An Instance Communication Channel Key Organizer Model for Enhancing Security in Cloud Computing

被引:0
|
作者
Brindha, Thomas [1 ]
Shaji, Ramaswamy [1 ]
机构
[1] Noorul Islam Univ, Dept Informat Technol, Kanyakumari, Tamil Nadu, India
关键词
Cloud computing; data sharing; security; key organizer; communication channel; data management;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing has evolved as one of the next generation structural design of the IT endeavors in the recent years. It enables to function like the Internet through the process of accessing and sharing computing resources as virtual resources in a protected and scalable way, thereby obtaining huge influence in corporate data centers. Even as remotely hosted, governed services have long been a component of the IT landscape, an enhanced awareness in cloud computing has been powered by ubiquitous networks, maturing standards, the increase of hardware and software virtualization, and the drive to bring about IT costs flexible and obvious. Several schemes have been provided in cloud computing for enhancing the security, however most of them sustain from leakage of data. This leads to a greater issue while sharing the data in the cloud computing environment. In order to realize the leakage of data in the cloud, we address the construction of an efficient technique, Instance Communication Channel Key Organizer (ICCKO) model to support the security and data confidentiality in a secure manner. We formally prove the data security of ICCKO model based on client and server and analyze its performance and computational complexity. Performance of ICCKO model is evaluated in terms of communication overhead, log creation time, data transfer rate and channel disturbance level for sharing the data securely. Extensive security and performance analysis shows that the proposed scheme is tremendously efficient and provides with provable secure data sharing.
引用
收藏
页码:509 / 516
页数:8
相关论文
共 50 条
  • [21] Key Topics in Cloud Computing Security: A Systematic Literature Review
    Benslimane, Y.
    Yang, Z.
    Bahli, B.
    2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2015, : 88 - 91
  • [22] The Research on Cloud computing security model and Countermeasures
    Tang, JianGang
    SENSORS, MECHATRONICS AND AUTOMATION, 2014, 511-512 : 1196 - 1200
  • [23] Research of Security Model and Cloud Computing Strategy
    Ma Yingrui
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6196 - 6198
  • [24] Trust Model to Enhance Security of Cloud Computing
    Mohsenzadeh, Ali
    JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE-JMCS, 2015, 14 (04): : 315 - 325
  • [25] A Brief Survey on the Security Model of Cloud Computing
    Xue Jing
    Zhang Jian-jun
    PROCEEDINGS OF THE NINTH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING AND SCIENCE (DCABES 2010), 2010, : 475 - 478
  • [26] Security Model of Ad hoc Cloud Computing
    Sharma, Deepti
    2017 6TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2017, : 515 - 518
  • [27] A Cloud Computing Security Model Based on Noninterference
    Lü Congdong
    QIAN Gang
    CHEN Tao
    Wuhan University Journal of Natural Sciences, 2019, 24 (03) : 194 - 200
  • [28] A Security Model for Protecting Virtualization in Cloud Computing
    Singh, Saurabh
    Sharma, Pradip Kumar
    Park, Jong Hyuk
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2017, 421 : 385 - 388
  • [29] IT Security Threats in Cloud Computing Sourcing Model
    Rot, Artur
    Sobinska, Malgorzata
    2013 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2013, : 1153 - 1156
  • [30] A Review on Security Issue in Security Model of Cloud Computing Environment
    Venkatakotireddy, G.
    Rao, B. Thirumala
    Vurukonda, Naresh
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2017, 2018, 668 : 207 - 212