A review of security models in cloud computing and an Innovative approach
Dr. Amit Chaturvedi, Sajad Ahmad Zarger "A review of security models in cloud computing and an Innovative approach". International Journal of Computer Trends and Technology (IJCTT) V30(2):87-92, December 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
Cloud computing is introducing many
huge changes to world of computing and working
pattern recently for its multitudinous benefits.
However, the security of cloud computing is always
the focus of numerous potential cloud customers,
and a big barrier for its widespread applications.
Actually data security is the main concern. Because
of diversity in service models proposed for cloud
computing, providing acceptable level of security is
main concern. In this paper, we have surveyed
several security models and proposed a data
security model for cloud computing based on
separation of security in different category layers.
The proposed model certifies that our method can
improve security levels in service oriented systems,
especially in cloud computing applications.
References
[1] Takabi H, Joshi J B D, Ahn G. Security a nd privacy
challenges in cloud computing environments. IEEE
Security & Privacy;2010;
[2] Monjur Ahmed1 and Mohammad Ashraf HossainCloud
computing and security issues in cloud computing in
2014International Journal of Network Security & Its
Applications (IJNSA) 2014
[3] Top threats to cloud computing prepared by security alliance
2010 http://www. cloudsecurityalliance.org/ topthreats
[4] Agarwal, A. and Agarwal, A. . The Security Risks Associated
with Cloud Computing, International Journal of Computer
Applications in Engineering Sciences,2011
[5] VMware. Inc. Understanding full virtualization, Para
virtualization and hardware assist. Technical report,
VMware, 2007.www.elsevier.com
[6] Patrick Nicolas, ”Multi tenant deployment model for SaaS”,
White paper , 2006.
[7] Yichuan Zhang, Bin Zhang, Ying Liu, “A Method of SaaS
Multi-Tenant Model Recommendation Based on Graph
Matching”.
[8] S. Subashini n, V.Kavitha A survey on security issues in
service delivery models of cloud computing 2010 Journal
of Network and Computer Applications
[9] . Jansen W, GranceT Guidelines on Security and privacy in
public Cloud Computing. NIST, Special Publication 800–
144, Gaithersburg, MD 2011
[10] Varia, J., Mathew, S..Overview of amazon web services.
http://aws.amazon.com/ whitepapers; 2013
[11]Agarwal, A. and Agarwal, A. (2011). The Security Risks
Associated with Cloud Computing, International Journal of
Computer Applications in Engineering Sciences, 1
(Special Issue on CNS),
[12] jerichoforum Cloud cube model v.1 2009
http://www.opengroup.org/jericho/publications.htm,
ww.jerichoforum.org
[13] Security guidance for critical areas of focus in cloud
computing v2.1 by cloud security alliance 2009
[14] Heiser J. What you need to know about cloud computing
security and compliance, Gartner, Research, ID
Number:G00168345, 2009.
[15] JianhuaChea*, YaminDuanb, Tao Zhanga, JieFanaStudy on
security models and strategies of cloud computing 2011
www.elesevier.com
[16] Wayne J. Brown, Vince Anderson, Qing Tan “Multitenancy -
Security Risks and Countermeasures”, 2012 15th
International Conference on Network-Based Information
Systems, IEEE
Keywords
Data security, Cloud computing, cloud
service, cloud security, SSL, TSL, security model..