CFP last date
20 December 2024
Reseach Article

Security-SLA and Signature Scheme for Cloud Network

by Abhishek Pandey, R. M. Tugnayat, Anil Tiwari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 91 - Number 11
Year of Publication: 2014
Authors: Abhishek Pandey, R. M. Tugnayat, Anil Tiwari
10.5120/15929-5207

Abhishek Pandey, R. M. Tugnayat, Anil Tiwari . Security-SLA and Signature Scheme for Cloud Network. International Journal of Computer Applications. 91, 11 ( April 2014), 42-45. DOI=10.5120/15929-5207

@article{ 10.5120/15929-5207,
author = { Abhishek Pandey, R. M. Tugnayat, Anil Tiwari },
title = { Security-SLA and Signature Scheme for Cloud Network },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 91 },
number = { 11 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 42-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume91/number11/15929-5207/ },
doi = { 10.5120/15929-5207 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:12:31.265948+05:30
%A Abhishek Pandey
%A R. M. Tugnayat
%A Anil Tiwari
%T Security-SLA and Signature Scheme for Cloud Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 91
%N 11
%P 42-45
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing is used for management of resources applications and information as services over the cloud. The resources used in Cloud are usually distributed as services. Cloud resources are majorly delivered to the customers in terms of services and the security here is implemented through the infrastructure security metrics via a Service Level Agreement (SLA). SLA is a legal framework between the provider and the user. In this paper we provide a comprehensive model that concentrates more on security issues. Here we try to generate security SLA which is different from traditional security as it deals with the service levels related to cloud security as in our work and see how it deals with the metrics related to security. We will also verify the security metrics through the Security SLA (SSLA). In this paper a signature based scheme based on Canonical Form Prime Factorization is also proposed.

References
  1. J Andrew, Security Metrics Replacing Fear, Uncertainty and Doubt: Addison Wesley, 2007.
  2. W. Jansen, "Directions in Security Metrics Research,NISTIR 7564," NIST, 2009.
  3. Jesus Luna, Hamza Ghani, Daniel Germanus and Neeraj Suri , A security framework for the cloud In Proc. of the International Conference on Security and Cryptography (SECRYPT), 2011
  4. Lee Badger, Tim Grance, Robert Patt-Corner, and Jeff Voas, 2012. "Cloud Computing Synopsis and Recommendations," NIST Special Publication 800-146, May–http://csrc. nist. gov/publications/nistpubs/800-146/sp800-146. pdf
  5. "Security Perspective in Security Management for Cloud Computing" A. S. Chaves, C. B. Westphall and F. R. Lamin, 2010 Sixth International Conference on Networking and Services, INE5619-06238.
  6. COBIT is an IT governance framework and supporting toolset - see http://www. isaca. org/Knowledge-Center/COBIT/Pages/Overview. aspx
  7. Problems Faced by Cloud Computing, Lord CrusAd3r,dl. packetstormsecurity. net/. . /ProblemsFacedbyCloudComputing. pdf.
  8. "Cryptography Challenges for Computational Privacy in Public Clouds" Sashank Dara, in the proceedings of IEEE 2013 CCEM Conference.
  9. Phani Bhushan Bhattacharya, Surender Kumar Jain, S. R. Nagpaul, Basic abstract algebra, Theorem 5. 4, p. 423.
  10. Sandifer, Charles (2007), The early mathematics of Leonhard Euler, MAA, ISBN 0-88385-559-3.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Service Level Agreement (SLA) Security Metrics Cloud Security.