Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 614))

Included in the following conference series:

Abstract

Cloud computing is one of the emerging technologies in last decade; this technology provides a service model to organizations and public users. Organization users and developers, they start and maintain their organization without any hardware and software infrastructure they can develop their company with the help of cloud technology. Cloud deployment is categorized into three types, private, public and hybrid cloud environment and here public and private cloud more secure comparatively hybrid cloud because when data is moving from private to public cloud security problem is occur. Data communication is most important task in a network environment so the proposed model is focus on data security in hybrid cloud environment. In a hybrid cloud the participation of private cloud and its nodes very important after that the data transmission is depends on active node, In this node selection is based on genetic algorithm. The result of proposed model is going to compare with private and public cloud security parameters.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Boonchieng, E.: Performance and security issue on open source private cloud. In: Proceedings of the International Electrical Engineering Congress (2014)

    Google Scholar 

  2. Jayapandian, N., Zubair Rahman, A.M.J.M., Radhikadevi, S., Koushikaa, M.: Enhanced cloud security framework to confirm data security on asymmetric and symmetric key encryption. In: IEEE Sponsored World Conference on Futuristic Trends in Research and Innovation for Social Welfare (WCFTR 16) (2016)

    Google Scholar 

  3. Gajra, N., Khan, S.S., Rane, P.: Private cloud security: Secure user authentication by using hybrid enhance algorithm. In: International Conference on Advances Communication and Computing Technology (2014)

    Google Scholar 

  4. Ko, R.K.L., Lee, B.S., Pearson, S.: Towards achieving accountability, auditability and trust in cloud computing. IEEE Trans. Serv. Comput. 9(1)

    Google Scholar 

  5. Hussain, S.A., et al.: Multilevel classification of security concerns in cloud computing. Appl. Comput. Inform. 13(1), 57–65 (2016)

    Article  Google Scholar 

  6. Shanmugam, U., Saranya, R., Dhinakaran, K.: Dependability assurance through trusted execution of boot processing for infrastructure security in cloud environment. In: International Conference on Inter Disciplinary Research in Engineering and Technology (2015)

    Google Scholar 

  7. Shanmugam, U., Tamilselvan, L.: Dynamic resource monitoring of SaaS with attestation for a trusted cloud environment. Int. J. Secur. Appl. 10(4), 41–50 (2016)

    Google Scholar 

  8. Shanmugam, U., Tamilselvan, L., Nandhini, U., Dhinakaran, K.: Attestation for trusted computing to assure security in cloud deployment services. Int. J. Inf. Electron. Eng. 2(4), 644–648 (2012)

    Google Scholar 

  9. Chang, V., Ramachandran, M.: Towards achieving data security with the cloud computing adoption framework. IEEE Trans. Serv. Comput. 9(1), 138–151 (2016)

    Article  Google Scholar 

  10. Huang, W., et al.: The state of public infrastructure-as-a-service cloud security. ACM Comput. Surv. 47(4), Article 68 (2015)

    Google Scholar 

  11. Halton, W.M., Rahman, S.: The top ten cloud-security practices in next-generation networking. Int. J. Commun. Netw. Distrib. Syst. 8(1–2), 70–84 (2014). ACM

    Google Scholar 

  12. Jia, Z., Tian, X.: A novel security private cloud solution based on eCryptfs. In: 6th International Conference on Information Management, Innovation Management and Industrial Engineering (2013)

    Google Scholar 

  13. Vijay, G.R., Reddy, A.R.M.: An efficient security model in cloud computing based on soft computing techniques. Int. J. Comput. Appl. (0975 8887) 60(14), 1–6 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. Dhinakaran .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Cite this paper

Dhinakaran, K., Kirtana, R., Gayathri, K., Devisri, R. (2018). Enhance Hybrid Cloud Security Using Vulnerability Management. In: Abraham, A., Cherukuri, A., Madureira, A., Muda, A. (eds) Proceedings of the Eighth International Conference on Soft Computing and Pattern Recognition (SoCPaR 2016). SoCPaR 2016. Advances in Intelligent Systems and Computing, vol 614. Springer, Cham. https://doi.org/10.1007/978-3-319-60618-7_47

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-60618-7_47

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-60617-0

  • Online ISBN: 978-3-319-60618-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics