Data Centric Security Approach For Cloud Computing
DOI:
https://doi.org/10.26438/ijcse/v9i3.4952Keywords:
Communication network, 3G, mobile core network, Broadband Router, HNBAbstract
The Data Centric Security (DCS) approach is talked about in detail. This approach is the central one utilized as a part of this postulation for upgrading cloud computing security and privacy. The Paper begins with looking into and ordering conceivable security solutions, in light of the DCS ideas in the cloud computing model. 3, at that point expands on these, to shape the applied structure for DCS implementations proposed in this exploration. [6] The normal advantages of applying the DCS way to deal with the cloud computing environments are talked about in. The extent of the application of the DCS way to deal with the cloud computing model for this proposal is recognized in the fundamental security necessities of applying the DCS way to deal with this extension are additionally cleared up. In addition, the accessible innovations that can be utilized to accomplish these necessities are looked into in that section. In light of such audits, appropriateness of these advancements is evaluated to determine a novel solution, which is among the fundamental contributions of this examination. Finally, the outline of this part is quickly introduced.
References
[1] J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, ,(2011)“All your clouds are belong to us: security analysis of cloud management interfaces,” in Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW ’11, (New York, NY, USA), pp. 3–14, ACM, 2011.
[2] T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, (2009) “Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds,” in Proceedings of the 16th ACM conference on Computer and communications security, CCS ’09, (New York, NY, USA), pp. 199–212, ACM, 2009.
[3] D. Molnar and S. Schechter, (2010) “Self hosting vs . cloud hosting, : Accounting for the security impact of hosting in the cloud,” in Workshop of the economics of cloud security, pp. 1–18, 2010.
[4] Y. Chen, V. Paxson, and R. Katz, (2010) “The hybrex model for confidentiality and privacy in cloud computing,” Technical Report UCB/EECS-2010-5, EECS Department, University of California, Berkeley, January 2010.
[5] N. Santos, K. P. Gummadi, and R. Rodrigues, ( 20009) “Towards trusted cloud computing,” in Proceedings of the 2009 conference on Hot topics in cloud computing, HotCloud’09, (Berkeley, CA, USA), USENIX Association, 2009.
[6] D. Kuhlmann, R. Landfermann, H. V. Ramasamy, M. Schunter, G. Ramunno, and D. Vernizzi, (2006) “An open trusted computing architecture – secure virtual machines enabling user-defined policy enforcement,” Work, pp. 1–14, 2006.
[7] N. Pohlmann and H. Reimer, (2008) “Trusted computing - eine einfA˜ 1 4 hrung,” in Trusted Computing (N. Pohlmann and H. Reimer, eds.), pp. 3–12, Vieweg+Teubner, 2008. 10.1007/978-3-8348-9452- 6 1.
[8] M. Nauman, S. Khan, X. Zhang, and J.-P. Seifert,(2010) “Beyond kernel-level integrity measurement: Enabling remote attestation for the android platform,” in Trust and Trustworthy Computing (A. Acquisti, S. Smith, and A.-R. Sadeghi, eds.), vol. 6101 of Lecture Notes in Computer Science, pp. 1–15, Springer Berlin / Heidelberg, 2010. 10.1007/978-3-642-13869-01.
[9] I. Bente, G. Dreo, B. Hellmann, S. Heuser, J. Vieweg, J. von Helden, and J. Westhuis,(2011) “Towards permission-based attestation for the android platform,” in Trust and Trustworthy Computing (J. McCune, B. Balacheff, A. Perrig, A.-R. Sadeghi, A. Sasse, and Y. Beres, eds.), vol. 6740 of Lecture Notes in Computer Science, pp. 108–115, Springer Berlin / Heidelberg, 2011. 10.1007/978-3-642- 21599-58.
[10] R. Neisse, D. Holling, and A. Pretschner, (2011) “Implementing trust in cloud infrastructures,” in Cluster, Cloud and Grid Computing (CCGrid), 2011 11th IEEE/ACM International Symposium on, pp. 524 –533, may 2011.
[11] B. Parno,(2008) “Bootstrapping trust in a ”trusted” platform,” in Proceedings of the 3rd conference on Hot topics in security, (Berkeley, CA, USA), pp. 9:1–9:6, USENIX Association, 2008.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
