An Automated Methodology for Secured User Allocation in Cloud

  • Srijita BasuEmail author
  • Anirban Sengupta
  • Chandan Mazumdar
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 625)


Use of cloud infrastructure by enterprises for hosting their data and applications is growing at a rapid pace. This calls for proper security measures for protecting sensitive enterprise data within the Cloud. Absence of owners’ control over data stored in Cloud introduces major security concerns that should be handled by the Cloud Service Provider. One of the most critical aspects is secure handling of data deletion; it should be ensured that sensitive data is completely deleted from the Cloud on an owner’s request to avoid data leakages. This paper presents a methodology for effective and efficient allocation of Virtual Machines to users, while ensuring security of sensitive data that belongs to users within the same Conflict of Interest classes. The issue of secured data deletion has been addressed by the proposed methodology which, being a provider-end solution, does not incur any additional user overhead.


Cloud security Conflict of interest Secured data deletion Virtual machine reservation 


  1. 1.
    Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. J. Future Gener. Comput. Syst. 25, 599–616 (2008)CrossRefGoogle Scholar
  2. 2.
    Hashizume, K., Rosado, D.G., Fernández-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. J. Int. Serv. Appl. 4(5), 1–13 (2013)Google Scholar
  3. 3.
    Rong, C., Nguyen, S.T., Jaatun, M.J.: Beyond lightning: a survey on security challenges in cloud computing. J. Recent Adv. Technol. Theor. Grid Cloud Comput. Bio-Eng. 39(1), 4–54 (2013)Google Scholar
  4. 4.
    Sun, Y., Zhang, J., Zhiong, Y., Zhu, G.: Data security and privacy in cloud computing. J. Dist. Sens. Netw. 2014, 1–9 (2014)Google Scholar
  5. 5.
    Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2010)CrossRefGoogle Scholar
  6. 6.
    Majumder, A., Namasudra, S., Nath, S.: Taxonomy and classification of access control models for cloud environments. In: Zaigham, M. (ed.) Continued Rise of the Cloud: Advances and Trends in Cloud Computing. Computer Communications and Networks, Springer. London (2014)Google Scholar
  7. 7.
    Wang, C., Wang, Q., Ren, K., Louu, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 Proceedings of INFOCOM, pp. 1–9. IEEE Press, San Diego (2010)Google Scholar
  8. 8.
    Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings of INFOCOM, pp. 1–9. IEEE Press, San Diego (2010)Google Scholar
  9. 9.
    Liu, Q., Wang, G., Wu, J.: Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. J. Inf. Sci. 258, 35–370 (2014)MathSciNetGoogle Scholar
  10. 10.
    Wang, H., He, D., Tang, S.: Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. J. IEEE Trans. Inf. For. Secur. 11(6), 1165–1176 (2016)CrossRefGoogle Scholar
  11. 11.
    Aceto, G., Botta, A., de Donato, W., Pescapè, A.: Cloud monitoring: definitions, issues and future directions. In: 2012 Proceedings of IEEE CloudNet, pp. 63—67. IEEE Press, Paris (2012)Google Scholar
  12. 12.
    Basu, S., Sengupta, A., Mazumdar C.: Implementing Chinese wall security model for cloud-based services. In: ICGCIoT 2015, pp. 1083–1089. IEEE Press, Noida (2015)Google Scholar
  13. 13.
  14. 14.

Copyright information

© Springer Nature Singapore Pte Ltd. 2016

Authors and Affiliations

  • Srijita Basu
    • 1
    Email author
  • Anirban Sengupta
    • 1
  • Chandan Mazumdar
    • 1
  1. 1.Jadavpur UniversityKolkataIndia

Personalised recommendations