IJSTR

International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
0.2
2019CiteScore
 
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020

CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT

IJSTR >> Volume 8 - Issue 10, October 2019 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Cloud Computing Architecture And Applications Security

[Full Text]

 

AUTHOR(S)

Waleed T. Al-Sit

 

KEYWORDS

Cloud computing, Cloud architecture, NIST, Reference model, 3DES, AES, Security applications.

 

ABSTRACT

Cloud computing is developed to tackle storage limitations and information security. It's being considered as a new computing paradigm that offers dynamic and flexible resource allocation. Business owners have become more attracted in the possibilities of using cloud computing because it increases the reachability of their services and reduces the need for physical resources. In this paper, the cloud computing architecture is described with a brief actors' roles based reference model. This model allows the stakeholders to understand the overall view of functions, activities, and responsibilities to evaluate and assign the risk of services. At the end of this work, several open researches for security applications is concluded and discussed.

 

REFERENCES

[1] R. Buyya, S. Y. Chee, V. Srikumar, B. James, and B. Ivona, "Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility," Future Generation computer systems 25, vol. 6 ,pp. 599-616, 2009.
[2] G. Brunette, and R. Mogull,“Security guidance for critical areas of focus in cloud computing v2. 1,”. Cloud Security Alliance, USA, 1-76, 2009.
[3] P. Mell and T. Grance, "The NIST Definition of Cloud Computing," National Institute of Standards and Technology, Information Technology Laboratory, 2011.
[4] P. Dhir and S. Garg,"Survey on cloud computing and data masking techniques," International Journal of Innovations and Advancement in Computer Science, vol. 6, pp. 2347-8616,2017.
[5] G. Garg, S. Sabharwal, A. Jain. (2016, July),"Basics of cloud computing," International Research Journal of Engineering and Technology, 3 (7),
[6] M Ali, S. Khan, and A. Vasilakos,"Security in cloud computing: Opportunities and challenges," Information Science, pp.357-383, 2015.
[7] K.Hashizume, D.G.Rosado, E.Fernndez-Medina, and E.B. Fernandez," An analysis of security issues for cloud computing," Internet Services Application, vol. 4, pp. 5,2013.
[8] F. Liu, J. Tong, J. Mao, R. Bohn, J. Messina, L. Badger, and D. Leaf, "NIST cloud computing reference architecture," NIST special publication, pp. 1-28, 2011.
[9] M. Alhamad, T. Dillon, and E. Chang " Conceptual SLA framework for cloud computing," In Digital Ecosystems and Technologies (DEST), 4th IEEE International Conference on ,pp. 606-610, 2010.
[10] W. Pauley," Cloud provider transparency: an empirical evaluation," IEEE Security and Privacy, vol. 8 , pp. 32-39, 2010.
[11] C. Pettey, and R. van der Meulen, ' Gartner says cloud consumers need brokerages to unlock the potential of cloud services,' Technical Gartner report, 2009.
[12] J. Lucas‐Simarro, I. Aniceto, R. Moreno‐Vozmediano, R. Montero, andI. Llorente " A cloud broker architecture for Multicloud environments," Large Scale Network-Centric Distributed Systems, pp. 359-376, 2013.
[13] A. Samba, "Logical data models for cloud computing architectures," IT Professional, vol. 14, pp. 19-26.McMillan, 2012.
[14] S. Orenga-Roglá, and R. Chalmeta,"Social customer relationship management: taking advantage of Web 2.0 and Big Data technologies,". SpringerPlus, vol. 5, pp. 1462, 2016.
