A Secure Data Transmission Mechanism for Cloud Outsourced Data

被引:8
|
作者
Alhaj, Abdullah [1 ]
Aljawarneh, Shadi [2 ]
Masadeh, Shadi [3 ]
Abu-Taieh, Evon [1 ]
机构
[1] Univ Jordan Aqaba, Fac Informat Technol, Aqaba, Jordan
[2] Isra Univ, Fac Informat Technol, Amman, Jordan
[3] Al Hussein Bin Talal Univ, Dept Comp Sci, Maan, Jordan
关键词
Cloud Computing; Data Transmission; Malicious Packets Detection System (MPDS); Quality of Service (QoS); Secure Data Transmission Mechanism (SDTM);
D O I
10.4018/ijcac.2013010104
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. In Cloud, the data and associated software are not under their control. In addition, with the growing demands for Cloud networks communication, it becomes increasingly important to secure the data flow path. The existing research related to security mechanisms only focuses on securing the flow of information in the communication networks. There is a lack of work on improving the performance of networks to meet quality of service (QoS) constrains for various services. The security mechanisms work by encryption and decryption of the information, but do not consider the optimised use of the network resources. In this paper the authors propose a Secure Data Transmission Mechanism (SDTM) with Preemption Algorithm that combines between security and quality of service. Their developed SDTM enhanced with Malicious Packets Detection System (MPDS) which is a set of technologies and solutions. It enforces security policy and bandwidth compliance on all devices seeking to access Cloud network computing resources, in order to limit damage from emerging security threats and to allow network access only to compliant and trusted endpoint devices. This SDTM also provides support for quality of service. High-level simulations and the related results are provided to show the properties of the SDTM.
引用
收藏
页码:34 / 43
页数:10
相关论文
共 50 条
  • [31] Secure and Light Weight Fine-grained Access Mechanism for Outsourced Data
    Jahan, Mosarrat
    Roy, Partha Sarathi
    Sakurai, Kouichi
    Seneviratne, Aruna
    Jha, Sanjay
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 201 - 209
  • [32] Efficient and Secure Storage for Outsourced Data: A Survey
    Wang, Jianfeng
    Chen, Xiaofeng
    DATA SCIENCE AND ENGINEERING, 2016, 1 (03) : 178 - 188
  • [33] Privacy Preserving and Deterministic Data Retrieval In Outsourced Cloud Data
    Asaithambi, N.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (09): : 133 - 136
  • [34] FSS-SDD: fuzzy-based semantic search for secure data discovery from outsourced cloud data
    Ananthi, M.
    Sabitha, R.
    Karthik, S.
    Shanthini, J.
    SOFT COMPUTING, 2020, 24 (16) : 12633 - 12642
  • [35] A Secure Method for Data Storage and Transmission in Sustainable Cloud Computing
    Sana, Muhammad Usman
    Li, Zhanli
    Kiren, Tayybah
    Bin Liaqat, Hannan
    Naseem, Shahid
    Saeed, Atif
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 75 (02): : 2741 - 2757
  • [36] Secure data transmission with cloud computing in heterogeneous wireless networks
    Chu, Chung-Hua
    Ouyang, Yen-Chieh
    Jang, Chang-Bu
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1325 - 1336
  • [37] Secure Transmission with Matrix Encryption and Data Compression Mechanism
    Fazulullah, Abul Hasan
    Vansia, Purva
    Patel, Kartavi
    Patel, Dipesh
    Abuzneid, Abdel-Shakour A.
    2017 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2017,
  • [38] An effective, secure and efficient tagging method for integrity protection of outsourced data in a public cloud storage
    ALmarwani, Reem
    Zhang, Ning
    Garside, James
    PLOS ONE, 2020, 15 (11):
  • [39] Data Security in Cloud computing and Outsourced Databases
    Bhukya, ShankarNayak
    Pabboju, Suresh
    Sharma, K. Venkatesh
    2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 2458 - 2462
  • [40] Light weight and fine-grained access mechanism for secure access to outsourced data*
    Jahan, Mosarrat
    Seneviratne, Suranga
    Roy, Partha Sarathi
    Sakurai, Kouichi
    Seneviratne, Aruna
    Jha, Sanjay
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (23):