Advertisement

Ensuring Data Security and Performance Evaluation in Cloud Computing

  • Pourya Shamsolmoali
  • M. Afshar Alam
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 308)

Abstract

Cloud computing is threatened by unanswered security issues that are risky for both the cloud providers and users. Cloud is a computing design that manages large sets of distributed resources, of which scientists benefit from their convergence. The aim of this paper is divided into two parts: firstly a brief review on cloud computing mainly focusing on security and secondly offer a solution that eradicates possible threats. In particular, we proposed a new data security model that can efficiently protect the data whether in the cloud database or in transition. We start with an established authentication server and data server providing user authentication, user verification, and data support. The system follows SSL protocol for data encryption and protection, and secure deliver report (SDR) is used for data reliability and integrity of communication.

Keywords

Cloud computing Data protection Security Authentication Encryption Secure deliver report 

References

  1. 1.
    Casola, V., Cuomo, A., Rak, M., Villano, U.: The CloudGrid approach: security analysis and performance evaluation. Future Gener. Comput. Syst. (2011). doi: 10.1016/j.future.2011.08.008 Google Scholar
  2. 2.
    Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid computing 360-degree compared. In: 2008 Grid Computing Environments Workshop, 2008, pp. 1–10. doi: 10.1109/GCE.2008.4738445
  3. 3.
    NIST.: NIST cloud computing program. http://www.nist.gov/itl/cloud/. Retrieved 21 May 2011
  4. 4.
    Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 3(28), 583–592 (2012)CrossRefGoogle Scholar
  5. 5.
    Teneyuca, D.: Internet cloud security: the illusion of inclusion. Inf. Secur. Tech. Rep. 3–4(16), 102–107 (2011)CrossRefGoogle Scholar
  6. 6.
  7. 7.
    Archer, J., Boehm, A.: Security guidance V 3.0, Cloud Security Alliance (2011)Google Scholar
  8. 8.
    Archer, J., Boehme, A., Cullinane, D., Kurtz, P., Puhlmann, N., Reavis, J.: Top threats to cloud computing, version 1.0 (2010). Cloud security alliance retrieved 7 May 2011Google Scholar
  9. 9.
    Khorshed, M.T., Ali, A.B.M., Wasimi, S.A.: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 6(28), 833–851 (2012)CrossRefGoogle Scholar
  10. 10.
    Zhou, M., Mu, Y., Susilo, W., Yan, J., Dong, L.: Privacy enhanced data outsourcing in the cloud. J. Netw. Comput. Appl. 4(35), 1367–1373 (2012)CrossRefGoogle Scholar
  11. 11.
    Mackay, M., Baker, T., Al-Yasiri, A.: Security-oriented cloud computing platform for critical infrastructures. Comput. Law Secur. Rev. 6(28), 679–686 (2012)CrossRefGoogle Scholar
  12. 12.
    Rong, C., Nguyen, S.T., Jaatun, M.G.: Beyond lightning: a survey on security challenges in cloud computing. Comput. Electr. Eng. 39(1), 47–54 (2013)CrossRefGoogle Scholar
  13. 13.
    Sood, S.K.: A combined approach to ensure data security in cloud computing. J. Netw. Comput. Appl. 6(35), 1831–1838 (2012)MathSciNetCrossRefGoogle Scholar
  14. 14.
    Gao, J., Xiao, Y., Liu, J., Liang, W., Chen, C.L.P.: A survey of communication/networking in smart grids. Future Gener. Comput. Syst. 2(28), 391–404 (2012)CrossRefGoogle Scholar
  15. 15.
    Noureddine, M., Bashroush, R.: An authentication model towards cloud federation in the enterprise. J. Syst. Softw. (2010). doi: 10.1016/j.jss.2012.12.031 Google Scholar
  16. 16.
    Wang, C., Wang, Q., Ren, K.: Ensuring data storage security in cloud computing. In: 17th International Workshop on Quality of Service (IWQoS). IEEE, pp. 1–9 (2009)Google Scholar
  17. 17.
    Prasad, P., Ojha, B., Shahi, R.R., Lal, R.: 3-dimensional security in cloud computing. Comput. Res. Dev. 3, 198–208 (2011)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.Department of Computer ScienceJamia Hamdard UniversityNew DelhiIndia

Personalised recommendations