Simulation of Cloud Data Security Processes and Performance

被引:0
|
作者
Chand, Krishan [1 ]
Ramachandran, Muthu [1 ]
Kor, Ah-Lian [1 ]
机构
[1] Leeds Beckett Univ, Sch Comp Creat Technol & Engn, Leeds, W Yorkshire, England
关键词
Cloud computing; Performance; Security; Bonnita soft;
D O I
10.1007/978-3-319-23276-8_26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the world of cloud computing, millions of people are using cloud computing for the purpose of business, education and socialization. Examples of cloud applications are: Google Drive for storage, Facebook for social networks, etc. Cloud users use the cloud computing infrastructure thinking that these services are easy and safe to use. However, there are security and performance issues to be addressed. This paper discusses how cloud users and cloud providers address performance and security issues. In this research, we have used business process modelling and simulation to explore the performance characteristics and security concerns in the service development life cycle. The results show that Business Process Modelling Notations (BPMN) simulation is effective for the study of cloud security process in detail before actual implementation. The total simulation duration time was 51 days and 9 h 40 min but the results are displayed in 7 s only.
引用
收藏
页码:285 / 295
页数:11
相关论文
共 50 条
  • [1] Cloud Computing Security, Data, And Performance Issues
    Sinha, Neelu
    Khreisat, Laila
    2014 23RD WIRELESS AND OPTICAL COMMUNICATION CONFERENCE (WOCC), 2014,
  • [2] Towards performance evaluation of cloud service providers for cloud data security
    Ramachandran, Muthu
    Chang, Victor
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2016, 36 (04) : 618 - 625
  • [3] Fragmenting the Data in Cloud for Enhancing Security and Performance.
    Paul, Praveen
    Franklin, Ramya G.
    RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2016, 7 (03): : 349 - 355
  • [4] RETRACTED: An enhance the data security performance using an optimal cloud network security for big data cloud framework (Retracted Article)
    Venkatesan, B.
    Chitra, S.
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2022, 35 (16)
  • [5] Data Security and the Cloud
    Byington, J. Ralph
    Mcgee, Jo Ann
    JOURNAL OF CORPORATE ACCOUNTING AND FINANCE, 2014, 25 (05): : 41 - 44
  • [6] Security of Separated Data in Cloud Systems with Competing Attack Detection and Data Theft Processes
    Levitin, Gregory
    Xing, Liudong
    Huang, Hong-Zhong
    RISK ANALYSIS, 2019, 39 (04) : 846 - 858
  • [7] DROPS: Division and Replication of Data in Cloud for Optimal Performance and Security
    Ali, Mazhar
    Bilal, Kashif
    Khan, Samee U.
    Veeravalli, Bharadwaj
    Li, Keqin
    Zomaya, Albert Y.
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (02) : 303 - 315
  • [8] Performance Analysis of Homomorphic Cryptosystem on Data Security in Cloud Computing
    Beyene, Mebiratu
    Shekar, K. Raja
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [9] Simulation of Runtime Performance of Big Data Workflows on the Cloud
    Llwaah, Faris
    Cala, Jacek
    Thomas, Nigel
    COMPUTER PERFORMANCE ENGINEERING, 2016, 9951 : 141 - 155
  • [10] Cloud Security Ecosystem for Data Security and Privacy
    Arora, Akshay
    Khanna, Abhirup
    Rastogi, Anmol
    Agarwal, Amit
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), 2017, : 288 - 292