A policy-oriented secured service for the e-commerce applications in cloud

  • M. S. Murali Dhar
  • R. Manimegalai
Original Article


The communication process is very easy today due to the rapid growth of information technology. In addition, the development of cloud computing technology makes it easier than earlier days by facilitating the large volume of data exchange anytime and from anywhere in the world. E-businesses are successfully running today due to the development of cloud computing technology. Specifically in cloud computing, cloud services are providing enormous support to share the resources and data in an efficient way with less cost expenses for businessmen. However, security is an essential issue for cloud users and services. For this purpose, many security policies have been introduced by various researchers for enhancing the security in e-commerce applications. However, the available security policies are also failing to provide the secured services in the society and e-commerce applications. To overcome this disadvantage, we propose a new policy-oriented secured service model for providing the security of the services in the cloud. The proposed model is the combination of a trust aware policy scheduling algorithm and an effective and intelligent re-encryption scheme. Here, the dynamic trust aware policy-oriented service for allocating the cloud user’s request by the cloud service provider and an effective and re-encryption scheme is used that uses intelligent agent for storing the data in the cloud database securely. The proposed model assures the scalability, reliability, and security for the stored e-commerce data and service access.


Information technology E-commerce Cloud computing Policy-oriented service Trust and security policy 


  1. 1.
    Shafiq B, Ghayyur S, Masood A, Pervaiz Z, Almutairi A (2017) Composability verification of multi-service workflows in a policy-driven cloud computing environment. IEEE Transactions on Dependable and Secure Computing 14(5):478–493CrossRefGoogle Scholar
  2. 2.
    Ming Li, Shao S, Huang GQ, and Xu G (2017) Cloud gateway operation system for e-commerce consolidation, IEEE Conf. on Automation Science and Engineering, pp. 395–400Google Scholar
  3. 3.
    Moghaddam FF, Wieder P, Yahyapour R (2017) POBRES: Policy-based re-encryption schema for secure resource management in clouds, IEEE EUROCON 2017 -17th International Conference on Smart Technologies, pp. 6–8Google Scholar
  4. 4.
    Hon WK, Millard C, Law C, Mary Q (2018) Banking in the cloud: part 1—banks’ use of cloud services. Comput Law Secur Rev 34(1):4–24CrossRefGoogle Scholar
  5. 5.
    Bhadoria RS, Chaudhari NS, Tharinda Nishantha Vidanagama VG (2018) Analyzing the role of interfaces in enterprise service bus: a middleware epitome for service-oriented systems. Comput Stand Interfaces 55:146–155CrossRefGoogle Scholar
  6. 6.
    Baig ZA, Sait SM, Binbeshr F (2016) Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks. Comput Netw 97:31–47CrossRefGoogle Scholar
  7. 7.
    Tan WA, Sun Y, Li LX, Lu GZ, Wang T (2014) A trust service-oriented scheduling model for workflow applications in cloud computing. IEEE Syst J 8(3):868–878CrossRefGoogle Scholar
  8. 8.
    Shin J, Jo M, Lee J, Lee D (2014) Strategic management of cloud computing services: focusing on consumer adoption behavior. IEEE Trans Eng Manag 61(3):419–427CrossRefGoogle Scholar
  9. 9.
    Rama Krishna Rao TK, Sajid Ali Khan, Zeenat Begum, Divakar C (2013) Mining the e-commerce cloud: a survey on emerging relationship between Web mining, e-commerce and cloud computing, 2013 I.E. International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 13–16Google Scholar
  10. 10.
    Yang K, Jia X, Ren R, Member S (2015) Secure and verifiable policy update outsourcing for big data access control in the cloud. IEEE Trans Parallel Distrib Syst 26(12):3461–3470CrossRefGoogle Scholar
  11. 11.
    Fu Z, Shu J, Sun X, Linge N (2014) Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data. IEEE Trans Consum Electron 60(4):762–770CrossRefGoogle Scholar
  12. 12.
    Thilakanathan D, Chen S (2016) SafeProtect: controlled data sharing with user-defined policies in cloud-based collaborative environment. IEEE Trans Emerg Topics Comput 4(2):301–315CrossRefGoogle Scholar
  13. 13.
    Sarkari S and Das S (2015) Secure E-Govemance: from observation to policy formulation society, International Conference on Image Information Processing, pp. 208–213Google Scholar
  14. 14.
    Mart G, Gomez AFS, Mar JM (2017) SecRBAC: secure data in the clouds. IEEE Trans Serv Comput 10(5):726–740CrossRefGoogle Scholar
  15. 15.
    Sarojini G, Vijayakumar A, Selvamani K (2016) Trusted and reputed services using enhanced mutual trusted and reputed access control algorithm in cloud. Procedia Comput Sci 92:506–512CrossRefGoogle Scholar
  16. 16.
    Wei Zheng, Ying sheng Qin, Emmanuel Bugingo, Dongzhan Zhang, Jinjun Chen, Cost optimization for deadline-aware scheduling of big-data processing jobs on clouds, Futur Gener Comput Syst, Vol. 82, pp. 244–255, 2018Google Scholar
  17. 17.
    Visheratin AA, Melnik M, DenisNasonov NB, Boukhanovsky AV (2018) Hybrid scheduling algorithm in early warning systems. Futur Gener Comput Syst 79(2):630–642CrossRefGoogle Scholar
  18. 18.
    Sharma V, Rathi R, Bola SK (2013) Round-robin data center selection in single region for service proximity service broker in cloud analyst. Int J Comput Technol 4(2a1):254–260Google Scholar
  19. 19.
    Zimmermann HJ (1978) Fuzzy programming and linear programming with several objective function. Fuzzy Sets Systems 1(1):45–55MathSciNetCrossRefzbMATHGoogle Scholar
  20. 20.
    Joel Weise, Charles R. Martin, Developing a security policy, available in online and downloaded from
  21. 21.
    Radi M (2015) Efficient service broker policy for large-scale cloud environments. Int J Comput Sci Issues 12(1):85–90Google Scholar
  22. 22.
    Faraz Fatemi Moghaddam, Philipp Wieder, Ramin Yahyapour (2017) POBRES: policy-based re-encryption schema for secure resource management in clouds, IEEE EUROCON 2017 -17th International Conference on Smart Technologies, pp. 15–21Google Scholar

Copyright information

© Springer-Verlag London Ltd., part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringVelammal Engineering CollegeChennaiIndia
  2. 2.Department of Information TechnologyPSG College of TechnologyCoimbatoreIndia

Personalised recommendations