CFP last date
20 January 2025
Reseach Article

An Investigation towards Paradigm Shift of Cloud Computing Approach and Need of New Security Protocol

by Veena R.S., Ramachandra V. Pujeri, Indiramma M.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 9
Year of Publication: 2015
Authors: Veena R.S., Ramachandra V. Pujeri, Indiramma M.
10.5120/ijca2015907114

Veena R.S., Ramachandra V. Pujeri, Indiramma M. . An Investigation towards Paradigm Shift of Cloud Computing Approach and Need of New Security Protocol. International Journal of Computer Applications. 130, 9 ( November 2015), 27-36. DOI=10.5120/ijca2015907114

@article{ 10.5120/ijca2015907114,
author = { Veena R.S., Ramachandra V. Pujeri, Indiramma M. },
title = { An Investigation towards Paradigm Shift of Cloud Computing Approach and Need of New Security Protocol },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 9 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 27-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number9/23238-2015907114/ },
doi = { 10.5120/ijca2015907114 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:24:56.305278+05:30
%A Veena R.S.
%A Ramachandra V. Pujeri
%A Indiramma M.
%T An Investigation towards Paradigm Shift of Cloud Computing Approach and Need of New Security Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 9
%P 27-36
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Today cloud computing platform is de-facto and strategic component of corporate and end user applications usage in pervasive and ubiquitous manner. The level based services makes the higher possibilities of availability, scalability, collaborative in most cost effective way. However integration of various service layers into cloud stack also invites intrinsic threats, risk and vulnerabilities, thus security become prime concern for the adaptabilities. This paper mainly focus on understanding the changing trends of usage of cloud computing platform for various services, fundamental research approaches towards cloud security and finally need of requirements for strengthening the security protocol. The facts, concept and statistics illustrated in this paper is of extensive use to the researchers, industries and academicians towards developing new mechanisms and protocol for future secured cloud framework.

