use. However, there are security and performance issues to be addressed. This paper discusses how cloud users and cloud providers address performance and security issues. In this research, we have used business process modelling and simulation to explore the performance characteristics and security concerns in the service development life cycle. The results show that Business Process Modelling Notations (BPMN) simulation is effective for the study of cloud security process in detail before actual implementation. The total simulation duration time was 51 days and 9 h 40 min but the results are displayed in 7 s only.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
CSA: Security guidance for critical areas of focus in cloud computing v2.1. Cloud Security Alliance, December 2009
Techtarget: What is Platform as a Service (PaaS)? - Definition from WhatIs.com (2015). http://searchcloudcomputing.techtarget.com/definition/Platform-as-a-Service-PaaS. Accessed 29 May 2015
Khanghahi, N., Ravanmehr, R.: Cloud computing performance evaluation: issues and challenges. IJCCSA 3(5), 29–41 (2013)
ComputerWeekly.com: Security fears stop small firms using cloud computing (2015). http://www.computerweekly.com/news/2240240940/Security-fears-stopping-small-firms-using-cloud-computing. Accessed 20 April 2015
Munir, K., Palaniappan, S.: Secure Cloud Architecture. Adv. Comput. Int. J. (ACIJ) 4(1), 9–22 (2013)
Harauz, J., Kauifman, L., Potter, B.: Data security in the world of cloud computing. IEEE Secur. Priv. Mag. 7(4), 61–64 (2009)
NIST: Guidelines on security and privacy in public cloud computing. http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf. December 2011
Siani, P., Miranda, M.: Security threats in cloud computing. In: 6th International Conference on Internet Technology and Secured Transactions, Abu Dhabi, United Arab Emirates, pp. 11–14, December 2011
Sarwar, A., Ahmed Khan, M.N.: A review of trust aspects in cloud computing security (2013)
Mahmood, Z.: Data location and security issues in cloud computing. In: IEEE International Conference on Emerging Intelligent Data and Web Technologies (2011)
Behl, A.: Emerging security challenges in cloud computing. In: IEEE international Conference Information and Communication Technologies (WICT) (2011)
De Leeuw, E.: To mix or not to mix data collection modes in surveys. J. Official Stat. 21(2), 233–255 (2005)
Kheir, N.A.: System Modelling and Computer Simulation, 2nd edn. Marcell Dekker, New York (1996)
Cohen, L., Manion, L., Morrison, K.: Research Methods in Education, 6th edn. Routledge, Abingdon (2007)
Bryman, A.: The debate about quantitative and qualitative research: a question of method or epistemology? Br. J. Sociol. 35(1), 75–92 (1984)
Best, J., Kahn, J.: Research in Education. Pearson Education Inc., Upper Saddle River (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Chand, K., Ramachandran, M., Kor, AL. (2015). Simulation of Cloud Data Security Processes and Performance. In: Jahankhani, H., Carlile, A., Akhgar, B., Taal, A., Hessami, A., Hosseinian-Far, A. (eds) Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security. ICGS3 2015. Communications in Computer and Information Science, vol 534. Springer, Cham. https://doi.org/10.1007/978-3-319-23276-8_26
Download citation
DOI: https://doi.org/10.1007/978-3-319-23276-8_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23275-1
Online ISBN: 978-3-319-23276-8
eBook Packages: Computer ScienceComputer Science (R0)