Providing Data Security with the Cloud Computing Implementation Structure

Authors

  • Kodalamadugu Karunakar  Department of MCA, Mother Theresa Institute of Computer Applications, Palamaner, India
  • S. A. Md Noorulla Baig  Department of MCA, Mother Theresa Institute of Computer Applications, Palamaner, India

Keywords:

Cloud computing adoption framework (CCAF), security framework, data security in the data center, multi-layered security protection.

Abstract

Proposing ongoing information security for peta bytes of information is imperative for distributed computing. A current review on cloud security expresses that the security of clients' information has the most noteworthy need and additionally concern. We trust this must have the capacity to accomplish with an approach that is efficient, adoptable and all around organized. In this manner, this paper has built up a system known as Cloud Computing Adoption Framework (CCAF) which has been modified for securing cloud information. This paper clarifies the outline, method of reasoning and segments in the CCAF to ensure information security. CCAF is shown by the framework configuration in light of the prerequisites also, the execution exhibited by the CCAF multi-layered security. Since our Data Center has 10 petabytes of information, there is an enormous errand to give ongoing insurance and isolate. We utilize Business Process Modeling Notation (BPMN) to reproduce how information is being used. The utilization of BPMN reproduction enables us to assess the picked security exhibitions before genuine execution. Results demonstrate that an opportunity to take control of security break can take in the vicinity of 50 and 125 hours. This implies extra security is required to guarantee all information is very much ensured in the pivotal 125 hours. This paper has likewise exhibited that CCAF multi-layered security can ensure information progressively and it has three layers of security they are firewall and access control; and character administration and interruption avoidance and concurrent encryption. To approve CCAF, this paper has embraced two arrangements of moral hacking tests required with infiltration testing with 10,000 trojans and infections. The CCAF multi-layered security can piece 9,919 infections and trojans which can be demolished in seconds and the staying ones can be isolated or separated.

References

  1. 1S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi, "Cloud computing-The business perspective," Decision Support Syst., vol. 51, no. 1, pp. 176–189, 2011.
  2. 2M. A. Vouk, "Cloud computing-issues, research and implementations," J. Comput. Inf. Technol.-CIT, vol. 4, pp. 235–246, 2008.
  3. 3A. K. Jha, C. M. DesRoches, E. G. Campbell, K. Donelan, S. R. Rao, T. G. Ferris, and D. Blumenthal, "Use of electronic health records in US hospitals," New England J. Med., vol. 360, no. 16, pp. 1628– 1638, 2009.
  4. 4H. T. Peng, W. W. Hsu, C. H. Chen, F. Lai, and J. M. Ho, "Financial cloud: open cloud framework of derivative pricing," in Proc. Int. Conf. Social Comput., Sep. 2013, pp. 782–789.
  5. 5M. Mircea and A. I. Andreescu, "Using cloud computing in higher education: A strategy to improve agility in the current financial crisis," Commun. IBIMA, vol. 2011, pp. 1–15, 2011.

Downloads

Published

2018-03-31

Issue

Section

Research Articles

How to Cite

[1]
Kodalamadugu Karunakar, S. A. Md Noorulla Baig, " Providing Data Security with the Cloud Computing Implementation Structure, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 2, pp.429-433, March-April-2018.