[15] D. R. Fordham, and C. W. Hamilton,"Accounting, Information Technology in Small Businesses: An Inquiry," Journal of Information Systems, 2017.
[16] S. Satish, T. N. Manjunath, and R. S. Hegadi," E-Solution for Next Line of Business and Education Using Cloud Computing," In Computing and Communication Technologies (WCCCT), World Congress on, pp. 105-110, 2017, IEEE.
[17] J. W. Rittinghouse, and J. F. Ransome," Cloud computing: implementation, management, and security," CRC press, 2017
[18] A. Ruiz-Zafra, K. Benghazi, M. Noguera, and J. L. Garrido," Zappa:An open mobile platform to build cloud-based m-health systems," In Ambient Intelligence-Software and Applications, Springer, Heidelberg, pp. 87-94, 2013.
[19] K. Gandhi and P. Gandhi,“Cloud Computing Security Issues: An Analysis,” INDIACom, pp. 3858-3861, 2016.
[20] US Department of Health and Human Services, "Health insurance reform: security standards," Final rule 45 , 2003.
[21] T. Luarasi, M. Durresi, and A. Durresi ” Healthcare based on Cloud
Computing,” 16th International Conference on Network-Based
Information Systems, pp 113-118, 2013,
[22] Guuk university. “What is Cisco ACS?”, Internet:
https://geek-university.com/ccna-security/what-is-cisco-acs/
(Accessed on 10th June 2019)
[23] F. Tschorsch and B. Scheuermann, “Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies,” IEEE Communications Surveys & Tutorials, vol. 18, no. 3, pp. 2084–2123, 2016.
[24] A. Azaria, A. Ekblaw T. Vieira, and A. Lippman,“MedRec: Using Blockchain for Medical Data Access and Permission Management,” Proceedings of the 2nd Int’l Conference on Open and Big Data (OBD 16), pp. 25–30, 2016.
[25] J. Zhang, N. Xue, and X. Huang, “A Secure System for Pervasive
Social NetworkBased Healthcare,” IEEE Access, vol. 4, pp.
9239–9250, 2016.
[26] C. Espocito, A. De Santis, G. Tortora, H. Chang, and K. Kwang,
“Blockchain: A Panacea for Healthcare Cloud-Based Data Security and
Privacy?,” IEEE CS and IEEE ComSoc, pp 31,37 , 2018.
M. Kandqal, M. Gahlawat, and K. Patel, ”Role of predictive modiling in cloud services pricing: A survay,” IEEE, 7th international conference on cloud computing, pp 249-259, 2017.
[27] B. Rohit and S. Sugata, “Review on Security Subjects in Cloud
Computing and Related Mitigation Techniques," In International Journal of Computer Applications, vol. 47, pp 47-66, June 2012.
[28] “Amazon Web Services: Overview of Security Processes”, March
2013. pp.1-48.Internet:
https://d0.awsstatic.com/whitepapers/Security/AWS_Security_Whitepaper.pdf
(Accessed on 26th June 2019)
[29] Infoblox Scott Fulton. “Top 10 DNS attacks likely to infiltrate your
network.”Internet: https://www.networkworld.com/article.html.
(Accessed on 10th August 2019)
[30] P. Garg, S. Goel and A. Sharma,“Security Techniques for Cloud
Computing Environment,” ICCCA2017, pp. 771-776.
[31] A. B. Jeng, C. C. Tseng, D. F. Tseng, and J. C. Wang,
“A Study of CAPTCHA and its Application to User Authentication”,
Proc. Of 2nd Intl. Conference on Computational Collective Intelligence: Technologies and Applications, 2010.
[32] V. Fusenig and A. Sharma, “Security Architecture for Cloud
Networking,” International Conference on Computing, Networking and
Communications, Cloud Computing and Networking Symposium, pp. 45-49, 2012.
[33] J. Wei, X. Zhang, G. Ammons, V. Bala and Peng
Ning,”Managing security of virtual machine images in a cloud environment,” the 2009 ACM workshop on Cloud computing security, pp 91-96, November 2009.
[34] M. Mowbray and S. Pearson, “A Client-Based Privacy Manager
for Cloud Computing,” the Fourth International ICST Conference on
Communication System, June 2009.