The Proposed Model for Security in the Cloud, Controlled by the End User

被引:0
作者
Hyseni, Dhurate [1 ]
Cico, Betim [1 ]
Shabani, Isak [2 ]
机构
[1] South East European Univ, CST Fac, Tetovo, Macedonia
[2] Univ Prishtina, Dept Comp Engn, Prishtina, Kosovo
来源
2015 4TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO) | 2015年
关键词
VMM-Virtual Machine Monitor; SaaS-Software as a Service; PaaS-Platform as a Service; IaaS-Infrastructure as a Service; SLA-Service Level Agreements; end user (IT administrator);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud environment offers a great possibility in computing, it is immensely helpful to all parties, enables quick access to data and space usage is based on the needs. In this context public data is exposed to other parties for different purposes but private data must be protected when used in different operations in order to have a secure environment. The aim of this work is to provide a logical view for a proposed model in cloud, where the main role in selecting the level of security falls to the end user. In the proposed model by end user we refer to IT administrator of a particular organization which is informed about all statistics our model offer. Therefore the end user is aware of the main parameters which are related to the cloud security. After selecting the level of security the entire communication continues on the same level, for each member of that organization
引用
收藏
页码:81 / 84
页数:4
相关论文
共 15 条
  • [1] [Anonymous], 2015, CLOUD CONTROL SECURI
  • [2] [Anonymous], 2009, Ibm point of view: Security and cloud computing
  • [3] Cloud Security White Paper, 2011, EVALUATE DATA SECURI
  • [4] Denz R., 2013, DENZ TAYLOR J CLOUD
  • [5] Kuyoro O., 2011, INT J COMPUTER NETWO
  • [6] Li H, 2009, P 1 INT C CLOUD COMP
  • [7] Mar K. K., 2012, INT J INFORM SECURIT
  • [8] Mather T., 2009, CLOUD SECURITY PRIVA
  • [9] Singh Chauhan N., 2013, COMMUNICATION
  • [10] Sivaranjani R., 2014, INT J INNOVATIVE RES