A Cloud Computing Security Framework Based on Cloud Security Trusted Authority

被引:1
|
作者
Dawoud, Mohammed M. [1 ]
Ebrahim, Gamal A. [1 ]
Youssef, Sameh A. [1 ]
机构
[1] Ain Shams Univ, Fac Engn, Comp & Syst Engn Dept, Cairo, Egypt
来源
INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016) | 2016年
关键词
Cloud computing; cloud security; cloud service provider; data center; trusted cloud computing;
D O I
10.1145/2908446.2908459
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is a promising technology that provides dynamic resource allocation, power saving, and low running cost. On the other hand, security risks of cloud computing represent a major concern that slows down its market growth. There are many frameworks for handling security risks of cloud computing, most of them trust the cloud service provider and do not focus on the new types of security risks that might face the cloud. Hence, they cannot detect attacks that might come from cloud service provider's side or due to vulnerabilities or attacks at the cloud service provider system. Therefore, a new security framework for cloud computing is introduced in this paper that tries to tackle these problems. Additionally, it is assumed that the introduced framework does not trust the cloud service provider. The introduced framework keeps the sensitive data encrypted at a cloud trusted authority and, hence, the sensitive data are kept away from attacks occurred at the cloud service provider.
引用
收藏
页码:133 / 138
页数:6
相关论文
共 50 条
  • [41] Toward a Trusted framework for Cloud Computing
    Toumi, Hicham
    Talea, Mohamed
    Sabiri, Khadija
    Eddaoui, Ahmed
    2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 361 - 366
  • [42] Cloud Computing Based Intelligent Video Surveillance Framework for Logistics Security
    Alruwaili, Omar
    Armghan, Ammar
    Salem Alshudukhi, Khulud
    Flah, Aymen
    Pergl, Ivo
    IEEE ACCESS, 2024, 12 : 150604 - 150622
  • [43] A novel Risk Identification Framework for Cloud Computing Security
    Masky, Mackita
    Young, Shin Soo
    Choe, Tae-Young
    2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2015, : 61 - 64
  • [44] A Framework to Orchestrate Security SLA Lifecycle in Cloud Computing
    Rojas, Marco A. T.
    Gonzalez, Nelson M.
    Sbampato, Fernando V.
    Redigolo, Fernando F.
    Carvalho, Tereza
    Ullah, Kazi W.
    Naslund, Mats
    Ahmed, Abu Shohel
    2016 11TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2016,
  • [45] A Framework to Ensure Data Storage Security in Cloud Computing
    Sarkar, Mrinal Kanti
    Kumar, Sanjay
    2016 IEEE 7TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS MOBILE COMMUNICATION CONFERENCE (UEMCON), 2016,
  • [46] Evaluation and Analysis on Security Framework Model of Cloud Computing
    Li, Zhao
    PROCEEDINGS OF THE 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER, MECHATRONICS, CONTROL AND ELECTRONIC ENGINEERING (ICCMCEE 2015), 2015, 37 : 572 - 578
  • [47] A Novel Data Security Framework in Distributed Cloud Computing
    Malgari, Vanaja
    Dugyala, Raman
    Kumar, Ashwani
    2019 FIFTH INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP 2019), 2019, : 373 - 378
  • [48] A New Security and Privacy Framework for RFID In Cloud Computing
    Kardas, Suleyman
    Celik, Serkan
    Bingol, Muhammed Ali
    Levi, Albert
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 171 - 176
  • [49] Security risk assessment framework for cloud computing environments
    Albakri, Sameer Hasan
    Shanmugam, Bharanidharan
    Samy, Ganthan Narayana
    Idris, Norbik Bashah
    Ahmed, Azuan
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 2114 - 2124
  • [50] Policy Based Management for Security in Cloud Computing
    Waller, Adrian
    Sandy, Ian
    Power, Eamonn
    Aivaloglou, Efthimia
    Skianis, Charalampos
    Munoz, Antonio
    Mana, Antonio
    SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 187 : 130 - +