A Cloud Architecture for Service Security Management

Article Preview

Abstract:

Cloud computing is revolutionizing how resources and services are used and managed, but the revolution comes with new security problems. This paper identifies current security issues in cloud computing environments. To manage service security, we propose a new architecture based on Service Level Agreements (SLAs). To ensure the integrity of data service and relieve the security concerns of users, we implement a new data auditing algorithm in this architecture. Furthermore, we present four-layer cryptography analysis to ensure data security.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1413-1417

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] L.M. Kaufman and B. Potter, Can public-cloud security meet its unique challenges?, IEEE Computer and reliability societies, (2010), pp.55-57.

DOI: 10.1109/msp.2010.120

Google Scholar

[2] J.W. Rittinghouse and J.F. Ransome, Cloud Computing implementation, management, and security, (2010), p.68–73.

Google Scholar

[3] T. Dierks, and E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1. 2, IETF RFC5246, August 2008. http: /tools. ietf. org/html/rfc5246.

DOI: 10.17487/rfc5246

Google Scholar

[4] S.A. Chaves, C.B. Westphall and F.R. Lamin, SLA perspective in security management for cloud computing", Proc. 6th International Conference on Networking and Services (ICNS, 10), China, (2010), p.212–217.

DOI: 10.1109/icns.2010.36

Google Scholar

[5] M. Swanson, N. Bartol, J. Sabato, J. Hash and L. Graffo, Security metrics guide for information technology systems, National Institute of Standards and Technology Special Publication 800-55, July, (2003).

DOI: 10.6028/nist.sp.800-55

Google Scholar

[6] M. Siebenhaar, T.A.B. Nguyen, U. Lampe, D. Schuller and R. Steinmetz, Concurrent negotiations in cloud-based systems, LNCS, Vol. 7150/2012, pp.17-31.

DOI: 10.1007/978-3-642-28675-9_2

Google Scholar

[7] J. Hui and A. Klein , A benchmark of transparent data encryption for migration of web application in the cloud", Proc. 8th International Conference on Dependable, Autonomic and Secure Computing (DASC, 09), (2009), p.735–740.

DOI: 10.1109/dasc.2009.85

Google Scholar

[8] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson and D. Song, Provable data possession at untrusted stores", Proc. 14th ACM Conf. Computer and Comm. Security (CCS, 07), (2007), pp.598-609.

DOI: 10.1145/1315245.1315318

Google Scholar

[9] A. Juels and B. S. Kaliski Jr., Pors: proofs of retrievability for large files", Proc. 14th ACM Conf. Computer and Comm. Security (CCS, 07), (2007), pp.584-597.

DOI: 10.1145/1315245.1315317

Google Scholar

[10] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Lin, Enabling public auditability and data dynamics for storage security in cloud computing, IEEE Transactions on parallel and distributed system, Vol. 22, (2011), pp.847-858.

DOI: 10.1109/tpds.2010.183

Google Scholar