Skip to main content

Ensuring Data Security and Performance Evaluation in Cloud Computing

  • Conference paper
  • First Online:
Intelligent Computing, Communication and Devices

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 308))

  • 2655 Accesses

Abstract

Cloud computing is threatened by unanswered security issues that are risky for both the cloud providers and users. Cloud is a computing design that manages large sets of distributed resources, of which scientists benefit from their convergence. The aim of this paper is divided into two parts: firstly a brief review on cloud computing mainly focusing on security and secondly offer a solution that eradicates possible threats. In particular, we proposed a new data security model that can efficiently protect the data whether in the cloud database or in transition. We start with an established authentication server and data server providing user authentication, user verification, and data support. The system follows SSL protocol for data encryption and protection, and secure deliver report (SDR) is used for data reliability and integrity of communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Casola, V., Cuomo, A., Rak, M., Villano, U.: The CloudGrid approach: security analysis and performance evaluation. Future Gener. Comput. Syst. (2011). doi:10.1016/j.future.2011.08.008

    Google Scholar 

  2. Foster, I., Zhao, Y., Raicu, I., Lu, S.: Cloud computing and grid computing 360-degree compared. In: 2008 Grid Computing Environments Workshop, 2008, pp. 1–10. doi:10.1109/GCE.2008.4738445

  3. NIST.: NIST cloud computing program. http://www.nist.gov/itl/cloud/. Retrieved 21 May 2011

  4. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 3(28), 583–592 (2012)

    Article  Google Scholar 

  5. Teneyuca, D.: Internet cloud security: the illusion of inclusion. Inf. Secur. Tech. Rep. 3–4(16), 102–107 (2011)

    Article  Google Scholar 

  6. www.rickscloud.com/top-threats-for-cloud-computing/

  7. Archer, J., Boehm, A.: Security guidance V 3.0, Cloud Security Alliance (2011)

    Google Scholar 

  8. Archer, J., Boehme, A., Cullinane, D., Kurtz, P., Puhlmann, N., Reavis, J.: Top threats to cloud computing, version 1.0 (2010). Cloud security alliance retrieved 7 May 2011

    Google Scholar 

  9. Khorshed, M.T., Ali, A.B.M., Wasimi, S.A.: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Future Gener. Comput. Syst. 6(28), 833–851 (2012)

    Article  Google Scholar 

  10. Zhou, M., Mu, Y., Susilo, W., Yan, J., Dong, L.: Privacy enhanced data outsourcing in the cloud. J. Netw. Comput. Appl. 4(35), 1367–1373 (2012)

    Article  Google Scholar 

  11. Mackay, M., Baker, T., Al-Yasiri, A.: Security-oriented cloud computing platform for critical infrastructures. Comput. Law Secur. Rev. 6(28), 679–686 (2012)

    Article  Google Scholar 

  12. Rong, C., Nguyen, S.T., Jaatun, M.G.: Beyond lightning: a survey on security challenges in cloud computing. Comput. Electr. Eng. 39(1), 47–54 (2013)

    Article  Google Scholar 

  13. Sood, S.K.: A combined approach to ensure data security in cloud computing. J. Netw. Comput. Appl. 6(35), 1831–1838 (2012)

    Article  MathSciNet  Google Scholar 

  14. Gao, J., Xiao, Y., Liu, J., Liang, W., Chen, C.L.P.: A survey of communication/networking in smart grids. Future Gener. Comput. Syst. 2(28), 391–404 (2012)

    Article  Google Scholar 

  15. Noureddine, M., Bashroush, R.: An authentication model towards cloud federation in the enterprise. J. Syst. Softw. (2010). doi:10.1016/j.jss.2012.12.031

    Google Scholar 

  16. Wang, C., Wang, Q., Ren, K.: Ensuring data storage security in cloud computing. In: 17th International Workshop on Quality of Service (IWQoS). IEEE, pp. 1–9 (2009)

    Google Scholar 

  17. Prasad, P., Ojha, B., Shahi, R.R., Lal, R.: 3-dimensional security in cloud computing. Comput. Res. Dev. 3, 198–208 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pourya Shamsolmoali .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Shamsolmoali, P., Afshar Alam, M. (2015). Ensuring Data Security and Performance Evaluation in Cloud Computing. In: Jain, L., Patnaik, S., Ichalkaranje, N. (eds) Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, vol 308. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2012-1_43

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2012-1_43

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2011-4

  • Online ISBN: 978-81-322-2012-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics