A NOVEL BASED SECURITY ARCHITECTURE OF CLOUD COMPUTING

被引:0
|
作者
Gupta, Subham Kumar [1 ]
Rawat, Seema [1 ]
Kumar, Praveen [2 ]
机构
[1] Amity Univ, Informat Technol, Noida, Uttar Pradesh, India
[2] Amity Univ, Comp Sci & Engn, Noida, Uttar Pradesh, India
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing is considered as the future of IT organizations. In weigh against to conventional solutions where all type of computing services are controlled through any type of personnel controls, it transfers all computing resources to the centralized large data centers, so users can enjoy services in a large scale on demand. Chiefly small and medium-size organizations can manage their projects by using cloud-based services and also able to achieve productivity enhancement with limited budgets. But, apart from all of these benefits, it may not be fully trustworthy. Cloud Computing do not keep data on the user's system, so there is a need of data security. The user pays progressively attention about data security due to this off-side storage of data on cloud computing. In order to retain confidentiality of data against un-trusted cloud service providers, There are so many approaches. All modern cloud service providers solve this problem by encryption and decryption techniques. They all have their merits and demerits. In present thesis, the basic dilemma of cloud computing security is inspected. We have also proposed a survey of various models for cloud security. To ensure the data security in the cloud, we suggest an efficient, accessible and adaptable cryptography based scheme. In-depth security and enactment inspection proved the proposed scheme as greatly efficient and robust against spiteful data alteration outbreak. The proposed scheme achieves scalability as well as flexibility due to its hierarchical structure.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] End To End Cloud Computing Architecture Based On A Novel Classification Of Security Issues
    Bouchaala, Mariem
    Ghazel, Cherif
    Saidane, Leila Azouz
    Kamoun, Farouk
    2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 303 - 310
  • [2] Mobile cloud computing: Architecture and Security
    Wang, Suzhen
    Du, Zhijuan
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2274 - 2281
  • [3] Contribution to Cloud Computing Security Architecture
    Drozdova, M.
    Rusnak, S.
    Segec, P.
    Uramova, J.
    Moravcik, M.
    2017 15TH IEEE INTERNATIONAL CONFERENCE ON EMERGING ELEARNING TECHNOLOGIES AND APPLICATIONS (ICETA 2017), 2017, : 117 - 122
  • [4] A security architecture for cloud computing alliance
    Jun Z.
    Jun, Zhao (hyzhaojun@126.com), 2017, Bentham Science Publishers (10): : 195 - 201
  • [5] An Architecture for Data Security in Cloud Computing
    Sugumaran, M.
    BalaMurugan, B.
    Kamalraj, D.
    2014 WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT 2014), 2014, : 252 - +
  • [6] An Integrated Architecture for Maintaining Security in Cloud Computing Based on Blockchain
    Awadallah, Ruba
    Samsudin, Azman
    Teh, Je Sen
    Almazrooie, Mishal
    IEEE ACCESS, 2021, 9 : 69513 - 69526
  • [7] Security Architecture based on Defense in Depth for Cloud Computing Environment
    Mavroeidakos, Theodoros
    Michalas, Angelos
    Vergados, Dimitrios D.
    2016 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2016,
  • [8] A Cloud Computing Based Architecture for Cyber Security Situation Awareness
    Yu, Wei
    Xu, Guobin
    Chen, Zhijiang
    Moulema, Paul
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 488 - 492
  • [9] Cloud computing security: Architecture, mechanism and modeling
    Lin, Chuang
    Su, Wen-Bo
    Meng, Kun
    Liu, Qu
    Liu, Wei-Dong
    Jisuanji Xuebao/Chinese Journal of Computers, 2013, 36 (09): : 1765 - 1784
  • [10] On-Demand Security Architecture for Cloud Computing
    Chen, Jianyong
    Wang, Yang
    Wang, Xiaomin
    COMPUTER, 2012, 45 (07) : 73 - 78