Towards Achieving Knowledge Security with the Cloud Computing Implementation Framework

Authors(2) :-Singampalli Sankeerthi, Chavali Rekha

Offering continuous information security for petabytes of information is essential for Cloud Computing. A current study on cloud security expresses that the security of clients' information has the most astounding need and in addition to accomplish with an approach that is efficient, adoptable and very much organized. In this way, this paper has built up a structure known as Cloud Computing Adoption Framework (CCAF), which has been modified for securing cloud information. This paper clarifies the diagram, basis and segments in the CCAF to ensure information security. CCAF is outlined by the framework configuration in light of the necessities and the execution showed by the CCAF multi-layered security. Since our Data Center has 10 petabytes of information, there is a gigantic undertaking to give ongoing insurance and isolate. We utilize Business Process Modeling Notation (BPMN) to reenact how information is being used. The utilization of BPMN recreation enables us to assess the picked security exhibitions before genuine usage. Results demonstrate that an opportunity to take control of security break can take near 50 and 125 hours. This implies extra security is required to guarantee all information is very much ensured in the significant 125 hours. This paper has additionally exhibited that CCAF multi-layered security can ensure information progressively and it has three layers of security: 1) firewall and get to control 2) personality administration and interruption avoidance and 3) merged encryption. To approve CCAF, this paper has embraced two arrangements of moral hacking tests required with infiltration testing with 10,000 Trojans and infections. The CCAF multi-layered security can square 9,919 infections and Trojans, which can be decimated in seconds and the staying ones, can be isolated or separated. The analyses appear despite the fact that the rate of blocking can diminish for nonstop infusion of infections and Trojans, 97.43% of them can be isolated. Our CCAF multi-layered security has a normal of 20% preferable execution over the single-layered approach, which could just square 7,438 infections and Trojans. CCAF can

Authors and Affiliations

Singampalli Sankeerthi
Department of MCA , St. Mary's Group of Institutions, Guntur, Andhra Pradesh, India
Chavali Rekha
Department of MCA , St. Mary's Group of Institutions, Guntur, Andhra Pradesh, India

Cloud Computing Adoption Framework (CCAF), security framework, Business Process Modelling Notation (BPMN), Data security in the Data Centre, multi-layered security protection

  1. S., Marston, Z., Li, S., Bandyopadhyay, J., Zhang, A., Ghalsasi, "Cloud computing – The business perspective". Decision Sup-port Systems, Elsevier, 51(1): pp 176-189, 2011.
  2. M. A., Vouk, "Cloud Computing – Issues, Research and Imple-mentations". Journal of Com-puting and Information Technolo-gy - CIT 16, page 235–246, Volume 4, 2008.
  3. A. K., Jha, C. M., DesRoches, E. G., Campbell, K., Donelan, S. R., Rao, T. G., Ferris, & D., Blumenthal. “Use of electronic health records in US hospitals. New England Journal of Medicine”, 360(16), 1628-1638, 2009.
  4. H. T., Peng, W. W., Hsu, C. H., Chen, F., Lai, J. M. Ho, "Finan-cialCloud: Open Cloud Framework of Derivative Pricing. In So-cial Computing (SocialCom), 2013 International Conference on (pp. 782-789). IEEE, 2013, September.
  5. M., Mircea, A. I., Andreescu, "Using cloud computing in higher education: A strategy to improve agility in the current financial crisis". Communications of the IBIMA, 2011, 1-15.
  6. L., Liu, E., Yu, & J., Mylopoulos, “Security and privacy re-quirements analysis within a social setting“. In Requirements Engineering Conference, 2003. Proceedings, 11th IEEE Interna-tional (pp. 151-161), IEEE, 2003, September.
  7. T., Mather, S., Kumaraswamy, S. Latif, (2009), “Cloud security and privacy: an enterprise perspective on risks and compli-ance”. ISBN: 978-0-596-80276-9, O'Reilly Media, Inc.
  8. M., Pop, S. L., Salzberg, "Bioinformatics challenges of new se-quencing technology". Trends in Genetics, 24(3), 142-149, 2008.
  9. A., Greenberg, A., J., Hamilton, D. A., Maltz, P., Patel, "The cost of a cloud: research problems in data center networks". ACM SIGCOMM computer communication review, 39(1), 68-73, 2008.
  10. Q., Zhang, L., Cheng, R., Boutaba, "Cloud computing: state-of-the-art and research challenges". Journal of internet services and applications, 1(1), 7-18, 2010.
  11. J. J. Cebula, L. R. Young, “A Taxonomy of Operational Cyber Security”, Technical Note: CMU/SEI-2010-TN-028, Software Engineering Institute, USA, December 2010.
  12. S., Yu, C., Wang, K., Ren, W., Lou, "Achieving secure, scalable, and fine-grained data access control in cloud computing". In INFOCOM, 2010 Proceedings IEEE, 1-9, March 2010.
  13. G., Wang, Q., Liu, J., Wu, "Hierarchical attribute-based encryp-tion for fine-grained access control in cloud storage services". In Proceedings of the 17th ACM conference on Computer and communications security (pp. 735-737), ACM, 2010, October.
  14. X., Zhang, M., Nakae, M. J., Covington, R., Sandhu, "Toward a usage-based security framework for collaborative computing systems", ACM Transactions on Information and System Secu-rity (TISSEC), 11(1), 3, 2008.
  15. G. McGraw, “ Software security: building security in, Addison Wesley, USA, 2006
  16. P., Brooks, J., Chittenden, "Metrics for Service Management: Designing for ITIL". Van Haren Publishing, ISBN: 978 90 8753 6480, 2012.
  17. V., Chang, R. J. Walters, G. Wills, "Cloud Storage and Bioinfor-matics in a private cloud deployment: Lessons for Data Inten-sive research". Springer: CLOSER 2012, CCIS 367, pp. 245–264, 2013.
  18. V.,   Chang, "Business Intelligence as Service in the Cloud". Future Generation Computer Systems, DOI: http://dx.doi.org/10.1016/j.future.2013.12.028, 2014.
  19. I. A., Tondel, et al., "Security requirements for rest of us: a sur-vey". IEEE Software, Special Issue on Security and Agile re-quirement engineering methods, Jan/Feb, 2008.
  20. N.R., Mead, et. al., "Security Quality Requirements Engineering (SQUARE) Methodology". Technical Report, CMU/SEI-2005-TR-009, 2005.
  21. Oracle, "Data Security Challenges". Oracle9i security overview release number 2(9.2), accessed on 4th November, http://docs.oracle.com/cd/B10501_01/network.920/a96582/o verview.htm , 2012.
  22. V. Kumar, Swetha M.S, Muneshwara M. S., Prof Prakash S “Cloud computing: towards case study of data security mecha-nism”, International Journal of Advanced Technology & Engi-neering Research (IJATER), Volume 2, Issue 4, July 2012. F., Wen, L., Xiang, “The Study on Data Security in Cloud Computing based on Virtualization”, IEEE 2011 International

Publication Details

Published in : Volume 2 | Issue 4 | July-August 2017
Date of Publication : 2017-08-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 202-212
Manuscript Number : CSEIT172470
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Singampalli Sankeerthi, Chavali Rekha, "Towards Achieving Knowledge Security with the Cloud Computing Implementation Framework", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.202-212, July-August-2017. |          | BibTeX | RIS | CSV

Article Preview