Skip to main content

An Automated Methodology for Secured User Allocation in Cloud

  • Conference paper
  • First Online:
Book cover Security in Computing and Communications (SSCC 2016)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 625))

Included in the following conference series:

  • 773 Accesses

Abstract

Use of cloud infrastructure by enterprises for hosting their data and applications is growing at a rapid pace. This calls for proper security measures for protecting sensitive enterprise data within the Cloud. Absence of owners’ control over data stored in Cloud introduces major security concerns that should be handled by the Cloud Service Provider. One of the most critical aspects is secure handling of data deletion; it should be ensured that sensitive data is completely deleted from the Cloud on an owner’s request to avoid data leakages. This paper presents a methodology for effective and efficient allocation of Virtual Machines to users, while ensuring security of sensitive data that belongs to users within the same Conflict of Interest classes. The issue of secured data deletion has been addressed by the proposed methodology which, being a provider-end solution, does not incur any additional user overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. J. Future Gener. Comput. Syst. 25, 599–616 (2008)

    Article  Google Scholar 

  2. Hashizume, K., Rosado, D.G., Fernández-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. J. Int. Serv. Appl. 4(5), 1–13 (2013)

    Google Scholar 

  3. Rong, C., Nguyen, S.T., Jaatun, M.J.: Beyond lightning: a survey on security challenges in cloud computing. J. Recent Adv. Technol. Theor. Grid Cloud Comput. Bio-Eng. 39(1), 4–54 (2013)

    Google Scholar 

  4. Sun, Y., Zhang, J., Zhiong, Y., Zhu, G.: Data security and privacy in cloud computing. J. Dist. Sens. Netw. 2014, 1–9 (2014)

    Google Scholar 

  5. Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2010)

    Article  Google Scholar 

  6. Majumder, A., Namasudra, S., Nath, S.: Taxonomy and classification of access control models for cloud environments. In: Zaigham, M. (ed.) Continued Rise of the Cloud: Advances and Trends in Cloud Computing. Computer Communications and Networks, Springer. London (2014)

    Google Scholar 

  7. Wang, C., Wang, Q., Ren, K., Louu, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 Proceedings of INFOCOM, pp. 1–9. IEEE Press, San Diego (2010)

    Google Scholar 

  8. Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings of INFOCOM, pp. 1–9. IEEE Press, San Diego (2010)

    Google Scholar 

  9. Liu, Q., Wang, G., Wu, J.: Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. J. Inf. Sci. 258, 35–370 (2014)

    MathSciNet  Google Scholar 

  10. Wang, H., He, D., Tang, S.: Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. J. IEEE Trans. Inf. For. Secur. 11(6), 1165–1176 (2016)

    Article  Google Scholar 

  11. Aceto, G., Botta, A., de Donato, W., Pescapè, A.: Cloud monitoring: definitions, issues and future directions. In: 2012 Proceedings of IEEE CloudNet, pp. 63—67. IEEE Press, Paris (2012)

    Google Scholar 

  12. Basu, S., Sengupta, A., Mazumdar C.: Implementing Chinese wall security model for cloud-based services. In: ICGCIoT 2015, pp. 1083–1089. IEEE Press, Noida (2015)

    Google Scholar 

  13. Cloud Management and Monitoring. http://searchcloudcomputing.techtarget.com/definition/cloud-sprawl

  14. Infrastructure as a Service Cloud Concepts. http://www.ibmpressbooks.com/articles/article.asp?p=1927741&seqNum=7

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Srijita Basu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Basu, S., Sengupta, A., Mazumdar, C. (2016). An Automated Methodology for Secured User Allocation in Cloud. In: Mueller, P., Thampi, S., Alam Bhuiyan, M., Ko, R., Doss, R., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2016. Communications in Computer and Information Science, vol 625. Springer, Singapore. https://doi.org/10.1007/978-981-10-2738-3_12

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2738-3_12

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2737-6

  • Online ISBN: 978-981-10-2738-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics