Security as a Service Model for Cloud Environment

被引:100
|
作者
Varadharajan, Vijay [1 ]
Tupakula, Udaya [1 ]
机构
[1] Macquarie Univ, Adv Cyber Secur Res Ctr, Fac Sci, Sydney, NSW 2109, Australia
基金
澳大利亚研究理事会;
关键词
Cloud security; security architecture; security and privacy;
D O I
10.1109/TNSM.2014.041614.120394
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is becoming increasingly important for provision of services and storage of data in the Internet. However there are several significant challenges in securing cloud infrastructures from different types of attacks. The focus of this paper is on the security services that a cloud provider can offer as part of its infrastructure to its customers (tenants) to counteract these attacks. Our main contribution is a security architecture that provides a flexible security as a service model that a cloud provider can offer to its tenants and customers of its tenants. Our security as a service model while offering a baseline security to the provider to protect its own cloud infrastructure also provides flexibility to tenants to have additional security functionalities that suit their security requirements. The paper describes the design of the security architecture and discusses how different types of attacks are counteracted by the proposed architecture. We have implemented the security architecture and the paper discusses analysis and performance evaluation results.
引用
收藏
页码:60 / 75
页数:16
相关论文
共 50 条
  • [21] Per-service security SLAs for cloud security management: model and implementation
    Casola, Valentina
    De Benedictis, Alessandra
    Modic, Jolanda
    Rak, Massimiliano
    Villano, Umberto
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2018, 9 (02) : 128 - 138
  • [22] Service-Centric Business Model in Cloud Environment
    Li, Tianyang
    He, Ting
    Zhang, Yufeng
    2015 IEEE 12TH INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2015), 2015, : 530 - 537
  • [23] A Model to Evaluate the Credibility of Service in Cloud Computing Environment
    Liao, Li
    Li, Bixin
    Li, Chao
    2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 294 - 301
  • [24] Tokenization Based Service Model for Cloud Computing Environment
    Paul, Shreya
    Singh, Atma Prakash
    Ahmad, Shafeeq
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, : 116 - 122
  • [25] Service Security Architecture and Access Control Model for Cloud Computing
    Yan Danfeng
    Yang Fangchun
    Yeap, Tet
    CHINA COMMUNICATIONS, 2011, 8 (06) : 44 - 50
  • [26] Enhancement of Cloud Security and Strength of Service Using Trust Model
    Prakash, Pragati
    Ekka, Nidhi
    Kathane, Tanmay
    Yadav, Nishi
    INTERNATIONAL CONFERENCE ON INTELLIGENT DATA COMMUNICATION TECHNOLOGIES AND INTERNET OF THINGS, ICICI 2018, 2019, 26 : 1345 - 1353
  • [27] User-Centric Security Service Model for Cloud Storage
    Yoo, SeongMin
    Park, PyungKoo
    Shin, JinSeop
    Ryu, HoYong
    Ryou, JaeCheol
    FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 : 373 - 382
  • [28] Cloud Service Provider Security Readiness Model: The Malaysian Perspective
    Ahmad, Nur Ilyani
    Mohamed, Ibrahim
    Daud, Maslina
    Jarno, Ahmad Dahari
    Hamid, Norlaili Abdul
    PROCEEDING OF 2019 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICEEI), 2019, : 75 - 80
  • [29] Trust Model for Measuring Security Strength of Cloud Computing Service
    Shaikh, Rizwana
    Sasikumar, M.
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 : 380 - 389
  • [30] Evaluating a Cloud Service using Scheduling Security Model (SSM)
    Sheikh, Abdullah
    Munro, Malcolm
    Budgen, David
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (10) : 525 - 532