Simulation of Cloud Data Security Processes and Performance

被引:0
|
作者
Chand, Krishan [1 ]
Ramachandran, Muthu [1 ]
Kor, Ah-Lian [1 ]
机构
[1] Leeds Beckett Univ, Sch Comp Creat Technol & Engn, Leeds, W Yorkshire, England
关键词
Cloud computing; Performance; Security; Bonnita soft;
D O I
10.1007/978-3-319-23276-8_26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the world of cloud computing, millions of people are using cloud computing for the purpose of business, education and socialization. Examples of cloud applications are: Google Drive for storage, Facebook for social networks, etc. Cloud users use the cloud computing infrastructure thinking that these services are easy and safe to use. However, there are security and performance issues to be addressed. This paper discusses how cloud users and cloud providers address performance and security issues. In this research, we have used business process modelling and simulation to explore the performance characteristics and security concerns in the service development life cycle. The results show that Business Process Modelling Notations (BPMN) simulation is effective for the study of cloud security process in detail before actual implementation. The total simulation duration time was 51 days and 9 h 40 min but the results are displayed in 7 s only.
引用
收藏
页码:285 / 295
页数:11
相关论文
共 50 条
  • [31] An Analysis on Data Accountability and Security in Cloud
    Hande, Shital A.
    Mane, Sunil B.
    2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL INSTRUMENTATION AND CONTROL (ICIC), 2015, : 713 - 717
  • [32] Data Security Policy In The Cloud Computing
    Ran Shuanglin
    PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 222 - 225
  • [33] Data Security in the World of Cloud Computing
    Kaufman, Lori M.
    IEEE SECURITY & PRIVACY, 2009, 7 (04) : 61 - 64
  • [34] Inter Cloud Data Transfer Security
    Chalse, Rajkumar R.
    Katara, Arun
    Selokar, Ashwin
    Talmale, Roshani
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 654 - 657
  • [35] Hybrid Data Security Model for Cloud
    Sood, Sandeep K.
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2013, 3 (03) : 50 - 59
  • [36] Harnessing Healthcare Data Security in Cloud
    Aiswarya, R.
    Divya, R.
    Sangeetha, D.
    Vaidehi, V.
    2013 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2013, : 482 - 488
  • [37] RTMDC for Effective Cloud Data Security
    Verma, Pankaj
    Dongre, Nilima
    Bittal, Vijaylaxmi
    INTELLIGENT COMMUNICATION TECHNOLOGIES AND VIRTUAL MOBILE NETWORKS, ICICV 2019, 2020, 33 : 64 - 73
  • [38] Homomorphic Encryption for Security of Cloud Data
    Potey, Manish M.
    Dhote, C. A.
    Sharma, Deepak H.
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 175 - 181
  • [39] Security Model for Securing Data on Cloud
    Madni, Ahmad Fayyaz
    Shah, Munam Ali
    2022 17TH INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES (ICET'22), 2022, : 206 - 211
  • [40] Data Security and Privacy in Cloud Storage
    Xinhua Dong
    Ruixuan Li
    Wanwan Zhou
    Dongjie Liao
    Shuoyi Zhao
    ZTECommunications, 2013, 11 (02) : 18 - 23