Simulation of Cloud Data Security Processes and Performance

被引:0
|
作者
Chand, Krishan [1 ]
Ramachandran, Muthu [1 ]
Kor, Ah-Lian [1 ]
机构
[1] Leeds Beckett Univ, Sch Comp Creat Technol & Engn, Leeds, W Yorkshire, England
关键词
Cloud computing; Performance; Security; Bonnita soft;
D O I
10.1007/978-3-319-23276-8_26
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the world of cloud computing, millions of people are using cloud computing for the purpose of business, education and socialization. Examples of cloud applications are: Google Drive for storage, Facebook for social networks, etc. Cloud users use the cloud computing infrastructure thinking that these services are easy and safe to use. However, there are security and performance issues to be addressed. This paper discusses how cloud users and cloud providers address performance and security issues. In this research, we have used business process modelling and simulation to explore the performance characteristics and security concerns in the service development life cycle. The results show that Business Process Modelling Notations (BPMN) simulation is effective for the study of cloud security process in detail before actual implementation. The total simulation duration time was 51 days and 9 h 40 min but the results are displayed in 7 s only.
引用
收藏
页码:285 / 295
页数:11
相关论文
共 50 条
  • [41] ANALYSIS OF DATA SECURITY IN CLOUD COMPUTING
    Iyer, K. B. Priya
    Manisha, R.
    Subhashree, R.
    Vedhavalli, K.
    PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, : 540 - 543
  • [42] On the Security of Cloud Data Storage and Sharing
    Zhou, Jianying
    SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 1 - 1
  • [43] Multilevel Security framework for Cloud Data
    Dixit, Akshat Kumar
    Charu
    2017 INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES FOR SMART NATION (IC3TSN), 2017, : 209 - 214
  • [44] An Architecture for Data Security in Cloud Computing
    Sugumaran, M.
    BalaMurugan, B.
    Kamalraj, D.
    2014 WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT 2014), 2014, : 252 - +
  • [45] A Framework for Data Storage Security in Cloud
    Tyagi, Manoj
    Manoria, Manish
    Mishra, Bharat
    ADVANCES IN DATA AND INFORMATION SCIENCES, VOL 1, 2018, 38 : 263 - 272
  • [46] Data Security: the Challenges of Cloud Computing
    Hu Shuijing
    2014 SIXTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2014, : 203 - 206
  • [47] Data Security Model for Cloud Computing
    Dai Yuefa
    Wu Bo
    Gu Yaqiang
    Zhang Quan
    Tang Chaojing
    PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 141 - 144
  • [48] Alteration Agent for Cloud Data Security
    Rhazlane, Sara
    Harbi, Nouria
    Kabachi, Nadia
    Badir, Hassan
    9TH INTERNATIONAL CONFERENCE ON MANAGEMENT OF EMERGENT DIGITAL ECOSYSTEMS (MEDES 2017), 2017, : 108 - 112
  • [49] A Comparative Analysis on Cloud Data Security
    Varghese, Saira
    Vigila, S. Maria Celestin
    2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), 2015, : 495 - 498
  • [50] Protection Methods for Cloud Data Security
    Shen J.
    Zhou T.
    Cao Z.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (10): : 2079 - 2098