CFP last date
20 December 2024
Reseach Article

An approach Initiating Security Protocol towards Cloud Computing

Published on May 2012 by Amit Joshi, Bhavesh Joshi, Manuj Joshi
National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
Foundation of Computer Science USA
RTMC - Number 7
May 2012
Authors: Amit Joshi, Bhavesh Joshi, Manuj Joshi
150314d4-a6bb-4975-93f1-02fe31bee12d

Amit Joshi, Bhavesh Joshi, Manuj Joshi . An approach Initiating Security Protocol towards Cloud Computing. National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011. RTMC, 7 (May 2012), 36-40.

@article{
author = { Amit Joshi, Bhavesh Joshi, Manuj Joshi },
title = { An approach Initiating Security Protocol towards Cloud Computing },
journal = { National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011 },
issue_date = { May 2012 },
volume = { RTMC },
number = { 7 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 36-40 },
numpages = 5,
url = { /proceedings/rtmc/number7/6673-1056/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%A Amit Joshi
%A Bhavesh Joshi
%A Manuj Joshi
%T An approach Initiating Security Protocol towards Cloud Computing
%J National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%@ 0975-8887
%V RTMC
%N 7
%P 36-40
%D 2012
%I International Journal of Computer Applications
Abstract

Cloud computing is a long awaited and now implemented dream of having interactive services and software applications, at reduced operational cost in the IT market, at highly automated and performance-based system, an on-demand services and these are just a few of the advantages that what cloud computing bring to us and what all features and services cloud computing provide us. It works on a Service Oriented Architecture (SOA) and delivers services as requested by the end users. Since cloud computing has a service oriented architecture, we rely on third party for our data and information are presented in the servers and data centers situated at different and hidden geographical locations all around the world. This reliance on third party shifts our attention to the security and standardization in cloud computing. The end users by no means, can determine data integrity and confidentiality of their data. Thus, our security protocol defines the standards to various cloud computing vendors and service providers, so that the problems such as data manipulation, data privacy and data consistency are minimized. This standardization will make data of end users more secure and safe and security areas may be resolved. The paper proposes a security Model and also standards according to Monitor based security protocol for the security of the clouds vendors to efficiently store data on the clouds and to prevent data from threats.

References
  1. IBM, ?North Carolina State University and IBM help bridge digital divide in North Carolina and beyond,? May 7, 2007, http://www-03. ibm. com/industries/education/doc/content/news/pressrelease/2494970110. html (Accessed on 10 Jan 2011).
  2. Amazon Elastic Compute Cloud (EC2): http://aws. amazon. com/ec2/ (Accessed on 10 Jan 2011).
  3. Hadoop: http://hadoop. apache. org/ (Accessed on 10 Jan 2011).
  4. Globus: http://www. globus. org/ (Accessed on 10 Jan 2011).
  5. The Grid: Blueprint for a New Computing Infrastructure, 2nd Edition, Morgan Kaufmann, 2004. ISBN: 1-55860-933-4.
  6. Condor: http://www. cs. wisc. edu/condor/ (Accessed on 10 Jan 2011).
  7. Amazon Elastic Compute Cloud (EC2): http://aws. amazon. com/ec2/ (Accessed on 10 Jan 2011).
  8. Rackspace Cloud: http://www. rackspacecloud. com (Accessed on 10 Jan 2011).
  9. Salesforce: www. salesforce. com (Accessed on 10 Jan 2011).
  10. Skytap: http://www. skytap. com (Accessed on 10 Jan 2011).
  11. Azure: http://www. microsoft. com/windowsazure/ - (Accessed on 10 Jan 2011).
  12. Google: http://code. google. com/appengine/ - (Accessed on 12 Mar 2011).
  13. . A. Vouk, ?Virtualization of Information Technology Resources, in Electronic Commerce: A Managerial Perspective 2008, 5th Edition y Turban, and Prentice-Hall Business Publishing, to appear.
  14. The Grid: Blueprint for a New Computing Infrastructure, 2nd Edition, Morgan Kaufmann, 2004. ISBN: 1-55860-933-4.
  15. Microsoft Virtualization products: http://www. microsoft. com/virtualization/default. mspx - (Accessed on 12 Mar 2011).
  16. E. Hand. Head in the clouds. Nature, (449):963, Oct 2007.
  17. A break in the clouds: towards a cloud definition. Vaquero, Rodero-Merino, Caceres, Lindner. 2008.
  18. Gartner Says Cloud Computing Will Be As Influential As E-business. Gartner. com. http://www. gartner. com/it/page. jsp?id=707508. Retrieved 2010-08-22.
  19. Gruman, Galen What cloud computing really means. InfoWorld. http://www. infoworld. com/d/cloud-computing/what-cloud-computing-really-means-031. Retrieved 2009-06-02.
  20. Cloud Computing: Clash of the clouds. The Economist. http://www. economist. com/displaystory. cfm?story_id=14637206. Retrieved 2009-11-03. NIST. gov - Computer Security Division - Computer Security Resource Center". Csrc. nist. gov.
  21. http://www. zdnet. com/blog/india/cloud-computings-latest-battlefield-india/179. Retrieved 2011-03-20.
  22. T. R. Peltier, J. Peltier, and J. Blackley. Information Security Fundamentals. Auerbach Publications, Boston, MA, USA, 2003.
  23. T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A Virtual Machine-Based Platform for Trusted Computing. In Proc. of SOSP'03, 2003.
  24. SAS 70: http://sas70. com/sas70_overview. html - accessed Jan 2011.
  25. SOX (Sarbanes–Oxley Act of 2002): http://www. gpo. gov/fdsys/pkg/PLAW-107publ204/content-detail. html - accessed Jan 2011.
  26. HIPAA - http://www. hipaa. org/ - Accessed 22 Mar 2011.
  27. Loss of customer data spurs closure of online storage service 'The Linkup'. http://www. networkworld. com/news/2008/081108-linkup-failure. html?page=1 – accessed Jan 2011.
  28. Latest cloud storage hiccups prompts data security questions. http://www. computerworld. com/action/article. do?command=viewArticleBasic&articleId=9130682&source=NLT_PM – accessed Jan 2011.
  29. Cloud computing: Don't get caught without an exit strategy. http://www. computerworld. com/action/article. do?command=viewArticleBasic&articleId=9128665&source=NLT_AM – accessed Jan 2011.
  30. Cloud Bursts as Coghead Calls It Quits. http://blogs. zdnet. com/collaboration/?p=349 – accessed Jan 2011.
  31. GoGrid API, http://www. gogrid. com/cloud-hosting/cloud-api. php – accessed Jan 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Utility Computing End-to-end Quality Of Service Network Security Internet Datacenters Cloud Computing