Abstract
Today cloud computing is well-known for touching all periphery of technology with its on-demand and elastic capability. Ever since it has come into picture, security has remained a major concern. VM model is already known to be vulnerable to various issues. We introduce Tus-Man protocol which will act in addition to existing system to make computing secure enough for both service provider as well as service consumers. In this protocol, we suggest a tunnel-based protocol to make data transfer not only secure but also safe enough against any malicious attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cloud computing security threats [http://www.cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf ]
Basics of public key encryption [http://en.wikipedia.org/wiki/Public-key_cryptography]
Top security thread to cloud [http://h30458.www3.hp.com/ww/en/ent/954867.html]
Basics of private key encryption [http://searchsecurity.techtarget.com/definition/private-key]
Working of kerberos [http://searchsecurity.techtarget.com/definition/Kerberos]
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer India
About this paper
Cite this paper
Bhardwaj, T., Pandit, M.R., Sharma, T.K. (2014). “A Safer Cloud”, Data Isolation and Security by Tus-Man Protocol . In: Babu, B., et al. Proceedings of the Second International Conference on Soft Computing for Problem Solving (SocProS 2012), December 28-30, 2012. Advances in Intelligent Systems and Computing, vol 236. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1602-5_71
Download citation
DOI: https://doi.org/10.1007/978-81-322-1602-5_71
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-1601-8
Online ISBN: 978-81-322-1602-5
eBook Packages: EngineeringEngineering (R0)