IAAS Based Cloud Security and a Deep View Trust Model

International Journal of Computer Science and Engineering
© 2016 by SSRG - IJCSE Journal
Volume 3 Issue 4
Year of Publication : 2016
Authors : N.Sendhil Kumar, G. JyotheeswarChowdary

pdf
How to Cite?

N.Sendhil Kumar, G. JyotheeswarChowdary, "IAAS Based Cloud Security and a Deep View Trust Model," SSRG International Journal of Computer Science and Engineering , vol. 3,  no. 4, pp. 28-33, 2016. Crossref, https://doi.org/10.14445/23488387/IJCSE-V3I4P111

Abstract:

Cloud might be an idea of getting to the data from their own datacenters such the conceivable outcomes of listening in is decreased and capacity quality is diminished. In any case at the point when various mists have been actualized and the information is put away progressively then the evidence of the hub from one cloud to another is ordinary to accomplish and the security of the information progress is likewise hard to accomplish. The work actualized here gives security of the information stockpiling in mists utilizing new idea of verification utilizing mass stockpiling gadget. The verification gave utilizing mass stockpiling gadget is an effective procedure which gives more security to the information stockpiling in mists.

Keywords:

The verification gave utilizing mass stockpiling gadget is an effective procedure which gives more security to the information stockpiling in mists.

References:

[1] W. Jansen and T. Grance, ―Guidelines on security and privacy in public cloud computing, NIST Spec. Publ., pp. 800–144, 2011.
[2] P. Mell and T. Grance, ―The NIST Definition of Cloud Compu-ting. NIST, 2011.
[3] P. Jamshidi, A. Ahmad, and C. Pahl, ―Cloud Migration Research: A Systematic Review, IEEE Transactions on Cloud Compu-ting, vol. 1, no. 2, pp. 142–157, 2013.
[4] L. Vaquero, L. Rodero-Merino, and D. Morán, ―Locking the sky: a survey on IaaS cloud security, Computing, vol. 91, no. 1, pp. 93–118, Jan, 2011.
[5] T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, ―Hey, you, get off of my cloud: exploring information leakage in thirdparty compute clouds, in Proceedings of the 16th ACM conference on Computer and communications security, 2009, pp. 199–212.
[6] A. Sood and R. Enbody, ―Targeted Cyber Attacks-A Superset of Advanced Persistent Threats, IEEE Security and Privacy., Vol. 11, no. 1, Jan.-Feb., 2013.
[7] B. Krekel, ―Capability of the People’s Republic of China to conduct cyber warfare and computer network exploitation, U.S.- China Economic and Security REview Commission, Northrop Grumman Corp., DTIC Document, 2009.
[8] FedRAMP Security Controls, Federal Chief Information Officer’s Council, [Online]. Available:http://cloud.cio.gov/document/fedramp-securitycontrols. [Ac-cessed: 29-Oct-2014].
[9] S. Zevin, Standards for security categorization of federal information and information systems. DIANE Publishing, 2009. [10] M. Walla, ―Kerberos Explained, May, 2000.
[Online].Availa-ble: http://technet.microsoft.com/enus/ library/bb742516.aspx. [Accessed: 12-Jan-2014].
[11] Microsoft, ―Federation trusts, Aug 22, 2005. [Online].Availa-ble: http://technet.microsoft.com/enus/ library/cc738707(v=ws.10).aspx. [Accessed: 12-Jan-2014].
[12] VMWare, ―Network Segmentation in Virtualized Environments, BP-059-INF-02-01, 2009 [Online]. Available: http://www.vmware.com/files/pdf/network_segmentation.pdf [Accessed: 29 Oct 2014].
[13] Amazon Web Services, ―AWS | Amazon Virtual Private Cloud (VPC) – Secure Private Cloud VPN. [Online]. Available: http://aws.amazon.com/vpc/. [Accessed: 12-Jan-2014].
[14] J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gru-schka, and L. Lo Iacono, ―All your clouds are belong to us: security analysis of cloud management interfaces, in Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 2011, pp. 3–14.
[15] V. J. Winkler, Securing the Cloud: Cloud computer Security tech-niques and tactics. Elsevier, 2011