Open Access   Article Go Back

Data Centric Security Approach For Cloud Computing

Thade Lakshmi Devi1 , S. Krishna Mohan Rao2

Section:Survey Paper, Product Type: Journal Paper
Volume-9 , Issue-3 , Page no. 49-52, Mar-2021

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v9i3.4952

Online published on Mar 31, 2021

Copyright © Thade Lakshmi Devi, S. Krishna Mohan Rao . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Thade Lakshmi Devi, S. Krishna Mohan Rao, “Data Centric Security Approach For Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.9, Issue.3, pp.49-52, 2021.

MLA Style Citation: Thade Lakshmi Devi, S. Krishna Mohan Rao "Data Centric Security Approach For Cloud Computing." International Journal of Computer Sciences and Engineering 9.3 (2021): 49-52.

APA Style Citation: Thade Lakshmi Devi, S. Krishna Mohan Rao, (2021). Data Centric Security Approach For Cloud Computing. International Journal of Computer Sciences and Engineering, 9(3), 49-52.

BibTex Style Citation:
@article{Devi_2021,
author = {Thade Lakshmi Devi, S. Krishna Mohan Rao},
title = {Data Centric Security Approach For Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2021},
volume = {9},
Issue = {3},
month = {3},
year = {2021},
issn = {2347-2693},
pages = {49-52},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5328},
doi = {https://doi.org/10.26438/ijcse/v9i3.4952}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v9i3.4952}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5328
TI - Data Centric Security Approach For Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Thade Lakshmi Devi, S. Krishna Mohan Rao
PY - 2021
DA - 2021/03/31
PB - IJCSE, Indore, INDIA
SP - 49-52
IS - 3
VL - 9
SN - 2347-2693
ER -

VIEWS PDF XML
291 379 downloads 125 downloads
  
  
           

Abstract

The Data Centric Security (DCS) approach is talked about in detail. This approach is the central one utilized as a part of this postulation for upgrading cloud computing security and privacy. The Paper begins with looking into and ordering conceivable security solutions, in light of the DCS ideas in the cloud computing model. 3, at that point expands on these, to shape the applied structure for DCS implementations proposed in this exploration. [6] The normal advantages of applying the DCS way to deal with the cloud computing environments are talked about in. The extent of the application of the DCS way to deal with the cloud computing model for this proposal is recognized in the fundamental security necessities of applying the DCS way to deal with this extension are additionally cleared up. In addition, the accessible innovations that can be utilized to accomplish these necessities are looked into in that section. In light of such audits, appropriateness of these advancements is evaluated to determine a novel solution, which is among the fundamental contributions of this examination. Finally, the outline of this part is quickly introduced. [9]

Key-Words / Index Term

Communication network, 3G, mobile core network, Broadband Router, HNB

References

[1] J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, ,(2011)“All your clouds are belong to us: security analysis of cloud management interfaces,” in Proceedings of the 3rd ACM workshop on Cloud computing security workshop, CCSW ’11, (New York, NY, USA), pp. 3–14, ACM, 2011.
[2] T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, (2009) “Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds,” in Proceedings of the 16th ACM conference on Computer and communications security, CCS ’09, (New York, NY, USA), pp. 199–212, ACM, 2009.
[3] D. Molnar and S. Schechter, (2010) “Self hosting vs . cloud hosting, : Accounting for the security impact of hosting in the cloud,” in Workshop of the economics of cloud security, pp. 1–18, 2010.
[4] Y. Chen, V. Paxson, and R. Katz, (2010) “The hybrex model for confidentiality and privacy in cloud computing,” Technical Report UCB/EECS-2010-5, EECS Department, University of California, Berkeley, January 2010.
[5] N. Santos, K. P. Gummadi, and R. Rodrigues, ( 20009) “Towards trusted cloud computing,” in Proceedings of the 2009 conference on Hot topics in cloud computing, HotCloud’09, (Berkeley, CA, USA), USENIX Association, 2009.
[6] D. Kuhlmann, R. Landfermann, H. V. Ramasamy, M. Schunter, G. Ramunno, and D. Vernizzi, (2006) “An open trusted computing architecture – secure virtual machines enabling user-defined policy enforcement,” Work, pp. 1–14, 2006.
[7] N. Pohlmann and H. Reimer, (2008) “Trusted computing - eine einfA˜ 1 4 hrung,” in Trusted Computing (N. Pohlmann and H. Reimer, eds.), pp. 3–12, Vieweg+Teubner, 2008. 10.1007/978-3-8348-9452- 6 1.
[8] M. Nauman, S. Khan, X. Zhang, and J.-P. Seifert,(2010) “Beyond kernel-level integrity measurement: Enabling remote attestation for the android platform,” in Trust and Trustworthy Computing (A. Acquisti, S. Smith, and A.-R. Sadeghi, eds.), vol. 6101 of Lecture Notes in Computer Science, pp. 1–15, Springer Berlin / Heidelberg, 2010. 10.1007/978-3-642-13869-01.
[9] I. Bente, G. Dreo, B. Hellmann, S. Heuser, J. Vieweg, J. von Helden, and J. Westhuis,(2011) “Towards permission-based attestation for the android platform,” in Trust and Trustworthy Computing (J. McCune, B. Balacheff, A. Perrig, A.-R. Sadeghi, A. Sasse, and Y. Beres, eds.), vol. 6740 of Lecture Notes in Computer Science, pp. 108–115, Springer Berlin / Heidelberg, 2011. 10.1007/978-3-642- 21599-58.
[10] R. Neisse, D. Holling, and A. Pretschner, (2011) “Implementing trust in cloud infrastructures,” in Cluster, Cloud and Grid Computing (CCGrid), 2011 11th IEEE/ACM International Symposium on, pp. 524 –533, may 2011.
[11] B. Parno,(2008) “Bootstrapping trust in a ”trusted” platform,” in Proceedings of the 3rd conference on Hot topics in security, (Berkeley, CA, USA), pp. 9:1–9:6, USENIX Association, 2008.