Advertisement

Enhancing Cloud Security through Policy Monitoring Techniques

  • B. Loganayagi
  • S. Sujatha
Part of the Communications in Computer and Information Science book series (CCIS, volume 250)

Abstract

Cloud Computing is accessing Services through Internet based on pay per usage model. Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) are available in Cloud. Cloud based products will eliminate the need to install and manage client rich applications. Cloud Service providers are helping companies to reduce the high cost infrastructure installation and maintenance cost. Besides having enormous useful features, cloud has some issues like security. This paper provides details about cloud computing issues, how policy monitoring techniques can be used to enhance the security of the cloud.

Keywords

Cloud Computing IaaS Paas SaaS Policy Monitoring 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud Computing and Grid Computing 360-Degree Compared. In: Grid Computing Environments Workshop, GCE 2008, November 12-16 (2008)Google Scholar
  2. 2.
    Peterson, G.: Don’t Trust. And Verify: A Security Architecture Stack for the Cloud. IEEE Security and Privacy 8(5), 83–86 (2010)CrossRefGoogle Scholar
  3. 3.
    Takabi, H., Joshi, J.B.D., Ahn, G.-J.: SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments. In: 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops, Compsacw, pp. 393–398 (2010)Google Scholar
  4. 4.
    Takabi, H., Joshi, J.B.D., Ahn, G.-J.: Security and Privacy Challenges in Cloud Computing Environments. IEEE Security and Privacy 8(6), 24–31 (2010)CrossRefGoogle Scholar
  5. 5.
    Li, H.-C., Liang, P.-H., Yang, J.-M., Chen, S.-J.: Analysis on Cloud-Based Security Vulnerability Assessment. In: 2010 IEEE 7th International Conference on e-Business Engineering, Icebe, pp. 490–494 (November 2010)Google Scholar
  6. 6.
    Xu, J., Yan, J., He, L., Su, P., Feng, D.: CloudSEC: A Cloud Architecture for Composing Collaborative Security Services. In: 2nd IEEE International Conference on Cloud Computing Technology and Science, cloudcom, pp. 703–711 (2010)Google Scholar
  7. 7.
    Loganayagi, B., Sujatha, S.: Creating virtual platform for cloud computing. In: 2010 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), December 28-29, pp. 1–4 (2010), doi:10.1109/ICCIC.2010.5705744Google Scholar
  8. 8.
    Loganayagi, B., Sujatha, S.: Cloud Computing in Stax Platform. In: IEEE International Conference on Computer Communication and Electrical Technology (IEEE-ICCCET 2011), March 18-19, pp. 1–5 (2011)Google Scholar
  9. 9.
    Harauz, J., Kaufman, L.M., Potter, B.: Data Security in the World of Cloud Computing. IEEE Security and Privacy 7(4), 61–64 (2009)CrossRefGoogle Scholar
  10. 10.
    Zhou, M., Zhang, R., Xie, W., Qian, W., Zhou, A.: Security and Privacy in Cloud Computing: A Survey. In: 2010 Sixth International Conference on Semantics, Knowledge and Grids, SKG, pp. 105–112 (2010)Google Scholar
  11. 11.
    Bertram, S., Boniface, M., Surridge, M., Briscombe, N., Hall-May, M.: On-Demand Dynamic Security for Risk-Based Secure Collaboration in Clouds. In: 2010 IEEE 3rd International Conference on Cloud Computing, pp. 518–525 (2010)Google Scholar
  12. 12.
    Xue, J., Zhang, J.-j.: A Brief Survey on the Security Model of Cloud Computing. In: 2010 Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science. Dcabes, pp. 475–478 (2010)Google Scholar
  13. 13.
    Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy. O’Reilly (2009)Google Scholar
  14. 14.
    Ritinghouse, J.W., Ransome, J.F.: Cloud Computing: Implementation Management and Security. CRC Press (2010)Google Scholar
  15. 15.

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • B. Loganayagi
    • 1
  • S. Sujatha
    • 2
  1. 1.Faculty of ICEAnna University of TechnologyTiruchirappalliIndia
  2. 2.Department of MCAAnna University of TechnologyTiruchirappalliIndia

Personalised recommendations