A Secure Data Transmission Mechanism for Cloud Outsourced Data

被引:8
|
作者
Alhaj, Abdullah [1 ]
Aljawarneh, Shadi [2 ]
Masadeh, Shadi [3 ]
Abu-Taieh, Evon [1 ]
机构
[1] Univ Jordan Aqaba, Fac Informat Technol, Aqaba, Jordan
[2] Isra Univ, Fac Informat Technol, Amman, Jordan
[3] Al Hussein Bin Talal Univ, Dept Comp Sci, Maan, Jordan
关键词
Cloud Computing; Data Transmission; Malicious Packets Detection System (MPDS); Quality of Service (QoS); Secure Data Transmission Mechanism (SDTM);
D O I
10.4018/ijcac.2013010104
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. In Cloud, the data and associated software are not under their control. In addition, with the growing demands for Cloud networks communication, it becomes increasingly important to secure the data flow path. The existing research related to security mechanisms only focuses on securing the flow of information in the communication networks. There is a lack of work on improving the performance of networks to meet quality of service (QoS) constrains for various services. The security mechanisms work by encryption and decryption of the information, but do not consider the optimised use of the network resources. In this paper the authors propose a Secure Data Transmission Mechanism (SDTM) with Preemption Algorithm that combines between security and quality of service. Their developed SDTM enhanced with Malicious Packets Detection System (MPDS) which is a set of technologies and solutions. It enforces security policy and bandwidth compliance on all devices seeking to access Cloud network computing resources, in order to limit damage from emerging security threats and to allow network access only to compliant and trusted endpoint devices. This SDTM also provides support for quality of service. High-level simulations and the related results are provided to show the properties of the SDTM.
引用
收藏
页码:34 / 43
页数:10
相关论文
共 50 条
  • [41] SEVCOD: secure and efficient verifiable computation on outsourced data
    Chakraborty, Partha Sarathi
    Gavhane, Omkar Santosh
    Tripathy, Somanath
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (04): : 4725 - 4739
  • [42] A Cloud Secure Storage Mechanism Based on Data Dispersion and Encryption
    Song, Heqing
    Li, Jifei
    Li, Haoteng
    IEEE ACCESS, 2021, 9 : 63745 - 63751
  • [43] Secure Keyword Search and Data Sharing Mechanism for Cloud Computing
    Ge, Chunpeng
    Susilo, Willy
    Liu, Zhe
    Xia, Jinyue
    Szalachowski, Pawel
    Fang Liming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2787 - 2800
  • [44] One enhanced secure access scheme for outsourced data
    Fan, Yongkai
    Liu, Jiaxu
    Li, Kuan-Ching
    Liang, Wei
    Lei, Xia
    Tan, Gan
    Tang, Mingdong
    INFORMATION SCIENCES, 2021, 561 : 230 - 242
  • [45] Secure Map Reduce Data Transmission Mechanism in Cloud Computing Using Threshold Secret Sharing Scheme
    Lin, Hua Yi
    Yang, Che-Yu
    Hsieh, Meng-Yen
    SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING: THEORY AND PRACTICE, VOL 2, 2012, 115 : 761 - +
  • [46] Secure multidimensional range queries over outsourced data
    Hore, Bijit
    Mehrotra, Sharad
    Canim, Mustafa
    Kantarcioglu, Murat
    VLDB JOURNAL, 2012, 21 (03): : 333 - 358
  • [47] Secure Similar Sequence Query on Outsourced Genomic Data
    Cheng, Ke
    Hou, Yantian
    Wang, Liangmin
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 237 - 251
  • [48] Practical and Privacy-assured Data Indexes for Outsourced Cloud Data
    Zhang, Hongli
    Zhou, Zhigang
    Du, Xiaojiang
    Li, Panpan
    Yu, Xiangzhan
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 671 - 676
  • [49] Secure multidimensional range queries over outsourced data
    Bijit Hore
    Sharad Mehrotra
    Mustafa Canim
    Murat Kantarcioglu
    The VLDB Journal, 2012, 21 : 333 - 358
  • [50] Data integrity verification of the outsourced big data in the cloud environment: A survey
    Zhou, Lei
    Fu, Anmin
    Yu, Shui
    Su, Mang
    Kuang, Boyu
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 122 : 1 - 15