CFP last date
20 December 2024
Reseach Article

A compositional Approach of Web Security in Cloud Computing

Published on May 2012 by Sakshi Bhatia, Vikram Singh, Deepti Gupta, Ritu Yadav
National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
Foundation of Computer Science USA
RTMC - Number 15
May 2012
Authors: Sakshi Bhatia, Vikram Singh, Deepti Gupta, Ritu Yadav
afd5c796-5f39-48c7-adca-3fbe77aa4db1

Sakshi Bhatia, Vikram Singh, Deepti Gupta, Ritu Yadav . A compositional Approach of Web Security in Cloud Computing. National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011. RTMC, 15 (May 2012), 22-25.

@article{
author = { Sakshi Bhatia, Vikram Singh, Deepti Gupta, Ritu Yadav },
title = { A compositional Approach of Web Security in Cloud Computing },
journal = { National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011 },
issue_date = { May 2012 },
volume = { RTMC },
number = { 15 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 22-25 },
numpages = 4,
url = { /proceedings/rtmc/number15/7146-1112/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%A Sakshi Bhatia
%A Vikram Singh
%A Deepti Gupta
%A Ritu Yadav
%T A compositional Approach of Web Security in Cloud Computing
%J National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%@ 0975-8887
%V RTMC
%N 15
%P 22-25
%D 2012
%I International Journal of Computer Applications
Abstract

Web security has evolved along with the Web itself, and the varying threats and attacks that need to be controlled at any one time. Initially, the biggest threat to people using the Web was one of accidentally viewing inappropriate content. Cloud computing is the provision of dynamically scalable and often virtualized resources as a service over the Internet on a utility basis. Cloud computing services often provide common business applications online that are accessed from a web browser, while the software and data are stored on the servers. As the cloud computing it self is the composition of different web spaces that are physically distibuted, because of this it require more securiity in terms of their integration.

References
  1. Armbrust, M. , Fox, A. , Gri_th, R. , Joseph, A. D. , Katz, R. H. , Konwinski, A. , Lee,G. , Patterson, D. A. , Rabkin, A. , Stoica, I. , Zaharia, M. : Above the clouds: Aberkeley view of cloud computing. Technical Report UCB/EECS-2009-28, EECSDepartment, University of California, Berkeley (Feb 2009)
  2. Keller, A. , Ludwig, H. : The wsla framework: Specifying and monitoring service level agreements for web services. J. Netw. Syst. Manage. 11(1) (2003) 57{81
  3. Ludwig, H. , Keller, A. , Dan, A. , King, R. , Franck, R. : Web service level agreement (WSLA) language speci_cation. IBM Corporation (2003)
  4. Theimportance of data integration in the era of cloud computing http://www. ebizq. net/blogs/linthicum/2009/01/the_importance_of_data_integra. php
  5. Tribhuwan, M. R. ; Bhuyar, V. A. ; Pirzade, S. . : Ensuring Data Storage Security in Cloud Computing service. In: 2010 IEEE International Conference on Advances in recent tech in comm. and computing.
  6. Xiaolin Lu, "Service and cloud computing oriented web GIS for labor and social security applications " 20102nd international conference on information science and engg.
  7. SearchCloudSecurity. com http://searchcloudsecurity. techtarget. com/tip/Cloud-computing-security-model-overview-Network-infrastructure-issues
  8. J. Heiser and M. Nicolett, "Assessing the security risksof cloud computing," Gartner Report, 2009. [Online]. Available:http://www. gartner. com/DisplayDocument? id=685308.
  9. R. Dhamija, J. D. Tygar, and M. A. Hearst, "Why phishing works," in Proceedings of the 2006 Conference on Human Factors in Computing Systems (CHI), Montr´eal, Qu´ebec, Canada. ACM, 2006, pp. 581–590.
  10. M. McIntosh and P. Austel, "XML signature element wrapping attacks and countermeasures," in SWS '05: Proceedings of the 2005 workshop on Secure web services. ACM Press, 2005, pp. 20–27.
  11. S. Gajek, L. Liao, and J. Schwenk, "Breaking and fixing the inline approach," in SWS '07: Proceedings of the 2007 ACM workshop on Secure web services. New York, NY, USA: ACM, 2007, pp. 37–43.
  12. N. Gruschka and L. Lo Iacono, "Vulnerable Cloud: SOAP Message Security Validation Revisited," in ICWS '09: Proceedings of the IEEE International Conference on Web Services. Los Angeles, USA: IEEE, 2009.
  13. M86 White paper http://www. m86security. com/documents/pdfs/white_papers/business/WP_Hybrid_Web_Security. pdf
  14. Informatica , data integration company http://www. informatica. com/solutions/on_demand/Pages/index. aspx
Index Terms

Computer Science
Information Sciences

Keywords

Web Security Cloud Computing