A Cloud Computing Security Framework Based on Cloud Security Trusted Authority

被引:1
|
作者
Dawoud, Mohammed M. [1 ]
Ebrahim, Gamal A. [1 ]
Youssef, Sameh A. [1 ]
机构
[1] Ain Shams Univ, Fac Engn, Comp & Syst Engn Dept, Cairo, Egypt
来源
INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016) | 2016年
关键词
Cloud computing; cloud security; cloud service provider; data center; trusted cloud computing;
D O I
10.1145/2908446.2908459
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is a promising technology that provides dynamic resource allocation, power saving, and low running cost. On the other hand, security risks of cloud computing represent a major concern that slows down its market growth. There are many frameworks for handling security risks of cloud computing, most of them trust the cloud service provider and do not focus on the new types of security risks that might face the cloud. Hence, they cannot detect attacks that might come from cloud service provider's side or due to vulnerabilities or attacks at the cloud service provider system. Therefore, a new security framework for cloud computing is introduced in this paper that tries to tackle these problems. Additionally, it is assumed that the introduced framework does not trust the cloud service provider. The introduced framework keeps the sensitive data encrypted at a cloud trusted authority and, hence, the sensitive data are kept away from attacks occurred at the cloud service provider.
引用
收藏
页码:133 / 138
页数:6
相关论文
共 50 条
  • [31] Cloud Computing Security
    Carlin, Sean
    Curran, Kevin
    INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2011, 3 (01) : 14 - 19
  • [32] Security in Cloud Computing
    Rishitha
    Reshmi, T. R.
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING (ICRTAC-CPS 2018), 2018, : 14 - 20
  • [33] Security in cloud computing
    Gritzalis, Stefanos
    Mitchell, Chris
    Thuraisingham, Bhavani
    Zhou, Jianying
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (02) : 95 - 96
  • [34] Security in Cloud Computing
    Sharma, Vani Dayal
    Agarwai, Somya
    Moin, Syeda Shira
    Qadeer, Mohammed Abdul
    2017 7TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2017, : 234 - 239
  • [35] Cloud computing security based on OWASP
    Alobaidi, AbdulAzeez R.
    Nuimi, Zinah N.
    5TH INTERNATIONAL CONFERENCE ON COMPUTING AND INFORMATICS (ICCI 2022), 2022, : 22 - 28
  • [36] Identifying Cloud Security Threats to Strengthen Cloud Computing Adoption Framework
    Khan, Nabeel
    Al-Yasiri, Adil
    11TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2016) / THE 13TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2016) / AFFILIATED WORKSHOPS, 2016, 94 : 485 - 490
  • [37] Cloud Security Threats and Techniques to Strengthen Cloud Computing Adoption Framework
    Khan, Nabeel
    Al-Yasiri, Adil
    INTERNATIONAL JOURNAL OF INFORMATION TECHNOLOGY AND WEB ENGINEERING, 2016, 11 (03) : 50 - 64
  • [38] Study on Security Supervising and Managing Methods of the Trusted Cloud Computing Based on Petri Net
    Liu, Lu
    Fang, Xian-wen
    Liu, Xiang-wei
    Ji, Jing
    Advances in Intelligent Systems and Computing, 2013, 212 : 579 - 585
  • [39] System security model based on trusted access control under cloud computing environment
    Wang F.
    Wang, Fengqi (fengqiwang@21cn.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (10): : 236 - 242
  • [40] Cloud computing adoption framework: A security framework for business clouds
    Chang, Victor
    Kuo, Yen -Hung
    Ramachandran, Muthu
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 57 : 24 - 41