Research Article

An Investigation towards Paradigm Shift of Cloud Computing Approach and Need of New Security Protocol

by  Veena R.S., Ramachandra V. Pujeri, Indiramma M.
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Issue 9
Published: November 2015
Authors: Veena R.S., Ramachandra V. Pujeri, Indiramma M.
10.5120/ijca2015907114
PDF

Veena R.S., Ramachandra V. Pujeri, Indiramma M. . An Investigation towards Paradigm Shift of Cloud Computing Approach and Need of New Security Protocol. International Journal of Computer Applications. 130, 9 (November 2015), 27-36. DOI=10.5120/ijca2015907114

                        @article{ 10.5120/ijca2015907114,
                        author  = { Veena R.S.,Ramachandra V. Pujeri,Indiramma M. },
                        title   = { An Investigation towards Paradigm Shift of Cloud Computing Approach and Need of New Security Protocol },
                        journal = { International Journal of Computer Applications },
                        year    = { 2015 },
                        volume  = { 130 },
                        number  = { 9 },
                        pages   = { 27-36 },
                        doi     = { 10.5120/ijca2015907114 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2015
                        %A Veena R.S.
                        %A Ramachandra V. Pujeri
                        %A Indiramma M.
                        %T An Investigation towards Paradigm Shift of Cloud Computing Approach and Need of New Security Protocol%T 
                        %J International Journal of Computer Applications
                        %V 130
                        %N 9
                        %P 27-36
                        %R 10.5120/ijca2015907114
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Today cloud computing platform is de-facto and strategic component of corporate and end user applications usage in pervasive and ubiquitous manner. The level based services makes the higher possibilities of availability, scalability, collaborative in most cost effective way. However integration of various service layers into cloud stack also invites intrinsic threats, risk and vulnerabilities, thus security become prime concern for the adaptabilities. This paper mainly focus on understanding the changing trends of usage of cloud computing platform for various services, fundamental research approaches towards cloud security and finally need of requirements for strengthening the security protocol. The facts, concept and statistics illustrated in this paper is of extensive use to the researchers, industries and academicians towards developing new mechanisms and protocol for future secured cloud framework.

