A Theoretical Model to Provide Security for Remote Location Aware Cloud Data Centre

Authors

  • Gumpina Babu Rao  Assistant Professor, Department of computer science, GITAM (DEEMED TO BE UNIVERSITY), Visakhapatnam, Andhra Pradesh, India
  • Prof. Nistala V. E. S. Murthy  Professor & Chairman, BOS A.U. College of Science and Techology, Department of Mathematics., Chairman-BOS-Math., Andhra University, Andhra Pradesh, India
  • Dr. G. Lavanya Devi  Assistant Professor Department of Computer Science and Systems Engineering Andhra University, Andhra Pradesh, India ABSTRACT

Keywords:

Include at least 5 keywords or phrases

Abstract

The growth in the adaptation of the cloud services for various purposes as education, research, social networking, medical research and financial managements is extending the use of cloud based services and client applications to access those services. The client applications can be deployed in various types of devices and this encourages the business scalability for the industry. Hence, the service providers enforce to the policy of allowing access from various devices and locations. These locations or devices are sometimes trusted and most of the situations are untrustworthy. The cloud based data centres face a major challenge in granting the access for these requests from the client applications. In order to satisfy the business demands, the cloud based data centre providers are forced to allow all access from those applications. Thus, making the data centre virtual infrastructure vulnerable for attacks. The data centres configure various firewall rules to prevent this condition. Nevertheless, these firewalls are static and cannot replace the need for dynamically changing business, application and customer policies with the variable location based access. Hence, the demands from the current researches are to build a dynamic firewall framework to satisfy these needs. This work demonstrates a novel theoretical framework for remote mobile clouds. Another major outcome of this work is to analyse and justify the research requirements for mobile clouds.

References

  1. S. Jajodia et al.,"Flexible Support for Multiple Access Control Policies," ACM Trans. Database Systems (TODS),vol. 26,no. 2,2001,pp. 214-260.
  2. I. Cervesato et al.,"Relating Strands and Multiset Rewriting for Security Protocol Analysis," Proc. 13th Computer Security Foundations Workshop (PCSFW 00),2000,pp. 35-51. F.J.
  3. Fabrega,J.C. Herzog,and J. Guttman,"Strand Spaces: Why Is a Security Protocol Correct?" Proc. IEEE Symp. Security and Privacy,1998,pp. 160-171.
  4. J. Loeckx and K. Sieber,The Foundations of Program Veri cation,John Wiley & Sons,1987.
  5. V. Kumar,Mobile Database Systems,John Wiley & Sons,2006.
  6. H. Seki,"Unfold/Fold Transformation of Stratified Programs," Theoretical Computer Science,vol. 86,no. 1,1991,pp. 107-139.
  7. Cisco ISO Lock and Key Security,white paper,Cisco Systems,1996.
  8. Y. Bartal et al.,"Firmato: A Novel Firewall Management Toolkit," Proc. IEEE Symp. Security and Privacy,1999,pp. 17-31.
  9. A. Mayer,A. Wool,and E. Ziskind,"Fang: A Firewall Analysis Engine," Proc. IEEE Symp. Security and Privacy,2000,pp. 177-187.
  10. S. Ioannidis et al.,"Implementing a Distributed Firewall," Proc. ACM Conf. Computer and Comm. Security,2000,pp. 190-199.
  11. E. Goren and O. Duskin,"Mobile Firewall," internal report,Check Point Software Technologies,Hebrew Univ.
  12. M. Gondree and Z.N.J. Peterson. "Geolocation of Data in the Cloud," Proc. 3rd ACM Conf. Data and Application Security and Privacy,2013.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Gumpina Babu Rao, Prof. Nistala V. E. S. Murthy, Dr. G. Lavanya Devi, " A Theoretical Model to Provide Security for Remote Location Aware Cloud Data Centre , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 2, pp.232-236, January-February-2018.