References
  1. Forbes Technology. 2015. “Roundup of Cloud Computing Forecasts and Market Estimates Q3 Update, ,”http://www.forbes.com/sites/louiscolumbus/2015/09/27/roundup-of-cloud-computing- forecasts-and-market-estimates-q3-update-2015/, [online, visited on 27th September]
  2. Cisco. 2019. “Cisco Visual Networking Index: Forecast and Methodology, 2014-2019 White Paper),” http://www.cisco.com/c/en/us/solutions/collateral/service-provider/ip-ngn-ip-next-generation- network/white_paper_c11-481360.html, [online, visited on 27th September]
  3. Evdokimov, S., and Günther, O.2007. Encryption techniques for secure database outsourcing. In Computer Security, ESORICS, pp. 327-342
  4. Oprea, A.M.2007. Efficient cryptographic techniques for securing storage systems. PhD diss., IBM Zurich
  5. “Examples of Current Cloud Applications”, .Retrieved, 22nd Sep, 2015. Link:-http://www.evo-uk.org/at-the-outset/cloud-computing/examples-of-current-cloud-applications/, Retrieved, 29th September, 2015
  6. Ko, R., Choo, R. 2015. The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues. Syngress, Computers, pp. 570
  7. Lim, I., Coolidge, E. C., Hourani, P.2013. Securing Cloud and Mobility: A Practitioner's Guide. CRC Press Business & Economics, pp. 228,
  8. Yang, X. 2013. Principles, Methodologies, and Service-Oriented Approaches for Cloud Computing. IGI Global Computers, pp. 452
  9. Salam, A., Gilani, Z., Haq, S. U.2015. "eploying and Managing a Cloud Infrastructure: Real-World Skills for the CompTIA Cloud+ Certification and Beyond: Exam CV0-001. John Wiley & Sons Computers, pp. 456
  10. Marinescu, D. C.2013. Cloud Computing: Theory and Practice. Newnes Computers, pp. 416
  11. Sen, J.2013. Security and Security and Privacy Issues in Cloud Computing. Architectures and Protocols for Secure Information Technology Infrastructures, pp. 1-45
  12. Hwang, K., Dongarra, J., Fox, G.C.2013. Distributed and Cloud Computing: From Parallel Processing to the Internet of Things. Morgan Kaufmann Computers, pp. 672
  13. Shinder, D.2011. Security Considerations for Infrastructure as a Service Cloud Computing Model. WindowSecurity.com
  14. Potter, D.2015. SaaS, PaaS and IaaS: What you need to know about the risks. Arrow ECS E-Magazine
  15. He, D., and Zeadally, S.2015. An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment using Elliptic Curve Cryptography. IEEE Internet of things Journal, Vol. 2, No. 1
  16. Ning, H., Liu, H., and Yang, L. T.2015. Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things. IEEE Transactions on Parallel and Distributed Systems, Vol. 26, No. 3
  17. Li, F., and Xiong, P.2013. Practical Secure Communication for Integrating Wireless Sensor Networks into the Internet of Things. IEEE Sensors Journal, Vol. 13, No. 10
  18. Premnath, S.N., and Haas, Z. J.2015. Security and Privacy in the Internet-of-Things under Time-and-Budget-Limited Adversary Model., IEEE Wireless Communications Letters, Vol. 4, No. 3
  19. H-Ramos, J. L., Pawlowski, M. P., Jara, A. J., Skarmeta, A. F., and Ladid, L.2015. Toward a Lightweight Authentication and Authorization Framework for Smart Objects, IEEE Journal on Selected Areas in Communications, Vol. 33, No. 4
  20. Hu, W-C.2013.Big Data Management, Technologies, and Applications. IGI Global Computers, pp. 342
  21. Gadepally, V., Hancock, B., Kaiser, B., Michaleas, J. K. P., Varia, M., Yerukhimovich, A. 2015. Computing on Masked Data to Improve the Security of Big Data", Institute of Electrical and Electronics Engineers
  22. Islam, M.R., and Islam, M. E.2014. An approach to provide security to unstructured Big Data. In Software, Knowledge, Information Management and Applications (SKIMA), 8th International Conference, pp. 1-5
  23. Lu, R., Zhu, H., Liu, X., Liu, J. K., and Shao, J.2014. Toward efficient and privacy-preserving computing in big data era.  Network, IEEE, Vol. 28, No. 4, pp.46-50
  24. Vaquero, L., Celorio, A., Cuadrado, F., and Cuevas, R.2015. Deploying Large-Scale Data Sets on Demand in the Cloud: Treats and Tricks on Data Distribution
  25. Marchal, S., François, J., State, R., and Engel, T.2014. PhishStorm: Detecting Phishing with Streaming Analytics. Network and Service Management, IEEE Transactions, Vol. 11, No. 4, pp.458-471
  26. Tari, Z., Yi, X., Premarathne, U.S., Bertok, P., and Khalil, I.2015. Security and Privacy in Cloud Computing: Vision, Trends, and Challenges. Cloud Computing, IEEE, Vol. 2, No. 2, pp. 30-38
  27. Jeyakanthan, M., and Nayak, A.2012. Policy management: leveraging the open virtualization format with contract and solution models. Network, IEE, Vol. 26, No. 5, pp. 22-27
  28. Hamlen, K.W., Kagal, L., and Kantarcioglu, M.2012. Policy Enforcement Framework for Cloud Data Management. IEEE Data Eng. Bull, Vol. 35, No. 4, pp. 39-45
  29. Hassan, T., and Joshi, J.B.D.2012. Semantic-based policy management for cloud computing environments. International Journal of Cloud Computing, Vol. 1, No. 2-3, pp.119-144