References
  • Forbes Technology. 2015. “Roundup of Cloud Computing Forecasts and Market Estimates Q3 Update, ,”http://www.forbes.com/sites/louiscolumbus/2015/09/27/roundup-of-cloud-computing- forecasts-and-market-estimates-q3-update-2015/, [online, visited on 27th September]
  • Cisco. 2019. “Cisco Visual Networking Index: Forecast and Methodology, 2014-2019 White Paper),” http://www.cisco.com/c/en/us/solutions/collateral/service-provider/ip-ngn-ip-next-generation- network/white_paper_c11-481360.html, [online, visited on 27th September]
  • Evdokimov, S., and Günther, O.2007. Encryption techniques for secure database outsourcing. In Computer Security, ESORICS, pp. 327-342
  • Oprea, A.M.2007. Efficient cryptographic techniques for securing storage systems. PhD diss., IBM Zurich
  • “Examples of Current Cloud Applications”, .Retrieved, 22nd Sep, 2015. Link:-http://www.evo-uk.org/at-the-outset/cloud-computing/examples-of-current-cloud-applications/, Retrieved, 29th September, 2015
  • Ko, R., Choo, R. 2015. The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Syngress, Computers, pp. 570
  • Lim, I., Coolidge, E. C., Hourani, P.2013. Securing Cloud and Mobility: A Practitioner's Guide. CRC Press Business & Economics, pp. 228,
  • Yang, X. 2013. Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing. IGI Global Computers, pp. 452
  • Salam, A., Gilani, Z., Haq, S. U.2015. "eploying and Managing a Cloud Infrastructure: Real-World Skills for the CompTIA Cloud+ Certification and Beyond: Exam CV0-001. John Wiley & Sons Computers, pp. 456
  • Marinescu, D. C.2013. Cloud Computing: Theory and Practice. Newnes Computers, pp. 416
  • Sen, J.2013. Security and Security and Privacy Issues in Cloud Computing. Architectures and Protocols for Secure Information Technology Infrastructures, pp. 1-45
  • Hwang, K., Dongarra, J., Fox, G.C.2013. Distributed and Cloud Computing: From Parallel Processing to the Internet of Things. Morgan Kaufmann Computers, pp. 672
  • Shinder, D.2011. Security Considerations for Infrastructure as a Service Cloud Computing Model. WindowSecurity.com
  • Potter, D.2015. SaaS, PaaS and IaaS: What you need to know about the risks. Arrow ECS E-Magazine
  • He, D., and Zeadally, S.2015. An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment using Elliptic Curve Cryptography. IEEE Internet of things Journal, Vol. 2, No. 1
  • Ning, H., Liu, H., and Yang, L. T.2015. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things. IEEE Transactions on Parallel and Distributed Systems, Vol. 26, No. 3
  • Li, F., and Xiong, P.2013. Practical Secure Communication for Integrating Wireless Sensor Networks into the Internet of Things. IEEE Sensors Journal, Vol. 13, No. 10
  • Premnath, S.N., and Haas, Z. J.2015. Security and Privacy in the Internet-of-Things under Time-and-Budget-Limited Adversary Model., IEEE Wireless Communications Letters, Vol. 4, No. 3
  • H-Ramos, J. L., Pawlowski, M. P., Jara, A. J., Skarmeta, A. F., and Ladid, L.2015. Toward a Lightweight Authentication and Authorization Framework for Smart Objects, IEEE Journal on Selected Areas in Communications, Vol. 33, No. 4
  • Hu, W-C.2013.Big Data Management, Technologies, and Applications. IGI Global Computers, pp. 342
  • Gadepally, V., Hancock, B., Kaiser, B., Michaleas, J. K. P., Varia, M., Yerukhimovich, A. 2015. Computing on Masked Data to Improve the Security of Big Data", Institute of Electrical and Electronics Engineers
  • Islam, M.R., and Islam, M. E.2014. An approach to provide security to unstructured Big Data. In Software, Knowledge, Information Management and Applications (SKIMA), 8th International Conference, pp. 1-5
  • Lu, R., Zhu, H., Liu, X., Liu, J. K., and Shao, J.2014. Toward efficient and privacy-preserving computing in big data era.  Network, IEEE, Vol. 28, No. 4, pp.46-50
  • Vaquero, L., Celorio, A., Cuadrado, F., and Cuevas, R.2015. Deploying Large-Scale Data Sets on Demand in the Cloud: Treats and Tricks on Data Distribution
  • Marchal, S., François, J., State, R., and Engel, T.2014. PhishStorm: Detecting Phishing with Streaming Analytics. Network and Service Management, IEEE Transactions, Vol. 11, No. 4, pp.458-471
  • Tari, Z., Yi, X., Premarathne, U.S., Bertok, P., and Khalil, I.2015. Security and Privacy in Cloud Computing: Vision, Trends, and Challenges. Cloud Computing, IEEE, Vol. 2, No. 2, pp. 30-38
  • Jeyakanthan, M., and Nayak, A.2012. Policy management: leveraging the open virtualization format with contract and solution models. Network, IEE, Vol. 26, No. 5, pp. 22-27
  • Hamlen, K.W., Kagal, L., and Kantarcioglu, M.2012. Policy Enforcement Framework for Cloud Data Management. IEEE Data Eng. Bull, Vol. 35, No. 4, pp. 39-45
  • Hassan, T., and Joshi, J.B.D.2012. Semantic-based policy management for cloud computing environments. International Journal of Cloud Computing, Vol. 1, No. 2-3, pp.119-144
