Abstract
Techniques of borrowing resources from external clouds to satisfy a user’s need paves way to several security threats. This is tackled by securing the data available in the borrowed resource. Data Security is provided using the traditional Advanced Encryption Standard (AES) algorithm. The traversal vulnerability issue poses a threat to security. This is handled in this work thereby, protecting every virtual machine (instance) created in the cloud from access by other malicious instances available in the same cloud. Security is evaluated based on cost. The results show that a secure cloud is designed.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Miller, M.: Cloud Computing Web-Based Applications that Change the Way You Work and Collaborate Online, 1st edn. Que publishing, Upper Saddle River (2008)
Srinivasamurthy, S., Liu, D.: Survey on cloud computing security. In: Proceedings of Conference on Cloud Computing, CloudCom, vol. 10 (2010)
Owens, D.: Securing elasticity in the cloud. Commun. ACM 53(6), 46–51 (2010)
Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Internet Comput. 16(1), 69–73 (2012)
Chaudhry, J.: The Essential Guide to Cloud Security
Sudhir, D. Akassh, M.A.: Security in inter-cloud communication. In: EIE’s 2nd International Conference on Computing, Energy, Networks, Robotics and Telecommunication, pp. 69–71 (2012)
Johnson, D., Murari, K., Raju, M., Suseendran, R.B., Girikumar, Y.: Eucalyptus Beginner’s Guide-UEC Edition. CSS Corp (2010)
Wenbo, M.: Modern Cryptography: Theory and Practice. Prentice Hall, Englewood Cliffs (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Kirthica, S., Sridhar, R. (2015). Solution for Traversal Vulnerability and an Encryption-Based Security Solution for an Inter-cloud Environment. In: Jain, L., Behera, H., Mandal, J., Mohapatra, D. (eds) Computational Intelligence in Data Mining - Volume 2. Smart Innovation, Systems and Technologies, vol 32. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2208-8_26
Download citation
DOI: https://doi.org/10.1007/978-81-322-2208-8_26
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2207-1
Online ISBN: 978-81-322-2208-8
eBook Packages: EngineeringEngineering (R0)