Open Access Open Access  Restricted Access Subscription or Fee Access

Cloud SafeSys: Secure Model for Cloud Computing System

Vaibhav Sawant, Lakhan Relwani, Vishal Wakchaure, Harshad Gojare, Hanumant Pawar

Abstract


Cloud computing is a efficient way for sharing distributed resources and services due to high availability and performance along with least cost for different organizations or sites. But in cloud computing there is a huge issue of security in the open environment, so it is necessary to find loophole while developing a cloud computing application in order to reduce vulnerability. In this paper, we pay attention regarding to avoid the loophole to maintain security in cloud computing environment. We proposed a new way that is used in cloud computing system that builds a trusted computing environment for by integrating various trusted computing platform into cloud computing system. Along with this we propose model system in which cloud computing system is combined with trusted computing platform with trusted platform module. In this model, some important security services are included for authentication, confidentiality and integrity, are provided in cloud computing system. So this can be achieve by data classification at client side before the data is stored and it is categorized into availability, integrity and confidentiality along with trusted computing platform into cloud computing system. We propose a model system in which cloud computing system is combined with trusted computing platform with availability, integrity, confidentiality. In this model, some important security services like data encryption and processing including authentication, information reliability and confidentiality and prioritizing the data integrity, are provided in cloud computing system.


Keywords


Cloud Security, Authentication, Integrity, Data Protection, Trusted Services, Data Privacy

Full Text:

PDF

References


Balachandra Reddy Kandukuri, Ramacrishna PaturiV, Atanu Rakshi , “Cloud Security Issues”, 2009 IEEE International Conference on Services Computing, pages(s):517-520.

On technical security issues in cloud computing, Meiko Jensen etal,2009.

Cloud computing security management, Sameera Abdulrahman etal , 2009.

Inforamtion security risk management framework for cloud computing environments, Xuan Zhang etal, 2010.

A layered security approach for cloud computing infrastructure Mehnet Yeldiz etal, 2010.

Jason Reid Juan M. González Nieto Ed Dawson, "Privacy and Trusted Computing", Proceedings of the 14th International Workshop on Database and Expert Systems Applications, IEEE, 2003.

Algirds Avizienis, Jean-Claude Laprie, Brian Randell, and Carl Landwehr, “Basic Concepts and Taxonomy of Dependable and Secure Computing”, IEEE transactions on dependable and secure computing, vol.1, No.1, January-March, 2004.

Martín Abadi, "Logic in Access Control", Proceedings of the 18th Annual IEEE Symposium on Logic in Computer Science (LICS'03), 2003.

Trusted Computing Group (TCG), "TCG Specification Architecture Overview Specification Revision 1.2", April 28, 2004.

Tal Garfinkel, Mendel Rosenblum, and Dan Boneh, "Flexible OS Support and Applications for Trusted Computing", the 9th Workshop on Hot Topics in Operating Systems (HotOS IX), USENIX, 2003.

Cloud Security Alliance “Security Guidance, Critical Areas of Focus in Cloud Computing “ , April 2009-10 July 2009.

Frank E. Gillett, “Future View: The new technology ecosystems of cloud, cloud services and cloud computing” Forrester Report, August 2008.

B. R. Kandukuri, V, R. Paturi and A. Rakshit, “Cloud security issues,” in Proceedings of the 2009 IEEE International Conference on Services Computing, pp. 517-520, September 2009

Jing-Jang Hwang, Hung-Kai Chuang, Yi-Chang Hsu and Chien-Hsing Wu, “A Business Model for Cloud Computing Based on a Separate Encryption and Decryption Service”, 978-1-4244-9224-4/11 2011 IEEE

B. R. Kandukuri, V, R. Paturi and A. Rakshit, “Cloud security issues,” in Proceedings of the 2009 IEEE International Conference on Services Computing, pp. 517-520, September 2009.

R. Sterritt, “Autonomic computing,” Innovations in Systems and Software Engineering, vol. 1, no. 1, Springer, pp. 79-88. 2005.

R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility,” Future Generation Computer Systems, vol. 25, issue 6, pp. 599-616, June 2008.

L. M. Vaquero,L. Rodero-Merino,J. Caceres, and M. Lindner, “A break in the clouds: towards a cloud definition,” ACM SIGCOMM Computer Communication Review, vol. 39, no. 1, pp. 50-55, January 2009.

C. Weinhardt, A. Anandasivam, B. Blau, N. Borissov, T. Meinl, W.Michalk, and J. Stößer, “Cloud computing – a classification, business models, and research directions,” Business & Information Systems Engineering (BISE), vol. 1, no. 5, pp. 391-399, 2009.

N. Hawthorn, “Finding security in the cloud,” Computer Fraud & Security, vol. 2009, issue 10, pp. 19-20, October 2009.

A. Parakh and S. Kak, “Online data storage using implicit security”,Information Sciences, vol. 179, issue 19, pp. 3323-3333 ,September 2009.

R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public key cryptosystems”, Communications of the ACM, vol. 21, no. 2, pp.120-126, 1978.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.