Abstract
Cloud computing is threatened by unanswered security issues that are risky for both the cloud providers and users. Cloud is a computing design that manages large sets of distributed resources, of which scientists benefit from their convergence. The aim of this paper is divided into two parts: firstly a brief review on cloud computing mainly focusing on security and secondly offer a solution that eradicates possible threats. In particular, we proposed a new data security model that can efficiently protect the data whether in the cloud database or in transition. We start with an established authentication server and data server providing user authentication, user verification, and data support. The system follows SSL protocol for data encryption and protection, and secure deliver report (SDR) is used for data reliability and integrity of communication.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Casola, V., Cuomo, A., Rak, M., Villano, U.: The CloudGrid approach: security analysis and performance evaluation. Future Gener. Comput. Syst. (2011). doi:10.1016/j.future.2011.08.008
Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid computing 360-degree compared. In: 2008 Grid Computing Environments Workshop, 2008, pp. 1–10. doi:10.1109/GCE.2008.4738445
NIST.: NIST cloud computing program. http://www.nist.gov/itl/cloud/. Retrieved 21 May 2011
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 3(28), 583–592 (2012)
Teneyuca, D.: Internet cloud security: the illusion of inclusion. Inf. Secur. Tech. Rep. 3–4(16), 102–107 (2011)
Archer, J., Boehm, A.: Security guidance V 3.0, Cloud Security Alliance (2011)
Archer, J., Boehme, A., Cullinane, D., Kurtz, P., Puhlmann, N., Reavis, J.: Top threats to cloud computing, version 1.0 (2010). Cloud security alliance retrieved 7 May 2011
Khorshed, M.T., Ali, A.B.M., Wasimi, S.A.: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 6(28), 833–851 (2012)
Zhou, M., Mu, Y., Susilo, W., Yan, J., Dong, L.: Privacy enhanced data outsourcing in the cloud. J. Netw. Comput. Appl. 4(35), 1367–1373 (2012)
Mackay, M., Baker, T., Al-Yasiri, A.: Security-oriented cloud computing platform for critical infrastructures. Comput. Law Secur. Rev. 6(28), 679–686 (2012)
Rong, C., Nguyen, S.T., Jaatun, M.G.: Beyond lightning: a survey on security challenges in cloud computing. Comput. Electr. Eng. 39(1), 47–54 (2013)
Sood, S.K.: A combined approach to ensure data security in cloud computing. J. Netw. Comput. Appl. 6(35), 1831–1838 (2012)
Gao, J., Xiao, Y., Liu, J., Liang, W., Chen, C.L.P.: A survey of communication/networking in smart grids. Future Gener. Comput. Syst. 2(28), 391–404 (2012)
Noureddine, M., Bashroush, R.: An authentication model towards cloud federation in the enterprise. J. Syst. Softw. (2010). doi:10.1016/j.jss.2012.12.031
Wang, C., Wang, Q., Ren, K.: Ensuring data storage security in cloud computing. In: 17th International Workshop on Quality of Service (IWQoS). IEEE, pp. 1–9 (2009)
Prasad, P., Ojha, B., Shahi, R.R., Lal, R.: 3-dimensional security in cloud computing. Comput. Res. Dev. 3, 198–208 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Shamsolmoali, P., Afshar Alam, M. (2015). Ensuring Data Security and Performance Evaluation in Cloud Computing. In: Jain, L., Patnaik, S., Ichalkaranje, N. (eds) Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, vol 308. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2012-1_43
Download citation
DOI: https://doi.org/10.1007/978-81-322-2012-1_43
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2011-4
Online ISBN: 978-81-322-2012-1
eBook Packages: EngineeringEngineering (R0)