Data Centric Security Approach For Cloud Computing

Authors

  • Thade Lakshmi Devi Department of computer science and engineering, Mewar University, Rajasthan, India
  • S. Krishna Mohan Rao Department of computer science and engineering, Mewar University, Rajasthan, India

DOI:

https://doi.org/10.26438/ijcse/v9i3.4952

Keywords:

Communication network, 3G, mobile core network, Broadband Router, HNB

Abstract

The Data Centric Security (DCS) approach is talked about in detail. This approach is the central one utilized as a part of this postulation for upgrading cloud computing security and privacy. The Paper begins with looking into and ordering conceivable security solutions, in light of the DCS ideas in the cloud computing model. 3, at that point expands on these, to shape the applied structure for DCS implementations proposed in this exploration. [6] The normal advantages of applying the DCS way to deal with the cloud computing environments are talked about in. The extent of the application of the DCS way to deal with the cloud computing model for this proposal is recognized in the fundamental security necessities of applying the DCS way to deal with this extension are additionally cleared up. In addition, the accessible innovations that can be utilized to accomplish these necessities are looked into in that section. In light of such audits, appropriateness of these advancements is evaluated to determine a novel solution, which is among the fundamental contributions of this examination. Finally, the outline of this part is quickly introduced. 

References

[1] J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, ,(2011)“All your clouds are belong to us: security analysis of cloud management interfaces,” in Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW ’11, (New York, NY, USA), pp. 3–14, ACM, 2011.

[2] T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, (2009) “Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds,” in Proceedings of the 16th ACM conference on Computer and communications security, CCS ’09, (New York, NY, USA), pp. 199–212, ACM, 2009.

[3] D. Molnar and S. Schechter, (2010) “Self hosting vs . cloud hosting, : Accounting for the security impact of hosting in the cloud,” in Workshop of the economics of cloud security, pp. 1–18, 2010.

[4] Y. Chen, V. Paxson, and R. Katz, (2010) “The hybrex model for confidentiality and privacy in cloud computing,” Technical Report UCB/EECS-2010-5, EECS Department, University of California, Berkeley, January 2010.

[5] N. Santos, K. P. Gummadi, and R. Rodrigues, ( 20009) “Towards trusted cloud computing,” in Proceedings of the 2009 conference on Hot topics in cloud computing, HotCloud’09, (Berkeley, CA, USA), USENIX Association, 2009.

[6] D. Kuhlmann, R. Landfermann, H. V. Ramasamy, M. Schunter, G. Ramunno, and D. Vernizzi, (2006) “An open trusted computing architecture – secure virtual machines enabling user-defined policy enforcement,” Work, pp. 1–14, 2006.

[7] N. Pohlmann and H. Reimer, (2008) “Trusted computing - eine einfA˜ 1 4 hrung,” in Trusted Computing (N. Pohlmann and H. Reimer, eds.), pp. 3–12, Vieweg+Teubner, 2008. 10.1007/978-3-8348-9452- 6 1.

[8] M. Nauman, S. Khan, X. Zhang, and J.-P. Seifert,(2010) “Beyond kernel-level integrity measurement: Enabling remote attestation for the android platform,” in Trust and Trustworthy Computing (A. Acquisti, S. Smith, and A.-R. Sadeghi, eds.), vol. 6101 of Lecture Notes in Computer Science, pp. 1–15, Springer Berlin / Heidelberg, 2010. 10.1007/978-3-642-13869-01.

[9] I. Bente, G. Dreo, B. Hellmann, S. Heuser, J. Vieweg, J. von Helden, and J. Westhuis,(2011) “Towards permission-based attestation for the android platform,” in Trust and Trustworthy Computing (J. McCune, B. Balacheff, A. Perrig, A.-R. Sadeghi, A. Sasse, and Y. Beres, eds.), vol. 6740 of Lecture Notes in Computer Science, pp. 108–115, Springer Berlin / Heidelberg, 2011. 10.1007/978-3-642- 21599-58.

[10] R. Neisse, D. Holling, and A. Pretschner, (2011) “Implementing trust in cloud infrastructures,” in Cluster, Cloud and Grid Computing (CCGrid), 2011 11th IEEE/ACM International Symposium on, pp. 524 –533, may 2011.

[11] B. Parno,(2008) “Bootstrapping trust in a ”trusted” platform,” in Proceedings of the 3rd conference on Hot topics in security, (Berkeley, CA, USA), pp. 9:1–9:6, USENIX Association, 2008.

Downloads

Published

2021-03-31
CITATION
DOI: 10.26438/ijcse/v9i3.4952
Published: 2021-03-31

How to Cite

[1]
T. Lakshmi Devi and S. K. Mohan Rao, “Data Centric Security Approach For Cloud Computing”, Int. J. Comp. Sci. Eng., vol. 9, no. 3, pp. 49–52, Mar. 2021.

Issue

Section

Survey Article