National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011 |
Foundation of Computer Science USA |
RTMC - Number 7 |
May 2012 |
Authors: Amit Joshi, Bhavesh Joshi, Manuj Joshi |
150314d4-a6bb-4975-93f1-02fe31bee12d |
Amit Joshi, Bhavesh Joshi, Manuj Joshi . An approach Initiating Security Protocol towards Cloud Computing. National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011. RTMC, 7 (May 2012), 36-40.
Cloud computing is a long awaited and now implemented dream of having interactive services and software applications, at reduced operational cost in the IT market, at highly automated and performance-based system, an on-demand services and these are just a few of the advantages that what cloud computing bring to us and what all features and services cloud computing provide us. It works on a Service Oriented Architecture (SOA) and delivers services as requested by the end users. Since cloud computing has a service oriented architecture, we rely on third party for our data and information are presented in the servers and data centers situated at different and hidden geographical locations all around the world. This reliance on third party shifts our attention to the security and standardization in cloud computing. The end users by no means, can determine data integrity and confidentiality of their data. Thus, our security protocol defines the standards to various cloud computing vendors and service providers, so that the problems such as data manipulation, data privacy and data consistency are minimized. This standardization will make data of end users more secure and safe and security areas may be resolved. The paper proposes a security Model and also standards according to Monitor based security protocol for the security of the clouds vendors to efficiently store data on the clouds and to prevent data from threats.