  • Sandhu, R., and Chana, I. Retrived, 12th Oct, 2015. Securing Virtual Machine in Cloud Enviroment using OVF and Hashing Function
  • Open ID Connect Connects your Businesses: A Simple Identity Layer on top of OAuth 2.0", OPen ID, Link: - http://openid.net/, Retrieved, 22nd Sep, 2015
  • "passport-ibm-connections-cloud", Link:-https://www.npmjs.com/package/passport-ibm-connections-cloud, Retrieved, 23rd Sept, 2015
  • Kapoor, V., Abraham, V. S., and Singh, R.2008. Elliptic curve cryptography. ACM Ubiquity, Vol. 9, No. 20, pp.20-26
  • Abdullah, K.2010. Comparison between the RSA cryptosystem and elliptic curve cryptography. PhD diss., The University of Waikato
  • Meffert, D.2009. Bilinear pairings in cryptography. PhD diss., Master’s thesis, Radboud Universiteit Nijmegen
  • Kate, A., and Goldberg, I.2010. Distributed private-key generators for identity-based cryptography. In Security and Cryptography for Networks, Springer Berlin Heidelberg, pp. 436-453
  • Tsai, J-L., and Lo, N-W.2015. Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services.IEEE Systems Journal, Vol. 9, No. 3
  • Ahn, H., Chang, H., Jang, C., and Choi, E.2011. User Authentication Platform using Provisioning in Cloud Computing Environment. In Advanced Communication and Networking,Springer Berlin Heidelberg, pp. 132-138
  • Kim, J-M., and Moon, J-K.2014. Research Article Secure Authentication System for Hybrid Cloud Service in Mobile Communication Environments. Hindawi Publishing Corporation International Journal of Distributed Sensor Networks, pp. 7,
  • Ghazizadeh, E., Shams, Z. S., Dolatabadi, R. Khaleghparast, M. Zamani, A. A.Manaf, and Abdullah, M. S.2014. Research Article Secure OpenID Authentication Model by Using Trusted Computing", Hindawi Publishing Corporation, pp. 15
  • Dranger, S., Sloan, R. H., and Solworth, J. A.2006.  The complexity of discretionary access control. Springer Berlin Heidelberg
  • Ferraiolo, D.F., and Kuhn, R.D. 2009. Role-based access controls", arXiv preprint arXiv:0903.2171
  • Sandhu, R.S., Coyne, E. J., Feinstein, H.L., and Youman, C.E. 1996. Role-based access control models", Computer, Vol. 2, pp. 38-47
  • Lin, G., Wang, D., Bie, Y., and Lei, M.2014. MTBAC: A mutual trust based access control model in cloud computing. Communications, China, Vol. 11, No. 4, pp.154-162
  • Yeo, S-S., Kim, S-J., and Cho, D-E.2014. Research Article Dynamic Access Control Model for Security Client Services in Smart Grid. Hindawi Publishing Corporation International Journal of Distributed Sensor Networks, pp. 7
  • Wang, C., Zou, P., Liu, Z., and Wang, J. 2011. Research Article CS-DRM: A Cloud-Based SIM DRM Scheme forMobile Internet. Hindawi Publishing Corporation EURASIP Journal onWireless Communications and Networking, pp. 19
  • Liu, Q., Weng, C., Li, M., and Luo, Y.2010. An In-VM measuring framework for increasing virtual machine security in clouds. Security & Privacy,Vol. 8, No. 6, pp. 56-62
  • Zhu, H., Xue, Y., Chen, X., Li, Q., and Li, H.2015. Research Article V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service. Hindawi Publishing Corporation Mobile Information Systems, pp. 9
  • Benninger, C., Neville, S. W., Yazır, Y. O., Matthews, C., and Coady, Y.2012. Maitland: Lighter-weight vm introspection to support cyber-security in the cloud. In Cloud Computing (CLOUD), 2012 IEEE 5th International Conference, pp. 471-478
  • Sharif, M., Lee, W., Cui, W., and Lanzi, A.2009. Secure in-vm monitoring using hardware virtualization. In Proceedings of the 16th ACM conference on Computer and communications security, pp. 477-487
  • Bratus, S., Locasto, M.E., Ramaswamy, A., and Smith, S.W. 2010. VM-based security overkill: a lament for applied systems security research. In Proceedings of the workshop on New security paradigms, pp. 51-60
  • Sammy, K., Shengbing, R., and Wilson, C.2012. Energy efficient security preserving vm live migration in data centers for cloud computing. International Journal of Computer Science Issues. 9, No. 2, pp.2-3
  • Mearian, L.2015. News Analysis: - No, your data isn't secure in the cloud. Computer World,Reteived
  • T-Pastoriza, J.R., and González, F.P.2011. CryptoDSPs for cloud privacy. In Web Information Systems Engineering–WISE 2010 Workshops, Springer Berlin Heidelberg, pp. 428-439
  • Tysowski, P.K., and Hasan, M. A.2011. Re-Encryption-Based Key Management towards Secure and Scalable Mobile Applications in Clouds. IACR Cryptology ePrint Archive, pp. 668
  • Mohanta, B.K., and Gountia, D.2013. Fully homomorphism encryption equating to cloud security: An approach. IOSR Journal of Computer Engineering (IOSR-JCE)
  • Damgård, I., Jakobsen, T.P., Nielsen, J.B., and Pagter, J.I. 2013. Secure key management in the cloud. In Cryptography and Coding, Springer Berlin Heidelberg, pp. 270-289
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Cloud computing Cloud Stack Security Secured Cloud Framework Vulnerability

Powered by PhDFocusTM