A Novel Approach to Cloud Computing: Infrastructure as a Service Security

被引:0
|
作者
Jain, Sarika [1 ]
Tyagi, Prachi [1 ]
Kalra, Siddharth [1 ]
机构
[1] Amity Univ Uttar Pradesh, AIIT, Noida, Uttar Pradesh, India
关键词
Public cloud; Private Cloud; Hybrid Cloud; Data Integrity; Data Privacy;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Organizations are using cloud in their business to survive and to gain cost efficiency. In this organization can utilize pay-per-use pattern of service and different methodologies. For ensuring the safety of data and information sensitive to the business, organizations must have the knowledge of type of cloud used. Cryptography can be seen as the solution for different organizations needs in the terms of security in data storage and accessing. This paper proposes a new method for Infrastructure as a service security and the solution which are already existing.
引用
收藏
页码:501 / 504
页数:4
相关论文
共 50 条
  • [31] Security Issues In Service Model Of Cloud Computing Environment
    Krishna, B. Hari
    Kiran, S.
    Murali, G.
    Reddy, R. Pradeep Kumar
    FOURTH INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTER SCIENCE & ENGINEERING (ICRTCSE 2016), 2016, 87 : 246 - 251
  • [32] Towards Security as a Service (SecaaS): on the modeling of Security Services for Cloud Computing
    Furfaro, Angelo
    Garro, Alfredo
    Tundis, Andrea
    2014 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2014,
  • [33] Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey
    Manvi, Sunilkurnar S.
    Shyam, Gopal Krishna
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 41 : 424 - 440
  • [34] A Service-Oriented Measurement Infrastructure for Cloud Computing Environments
    Hamilton, Gregg
    Pezaros, Dimitrios
    2012 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (HPCC-ICESS), 2012, : 947 - 952
  • [35] A Novel Cloud Computing Algorithm of Security and Privacy
    Chen, Chih-Yung
    Tu, Jih-Fu
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2013, 2013
  • [36] Monitoring based security approach for cloud computing
    Yadav A.
    Ritika
    Garg M.L.
    Ingenierie des Systemes d'Information, 2019, 24 (06): : 611 - 617
  • [37] A NOVEL BASED SECURITY ARCHITECTURE OF CLOUD COMPUTING
    Gupta, Subham Kumar
    Rawat, Seema
    Kumar, Praveen
    2014 3RD INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2014,
  • [38] Security event correlation approach for cloud computing
    Ficco, M. (massimo.ficco@unina2.it), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (07):
  • [39] Data Governance Cloud Security Checklist at Infrastructure as a Service (IaaS)
    Abu Saed, Kamariah
    Aziz, Norshakirah
    Abdulkadir, Said Jadid
    Aziz, Izzatdin A.
    Hassan, Noor Hafizah
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (10) : 297 - 306
  • [40] Cloud Infrastructure Security
    Velev, Dimiter
    Zlateva, Plamena
    OPEN RESEARCH PROBLEMS IN NETWORK SECURITY, 2011, 6555 : 140 - +