  30. Sandhu, R., and Chana, I. Retrived, 12th Oct, 2015. Securing Virtual Machine in Cloud Enviroment using OVF and Hashing Function
  31. Open ID Connect Connects your Businesses: A Simple Identity Layer on top of OAuth 2.0", OPen ID, Link: - http://openid.net/, Retrieved, 22nd Sep, 2015
  32. "passport-ibm-connections-cloud", Link:-https://www.npmjs.com/package/passport-ibm-connections-cloud, Retrieved, 23rd Sept, 2015
  33. Kapoor, V., Abraham, V. S., and Singh, R.2008. Elliptic curve cryptography. ACM Ubiquity, Vol. 9, No. 20, pp.20-26
  34. Abdullah, K.2010. Comparison between the RSA cryptosystem and elliptic curve cryptography. PhD diss., The University of Waikato
  35. Meffert, D.2009. Bilinear pairings in cryptography. PhD diss., Master’s thesis, Radboud Universiteit Nijmegen
  36. Kate, A., and Goldberg, I.2010. Distributed private-key generators for identity-based cryptography. In Security and Cryptography for Networks, Springer Berlin Heidelberg, pp. 436-453
  37. Tsai, J-L., and Lo, N-W.2015. Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services.IEEE Systems Journal, Vol. 9, No. 3
  38. Ahn, H., Chang, H., Jang, C., and Choi, E.2011. User Authentication Platform using Provisioning in Cloud Computing Environment. In Advanced Communication and Networking,Springer Berlin Heidelberg, pp. 132-138
  39. Kim, J-M., and Moon, J-K.2014. Research Article Secure Authentication System for Hybrid Cloud Service in Mobile Communication Environments. Hindawi Publishing Corporation International Journal of Distributed Sensor Networks, pp. 7,
  40. Ghazizadeh, E., Shams, Z. S., Dolatabadi, R. Khaleghparast, M. Zamani, A. A.Manaf, and Abdullah, M. S.2014. Research Article Secure OpenID Authentication Model by Using Trusted Computing", Hindawi Publishing Corporation, pp. 15
  41. Dranger, S., Sloan, R. H., and Solworth, J. A.2006.  The complexity of discretionary access control. Springer Berlin Heidelberg
  42. Ferraiolo, D.F., and Kuhn, R.D. 2009. Role-based access controls", arXiv preprint arXiv:0903.2171
  43. Sandhu, R.S., Coyne, E. J., Feinstein, H.L., and Youman, C.E. 1996. Role-based access control models", Computer, Vol. 2, pp. 38-47
  44. Lin, G., Wang, D., Bie, Y., and Lei, M.2014. MTBAC: A mutual trust based access control model in cloud computing. Communications, China, Vol. 11, No. 4, pp.154-162
  45. Yeo, S-S., Kim, S-J., and Cho, D-E.2014. Research Article Dynamic Access Control Model for Security Client Services in Smart Grid. Hindawi Publishing Corporation International Journal of Distributed Sensor Networks, pp. 7
  46. Wang, C., Zou, P., Liu, Z., and Wang, J. 2011. Research Article CS-DRM: A Cloud-Based SIM DRM Scheme forMobile Internet. Hindawi Publishing Corporation EURASIP Journal onWireless Communications and Networking, pp. 19
  47. Liu, Q., Weng, C., Li, M., and Luo, Y.2010. An In-VM measuring framework for increasing virtual machine security in clouds. Security & Privacy,Vol. 8, No. 6, pp. 56-62
  48. Zhu, H., Xue, Y., Chen, X., Li, Q., and Li, H.2015. Research Article V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service. Hindawi Publishing Corporation Mobile Information Systems, pp. 9
  49. Benninger, C., Neville, S. W., Yazır, Y. O., Matthews, C., and Coady, Y.2012. Maitland: Lighter-weight vm introspection to support cyber-security in the cloud. In Cloud Computing (CLOUD), 2012 IEEE 5th International Conference, pp. 471-478
  50. Sharif, M., Lee, W., Cui, W., and Lanzi, A.2009. Secure in-vm monitoring using hardware virtualization. In Proceedings of the 16th ACM conference on Computer and communications security, pp. 477-487
  51. Bratus, S., Locasto, M.E., Ramaswamy, A., and Smith, S.W. 2010. VM-based security overkill: a lament for applied systems security research. In Proceedings of the workshop on New security paradigms, pp. 51-60
  52. Sammy, K., Shengbing, R., and Wilson, C.2012. Energy efficient security preserving vm live migration in data centers for cloud computing. International Journal of Computer Science Issues. 9, No. 2, pp.2-3
  53. Mearian, L.2015. News Analysis: - No, your data isn't secure in the cloud. Computer World,Reteived
  54. T-Pastoriza, J.R., and González, F.P.2011. CryptoDSPs for cloud privacy. In Web Information Systems Engineering–WISE 2010 Workshops, Springer Berlin Heidelberg, pp. 428-439
  55. Tysowski, P.K., and Hasan, M. A.2011. Re-Encryption-Based Key Management towards Secure and Scalable Mobile Applications in Clouds. IACR Cryptology ePrint Archive, pp. 668
  56. Mohanta, B.K., and Gountia, D.2013. Fully homomorphism encryption equating to cloud security: An approach. IOSR Journal of Computer Engineering (IOSR-JCE)
  57. Damgård, I., Jakobsen, T.P., Nielsen, J.B., and Pagter, J.I. 2013. Secure key management in the cloud. In Cryptography and Coding, Springer Berlin Heidelberg, pp. 270-289
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing Cloud Stack Security Secured Cloud Framework Vulnerability