Abstract
Cloud computing is one of the emerging technologies in last decade; this technology provides a service model to organizations and public users. Organization users and developers, they start and maintain their organization without any hardware and software infrastructure they can develop their company with the help of cloud technology. Cloud deployment is categorized into three types, private, public and hybrid cloud environment and here public and private cloud more secure comparatively hybrid cloud because when data is moving from private to public cloud security problem is occur. Data communication is most important task in a network environment so the proposed model is focus on data security in hybrid cloud environment. In a hybrid cloud the participation of private cloud and its nodes very important after that the data transmission is depends on active node, In this node selection is based on genetic algorithm. The result of proposed model is going to compare with private and public cloud security parameters.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Boonchieng, E.: Performance and security issue on open source private cloud. In: Proceedings of the International Electrical Engineering Congress (2014)
Jayapandian, N., Zubair Rahman, A.M.J.M., Radhikadevi, S., Koushikaa, M.: Enhanced cloud security framework to confirm data security on asymmetric and symmetric key encryption. In: IEEE Sponsored World Conference on Futuristic Trends in Research and Innovation for Social Welfare (WCFTR 16) (2016)
Gajra, N., Khan, S.S., Rane, P.: Private cloud security: Secure user authentication by using hybrid enhance algorithm. In: International Conference on Advances Communication and Computing Technology (2014)
Ko, R.K.L., Lee, B.S., Pearson, S.: Towards achieving accountability, auditability and trust in cloud computing. IEEE Trans. Serv. Comput. 9(1)
Hussain, S.A., et al.: Multilevel classification of security concerns in cloud computing. Appl. Comput. Inform. 13(1), 57–65 (2016)
Shanmugam, U., Saranya, R., Dhinakaran, K.: Dependability assurance through trusted execution of boot processing for infrastructure security in cloud environment. In: International Conference on Inter Disciplinary Research in Engineering and Technology (2015)
Shanmugam, U., Tamilselvan, L.: Dynamic resource monitoring of SaaS with attestation for a trusted cloud environment. Int. J. Secur. Appl. 10(4), 41–50 (2016)
Shanmugam, U., Tamilselvan, L., Nandhini, U., Dhinakaran, K.: Attestation for trusted computing to assure security in cloud deployment services. Int. J. Inf. Electron. Eng. 2(4), 644–648 (2012)
Chang, V., Ramachandran, M.: Towards achieving data security with the cloud computing adoption framework. IEEE Trans. Serv. Comput. 9(1), 138–151 (2016)
Huang, W., et al.: The state of public infrastructure-as-a-service cloud security. ACM Comput. Surv. 47(4), Article 68 (2015)
Halton, W.M., Rahman, S.: The top ten cloud-security practices in next-generation networking. Int. J. Commun. Netw. Distrib. Syst. 8(1–2), 70–84 (2014). ACM
Jia, Z., Tian, X.: A novel security private cloud solution based on eCryptfs. In: 6th International Conference on Information Management, Innovation Management and Industrial Engineering (2013)
Vijay, G.R., Reddy, A.R.M.: An efficient security model in cloud computing based on soft computing techniques. Int. J. Comput. Appl. (0975 8887) 60(14), 1–6 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Dhinakaran, K., Kirtana, R., Gayathri, K., Devisri, R. (2018). Enhance Hybrid Cloud Security Using Vulnerability Management. In: Abraham, A., Cherukuri, A., Madureira, A., Muda, A. (eds) Proceedings of the Eighth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2016). SoCPaR 2016. Advances in Intelligent Systems and Computing, vol 614. Springer, Cham. https://doi.org/10.1007/978-3-319-60618-7_47
Download citation
DOI: https://doi.org/10.1007/978-3-319-60618-7_47
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-60617-0
Online ISBN: 978-3-319-60618-7
eBook Packages: EngineeringEngineering (R0)