Quantifiable Data Security Model for Cloud Computing Platform
Keywords:
Cloud-Computing, Security, IDS, IPS, SVM.Abstract
Whatever one public cloud, private cloud or a mixed cloud, the users lack of effective security quantifiable evaluation methods to grasp the security situation of its own information infrastructure on the whole. This paper provides a quantifiable security evaluation system for different clouds that can be accessed by consistent API. The evaluation system includes security scanning engine, security recovery engine, security quantifiable evaluation model, visual display module and etc. The security evaluation model composes of a set of evaluation elements corresponding different fields, such as computing, storage, network, maintenance, application security, and etc. In order to effectively manage the networks for administrators within limited time and energy, we are developing a hierarchical framework which detects the malicious attacks and prevent our data from that attack. Thus, in our application we are using two algorithms, firstly Intrusion Detection System (IDS) which is used to detect the attack and provide the information of the hacker to the administrator and the second algorithm used is named as Intrusion Prevention System (IPS) to prevent our data from the hacker. We are also going to retrieve the data which are changed by the hacker using support vector machine (SVM).
References
- Mohan Sundaram, R., A. Jayanthiladevi, and G. Keerthana. "Software Defined Cloud Infrastructure." Handbook of Research on Cloud and Fog Computing Infrastructures for Data Science. IGI Global, 2018. 108-123.
- Rittinghouse, John W., and James F. Ransome. Cloud computing: implementation, management, and security. CRC press, 2016.
- Ahmed, Monjur, and Mohammad Ashraf Hossain. "Cloud computing and security issues in the cloud." International Journal of Network Security & Its Applications 6.1 (2014): 25.
- Carlin, Sean, and Kevin Curran. "Cloud computing security." (2011)
- Gouda M, Liu X, “Firewall design: consistency, completeness, and compactness,” In Proceedings of the 24th IEEE International Conference on Distributed Computing System, 2004.
- Valeur F, Vigna G, Kruegel C, et al, “A Comprehensive approach to intrusion detection alarmcorrelation,” IEEE Transactions on dependable and secure computing,vol. 1, pp. 146-169, 2004.
- Kumar S, Spafford E H, “A Software Architecture to support Misuse Intrusion Detection,” Computers & Security,vol. 14, 1995.
- Garcia-Teodoro P, Diaz-Verdejo J, Maciá-Fernández G, et al, “Anomalybased network intrusion detection: Techniques, systems and challenges,” computers & security, vol. 28, pp. 18-28, 2009.
- Lee, Texas, Deng Xiaohui. Network virus against the status quo and Countermeasure technology. Network Security Technology Operation and applications, 2001,8 (2) :96-100
- Wu occasion, Huang Chuan-he, WANG Li-Na and so on. Based on data mining intrusion detection system. Computer and Applications, 2003,10 (4) :48-54
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.