A Theoretical Model to Provide Security for Remote Location Aware Cloud Data Centre

Authors(3) :-Gumpina Babu Rao, Prof. Nistala V. E. S. Murthy, Dr. G. Lavanya Devi

The growth in the adaptation of the cloud services for various purposes as education, research, social networking, medical research and financial managements is extending the use of cloud based services and client applications to access those services. The client applications can be deployed in various types of devices and this encourages the business scalability for the industry. Hence, the service providers enforce to the policy of allowing access from various devices and locations. These locations or devices are sometimes trusted and most of the situations are untrustworthy. The cloud based data centres face a major challenge in granting the access for these requests from the client applications. In order to satisfy the business demands, the cloud based data centre providers are forced to allow all access from those applications. Thus, making the data centre virtual infrastructure vulnerable for attacks. The data centres configure various firewall rules to prevent this condition. Nevertheless, these firewalls are static and cannot replace the need for dynamically changing business, application and customer policies with the variable location based access. Hence, the demands from the current researches are to build a dynamic firewall framework to satisfy these needs. This work demonstrates a novel theoretical framework for remote mobile clouds. Another major outcome of this work is to analyse and justify the research requirements for mobile clouds.

Authors and Affiliations

Gumpina Babu Rao
Assistant Professor, Department of computer science, GITAM (DEEMED TO BE UNIVERSITY), Visakhapatnam, Andhra Pradesh, India
Prof. Nistala V. E. S. Murthy
Professor & Chairman, BOS A.U. College of Science and Techology, Department of Mathematics., Chairman-BOS-Math., Andhra University, Andhra Pradesh, India
Dr. G. Lavanya Devi
Assistant Professor Department of Computer Science and Systems Engineering Andhra University, Andhra Pradesh, India ABSTRACT

Include at least 5 keywords or phrases

  1. S. Jajodia et al.,"Flexible Support for Multiple Access Control Policies," ACM Trans. Database Systems (TODS),vol. 26,no. 2,2001,pp. 214-260.
  2. I. Cervesato et al.,"Relating Strands and Multiset Rewriting for Security Protocol Analysis," Proc. 13th Computer Security Foundations Workshop (PCSFW 00),2000,pp. 35-51. F.J.
  3. Fabrega,J.C. Herzog,and J. Guttman,"Strand Spaces: Why Is a Security Protocol Correct?" Proc. IEEE Symp. Security and Privacy,1998,pp. 160-171.
  4. J. Loeckx and K. Sieber,The Foundations of Program Veri cation,John Wiley & Sons,1987.
  5. V. Kumar,Mobile Database Systems,John Wiley & Sons,2006.
  6. H. Seki,"Unfold/Fold Transformation of Stratified Programs," Theoretical Computer Science,vol. 86,no. 1,1991,pp. 107-139.
  7. Cisco ISO Lock and Key Security,white paper,Cisco Systems,1996.
  8. Y. Bartal et al.,"Firmato: A Novel Firewall Management Toolkit," Proc. IEEE Symp. Security and Privacy,1999,pp. 17-31.
  9. A. Mayer,A. Wool,and E. Ziskind,"Fang: A Firewall Analysis Engine," Proc. IEEE Symp. Security and Privacy,2000,pp. 177-187.
  10. S. Ioannidis et al.,"Implementing a Distributed Firewall," Proc. ACM Conf. Computer and Comm. Security,2000,pp. 190-199.
  11. E. Goren and O. Duskin,"Mobile Firewall," internal report,Check Point Software Technologies,Hebrew Univ.
  12. M. Gondree and Z.N.J. Peterson. "Geolocation of Data in the Cloud," Proc. 3rd ACM Conf. Data and Application Security and Privacy,2013.

Publication Details

Published in : Volume 3 | Issue 2 | January-February 2018
Date of Publication : 2018-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 232-236
Manuscript Number : CSEIT183325
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Gumpina Babu Rao, Prof. Nistala V. E. S. Murthy, Dr. G. Lavanya Devi, "A Theoretical Model to Provide Security for Remote Location Aware Cloud Data Centre ", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 2, pp.232-236, January-February.2018
URL : http://ijsrcseit.com/CSEIT183325

Follow Us

Contact Us