Skip to main content

Advertisement

Log in

A domain-divided configurable security model for cloud computing-based telecommunication services

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Cloud computing emerges as one of the most promising technologies and is widely used in many fields. Cloud computing has been considered as an appropriate environment for telecommunication services. However, more threats appear in the migration of applications and telecommunication services from a traditional computing environment to a cloud platform. Traditional device-centric security systems are not effective as resources in the cloud are out of the users control. Data storage and processing for a telecommunication service in the cloud can be structured as a data service in PaaS (Platform-as-a-Service) level. Upper-level applications exchange data with the data service. In this paper, we propose a domain-divided security model in which different security policies are separately applied for three domains: the data storage domain, the data processing domain and the data transmission domain. In addition, security policies can be configured for upper-level applications based on their security requirements. Experimental results show that our proposed security model is both practical and lightweight as it can provide differentiated security protection for cloud computing-based telecommunication service with a low overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Zhu Z, Gupta P, Wang Q, Kalyanaraman S, Lin Y, Franke H, Sarangi S (2011) Virtual base station pool: towards a wireless network cloud for radio access networks. In: Proceedings of the 8th ACM international conference on computing frontiers. ACM, p 34

  2. Campowsky K, Carella G, Magedanz T, Schreiner F (2012) Optimization of elastic cloud brokerage mechanisms for future telecommunication service environments. PIK-Praxis der Informationsverarbeitung und Kommunikation 35(3):153–159

    Article  Google Scholar 

  3. Khan AN, Kiah MM, Madani SA, Ali M et al (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Supercomput 66(3):1687–1706

    Article  Google Scholar 

  4. Nkosi M., Mekuria F (2010) Cloud computing for enhanced mobile health applications. In: 2010 IEEE second international conference on cloud computing technology and science (CloudCom). IEEE, pp 629–633

  5. Ahmed M, Xiang Y (2010) