CDSM : Wide-Ranging Cloud Data Security Management System

Authors

  • M.Thanmayee   Assistant Professor, Department of Computer Science and Engineering, TKR College of Engineering and Technology, Hyderabad, Telangana, India
  • Vasavi Sravanthi Balusa   Assistant Professor, Department of Computer Science and Engineering, TKR College of Engineering and Technology, Hyderabad, Telangana, India

Keywords:

Cloud Computing, CDSM, integrity and availability.

Abstract

Cloud computing is a service model in which the computing resources such as software, hardware and data are delivered as a service through a web browser or lightweight desktop machine over the internet. Cloud computing has increased its acceptance in recent years. Despite of having a number of benefits, users are still worried about security of data in cloud due to losing the control of their own data when outsourced in cloud environment. The security is an important feature in all sorts of Information systems, the cloud computing is no exception. The confidentiality, integrity and availability are the key issues affecting security of data in cloud along with dependability of users and cloud service providers. There are increasing security and privacy concerns from the point of view of both the enterprises and the individuals of their outsourced data in cloud. Several security management standards and measures have been intended to security the cloud but still cloud security is at a high risk due to the pioneering hacking techniques. In this paper we propose wide-ranging data security framework for cloud computing for the designing of security framework called CDSM system. The cloud data security management framework is proposed for providing Information Security as a Service (ISaaS). The framework ensure the security of data during rest in cloud, and when data in flight between different entity of cloud system. The CDSM framework provides a flexible and modified data storage, computation, backup and disaster data management service which can be expanded and altered according to the needs of the organizations and users.

References

  1. W. Voorsluys, J. Broberg, and R. Buyya, “Introduction to Cloud Computing,” in Cloud Computing, Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011, pp. 1-41.
  2. T. S. Mohan, “Migrating into a Cloud,” in Cloud Computing, Hoboken, NJ, USA: John Wiley & Sons, Inc., 2011, pp. 43-56.
  3. M. A. Vouk, “Cloud Computing Issues, Research and Implementations,” Journal of Computing and Information Technology, 2008, vol. 16, no. 4, pp. 235-246.
  4. S. Subashini and K. Veeraruna, “A survey on security issues in service delivery models of cloud computing,” Journal of Network and Computer Applications, 2011, vol. 34, no. 1, pp. 1-11.
  5. J. Wang and S. Mu, “Security issues and countermeasures in cloud computing,” in Proceedings of IEEE International Conference on Grey Systems and Intelligent Services, 2011, pp. 843-846.
  6. K. Gai and S. Li, “Towards Cloud Computing: A Literature Review on Cloud Computing and Its Development Trends,” in Fourth International Conference on Multimedia Information Networking and Security, 2012, pp. 142-146.
  7. R. K. L. Ko, M. Kirchberg, and B. S. Lee, “From system-centric to data-centric logging - Accountability, trust and security in cloud computing,” in Defense Science Research Conference and Expo (DSR), 2011, pp. 1-4.
  8. H. Takabi, J. B. D. Joshi, and G.-J. Ahn, “Security and Privacy Challenges in Cloud Computing Environments,” IEEE Security and Privacy, 2010, vol. 8, no. 6, pp. 24-31.
  9. F. Zhao, C. Li, and C. F. Liu, “A cloud computing security solution based on fully homomorphic encryption,” in 16th International Conference on Advanced Communication Technology, 2014, pp. 485-488.
  10. R. Buyya, R. Ranjan, and R. N. Calheiros, “InterCloud: Utility-oriented federation of cloud computing environments for scaling of application services,” in Lecture Notes in Computer Science, 2010, vol. 6081, no. 1, pp. 13-31.
  11. L. Wang, J. Tao, M. Kunze, A. C. Castellanos, D. Kramer, and W. Karl, “Scientific cloud computing: Early definition and experience,” in Proceedings - 10th IEEE International Conference on High Performance Computing and Communications, 2008, pp. 825-830.
  12. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the Clouds: A Berkeley View of Cloud Computing,” EECS, Department, University of California, Berkeley, 2009, pp. 1-25.
  13. B. Sotomayor, R. S. Montero, I. M. Llorente, and I. Foster, “Virtual infrastructure management in private and hybrid clouds,” IEEE Internet Computing, 2009, vol. 13, no. 5, pp. 14-22.
  14. S. Mustafa, B. Nazir, A. Hayat, A. Rehman Khan, and S. A. Madani, “Resource management in cloud computing: Taxonomy, prospects, and challenges,” Computers and Electrical Engineering, 2015, vol. 47, no. 1, pp. 5-13.
  15. W. Wongthai, F. Rocha, and A. Van Moorsel, “Logging solutions to mitigate risks associated with threats in infrastructure as a service cloud,” in Proceedings - International Conference on Cloud Computing and Big Data, 2013, pp. 163-170.
  16. A. Abuhussein, H. Bedi, and S. Shiva, “Towards a Stakeholder-Oriented Taxonomical Approach for Secure Cloud Computing,” in IEEE Sixth International Conference on Cloud Computing, 2013, pp. 958-959.
  17. Q. Jiang, J. Ma, and F. Wei, “On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services,” IEEE Systems Journal, 2016, vol. 99, no. 1, pp. 1-4.

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
M.Thanmayee, Vasavi Sravanthi Balusa, " CDSM : Wide-Ranging Cloud Data Security Management System, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.1372-1378, November-December-2017.