Skip to main content

Solution for Traversal Vulnerability and an Encryption-Based Security Solution for an Inter-cloud Environment

  • Conference paper
  • First Online:

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 32))

Abstract

Techniques of borrowing resources from external clouds to satisfy a user’s need paves way to several security threats. This is tackled by securing the data available in the borrowed resource. Data Security is provided using the traditional Advanced Encryption Standard (AES) algorithm. The traversal vulnerability issue poses a threat to security. This is handled in this work thereby, protecting every virtual machine (instance) created in the cloud from access by other malicious instances available in the same cloud. Security is evaluated based on cost. The results show that a secure cloud is designed.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Miller, M.: Cloud Computing Web-Based Applications that Change the Way You Work and Collaborate Online, 1st edn. Que publishing, Upper Saddle River (2008)

    Google Scholar 

  2. Srinivasamurthy, S., Liu, D.: Survey on cloud computing security. In: Proceedings of Conference on Cloud Computing, CloudCom, vol. 10 (2010)

    Google Scholar 

  3. Owens, D.: Securing elasticity in the cloud. Commun. ACM 53(6), 46–51 (2010)

    Article  Google Scholar 

  4. Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Internet Comput. 16(1), 69–73 (2012)

    Article  Google Scholar 

  5. Chaudhry, J.: The Essential Guide to Cloud Security

    Google Scholar 

  6. Sudhir, D. Akassh, M.A.: Security in inter-cloud communication. In: EIE’s 2nd International Conference on Computing, Energy, Networks, Robotics and Telecommunication, pp. 69–71 (2012)

    Google Scholar 

  7. Johnson, D., Murari, K., Raju, M., Suseendran, R.B., Girikumar, Y.: Eucalyptus Beginner’s Guide-UEC Edition. CSS Corp (2010)

    Google Scholar 

  8. Wenbo, M.: Modern Cryptography: Theory and Practice. Prentice Hall, Englewood Cliffs (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Kirthica .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Kirthica, S., Sridhar, R. (2015). Solution for Traversal Vulnerability and an Encryption-Based Security Solution for an Inter-cloud Environment. In: Jain, L., Behera, H., Mandal, J., Mohapatra, D. (eds) Computational Intelligence in Data Mining - Volume 2. Smart Innovation, Systems and Technologies, vol 32. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2208-8_26

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2208-8_26

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2207-1

  • Online ISBN: 978-81-322-2208-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics