We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

An Approach to Enhance Security of Cloud Computing Services using Software Engineering Model

by Manu A.R., Dinesha H.A., Manoj Kumar M., V.K. Agrawal, K.N. Balasubramanya Murthy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 11
Year of Publication: 2013
Authors: Manu A.R., Dinesha H.A., Manoj Kumar M., V.K. Agrawal, K.N. Balasubramanya Murthy
10.5120/11440-6999

Manu A.R., Dinesha H.A., Manoj Kumar M., V.K. Agrawal, K.N. Balasubramanya Murthy . An Approach to Enhance Security of Cloud Computing Services using Software Engineering Model. International Journal of Computer Applications. 67, 11 ( April 2013), 23-30. DOI=10.5120/11440-6999

@article{ 10.5120/11440-6999,
author = { Manu A.R., Dinesha H.A., Manoj Kumar M., V.K. Agrawal, K.N. Balasubramanya Murthy },
title = { An Approach to Enhance Security of Cloud Computing Services using Software Engineering Model },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 11 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 23-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number11/11440-6999/ },
doi = { 10.5120/11440-6999 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:24:23.906971+05:30
%A Manu A.R.
%A Dinesha H.A.
%A Manoj Kumar M.
%A V.K. Agrawal
%A K.N. Balasubramanya Murthy
%T An Approach to Enhance Security of Cloud Computing Services using Software Engineering Model
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 11
%P 23-30
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing has great prospective of benefitting rigorous computational supremacy to the civilization society at reduced price. It facilitates consumers amid restricted computational assets to subcontract their bulky computational work assignments to the cloud, and cost-effectively have the benefit of the immense computational supremacy, bandwidth, storage, and even suitable software that can be pooled in a pay-per-use manner. Regardless of the tremendous acceptance, security and privacy is the primary and major hindrance that stops the broad acceptance of this endowed computing sculpt, particularly for consumers whilst their private data or information are possessed and produced during the computation. Delighting the cloud since an inherently timid insecure computing stage from the perspective of the cloud consumers, in this work we devise cloud computing life cycle model to facilitate not only to defend confidential information by permitting computations with encrypted records, but also shield consumers from malevolent performances by permitting the validation of the computational outcome. Such a scheme of broad-spectrum of protected computational subcontracting lately shown to be viable in hypothesis, but to devise method to facilitate practically efficient also remains as an extremely challenging task. Focusing on engineering and computing approach for minimization tasks, this paper proposes widely applicable method through proper design of the secure model for implementing the security measures in the cloud life cycle model using the software engineering approach.

References
  1. CSA- Reference Doc
  2. NIST definition of cloud computing.
  3. Hyper Text Transmission Protocol: Communication Technology Proceedings-2003. by Xiaoli Yu; Jianping Wu; Xia Yin; Dept. of Computer Tsinghua Univ. , Beijing, China
  4. Hyper text transmission protocol with security: A Performance Analysis of Secure HTTP Protocol by Xubin He, Member, IEEE.
  5. "Cloud Security a comprehensive guide to secure cloud computing", Ronald L Krutz and Russell Dean Vines, Wiley India.
  6. Cloud computing second edition Dr. Kumar Saurabh Wiley India.
  7. Wikipedia "Secure_Hypertext_Transfer_Protocol".
  8. [Cloud Computing] BMC Cloud Lifecycle Management: Managing Cloud Services from Request to Retirement | BMC Communities Blog.
  9. Man in the middle attack Moxie Marlinspike (2009).
  10. Cloud Computing Challenges and Related Security Issues: a survey project report on Cloud Computing Challenges and Related Security Issues by Prof. Raj Jain
  11. Protocols for Secure Cloud Computing IBM Research – Zurich Christian Cachin April 2011
  12. Datamation "Ten-Challenges-Facing-Cloud-Computing" -3869466-2.
  13. blogs. sap-"innovation/cloud-computing/top-9-challenges-in-cloud-computing-that-are-slowing-its-adoption-011918".
  14. "Wireless Sensor-Cloud Integration Using Ant Colony Routing Algorithm", R. Monica, Dinesha H A, Dr. V. K Agrawal, International Conference on cloud computing and service engineering (CLUSE2012), held at Raja Rajeshwari College of Engineering & KINGSTON, UK, 11-13 April 2012, 294-298.
  15. "Multi-level Authentication Technique for Accessing Cloud Services", Dinesha H A, Dr. V. K. Agrawal, IEEE International Conference on Computing, Communication and Applications (ICCCA-2012), Dindigul, Tamilnadu, India, 978-1-4673-0270-8, 1 – 4.
  16. "Cloud Computing Technologies in Indian Rural Schools and Engineering College Education", Abhishek A, Dinesha H A, Dr. V. K Agrawal, ICICS's2012, Jan, 2012, 67-70.
  17. "Virtualization Technologies and Techniques in Education Learning Applications ", Dinesha H A, Dr. V. K Agrawal, International Conference on e-Education and e-Learning ICEEEL, held at World Academy of Science, Engineering and Technology, PARIS-FRANCE on November 14-16, 2011, 984-991.
  18. "Multi-dimensional Password Generation Technique for accessing cloud services", Dinesha H A, Dr. V. K Agrawal, Special Issue on: "Cloud Computing and Web Services", IJCCSA, Vol. 2, No. 3, June 2012, 31-39.
  19. "Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System". Dinesha H A, R Monica and V. K. Agrawal. IJAIS, Published by Foundation of Computer Science, New York, USA, May 2012, 16-21.
  20. "Advanced Technologies and Tools for Indian Rural School Education System", Dinesha H A, Dr. V. K Agrawal, International Journal of Computer Applications (IJCA) (0975 – 8887) Volume 36– No. 10, December 2011, 54-60.
  21. wikipedia , "Cloud_computing_security".
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing Security Privacy Cloud life cycle Services