Skip to main content

Simulation of Cloud Data Security Processes and Performance

  • Conference paper
  • First Online:
Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security (ICGS3 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 534))

Included in the following conference series:

  • International Conference on Global Security, Safety, and Sustainability

Abstract

In the world of cloud computing, millions of people are using cloud computing for the purpose of business, education and socialization. Examples of cloud applications are: Google Drive for storage, Facebook for social networks, etc. Cloud users use the cloud computing infrastructure thinking that these services are easy and safe to use. However, there are security and performance issues to be addressed. This paper discusses how cloud users and cloud providers address performance and security issues. In this research, we have used business process modelling and simulation to explore the performance characteristics and security concerns in the service development life cycle. The results show that Business Process Modelling Notations (BPMN) simulation is effective for the study of cloud security process in detail before actual implementation. The total simulation duration time was 51 days and 9 h 40 min but the results are displayed in 7 s only.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. CSA: Security guidance for critical areas of focus in cloud computing v2.1. Cloud Security Alliance, December 2009

    Google Scholar 

  2. Techtarget: What is Platform as a Service (PaaS)? - Definition from WhatIs.com (2015). http://searchcloudcomputing.techtarget.com/definition/Platform-as-a-Service-PaaS. Accessed 29 May 2015

  3. Khanghahi, N., Ravanmehr, R.: Cloud computing performance evaluation: issues and challenges. IJCCSA 3(5), 29–41 (2013)

    Article  Google Scholar 

  4. ComputerWeekly.com: Security fears stop small firms using cloud computing (2015). http://www.computerweekly.com/news/2240240940/Security-fears-stopping-small-firms-using-cloud-computing. Accessed 20 April 2015

  5. Munir, K., Palaniappan, S.: Secure Cloud Architecture. Adv. Comput. Int. J. (ACIJ) 4(1), 9–22 (2013)

    Article  Google Scholar 

  6. Harauz, J., Kauifman, L., Potter, B.: Data security in the world of cloud computing. IEEE Secur. Priv. Mag. 7(4), 61–64 (2009)

    Article  Google Scholar 

  7. NIST: Guidelines on security and privacy in public cloud computing. http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf. December 2011

  8. Siani, P., Miranda, M.: Security threats in cloud computing. In: 6th International Conference on Internet Technology and Secured Transactions, Abu Dhabi, United Arab Emirates, pp. 11–14, December 2011

    Google Scholar 

  9. Sarwar, A., Ahmed Khan, M.N.: A review of trust aspects in cloud computing security (2013)

    Google Scholar 

  10. Mahmood, Z.: Data location and security issues in cloud computing. In: IEEE International Conference on Emerging Intelligent Data and Web Technologies (2011)

    Google Scholar 

  11. Behl, A.: Emerging security challenges in cloud computing. In: IEEE international Conference Information and Communication Technologies (WICT) (2011)

    Google Scholar 

  12. De Leeuw, E.: To mix or not to mix data collection modes in surveys. J. Official Stat. 21(2), 233–255 (2005)

    Google Scholar 

  13. Kheir, N.A.: System Modelling and Computer Simulation, 2nd edn. Marcell Dekker, New York (1996)

    Google Scholar 

  14. Cohen, L., Manion, L., Morrison, K.: Research Methods in Education, 6th edn. Routledge, Abingdon (2007)

    Google Scholar 

  15. Bryman, A.: The debate about quantitative and qualitative research: a question of method or epistemology? Br. J. Sociol. 35(1), 75–92 (1984)

    Article  Google Scholar 

  16. Best, J., Kahn, J.: Research in Education. Pearson Education Inc., Upper Saddle River (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Krishan Chand .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Chand, K., Ramachandran, M., Kor, AL. (2015). Simulation of Cloud Data Security Processes and Performance. In: Jahankhani, H., Carlile, A., Akhgar, B., Taal, A., Hessami, A., Hosseinian-Far, A. (eds) Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security. ICGS3 2015. Communications in Computer and Information Science, vol 534. Springer, Cham. https://doi.org/10.1007/978-3-319-23276-8_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23276-8_26

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23275-1

  • Online ISBN: 978-3-319-23276-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics