International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 88 - Number 1 |
Year of Publication: 2014 |
Authors: Sahar Mohammed Abduljalil, Osman Hegazy, Ehab E. Hassanein |
10.5120/15320-3632 |
Sahar Mohammed Abduljalil, Osman Hegazy, Ehab E. Hassanein . Secured Services in Cloud Computing Environment. International Journal of Computer Applications. 88, 1 ( February 2014), 44-49. DOI=10.5120/15320-3632
Securing data is always of vital importance and because of the critical nature of cloud computing and large amounts of complex data it carries, the need is even important. Cryptographic algorithms are one of the most important areas in security. They are processes that protect data by making sure that unwanted people can't access it. Unfortunately, when the dataset size is huge, both memory use and computational cost can still be very expensive. In addition, single processor's memory and CPU resources are very limited, which make the algorithm performance inefficient. Security issues investigated in [1] requires that applications and services be capable of supporting a variety of security functionality such as authentications, authorization, and auditing and so on. Those mechanisms are likely to evolve over time because new mechanisms are developed and changed. So developer must avoid embedding security mechanisms statically and manually in order to adapt to changing requirements. The Cloud security service proposed casts those security functionalities in to a service. These strategy allows interfaces to be defined and permits an application to outsource security functionality from the cloud security service to fit it's current need. We are addressing in this paper a clear separation of concerns between the "business logic" and the "security logic" in order for any service implementing the proposed security service to be considered a high level secured service. This model is targeting developers willing to write secured services without burdening the developer of continuously rewriting security routines, and only be concerned with the business logic of the service, on the other hand it targets the end user that need to use the service as it is, and get the result or output.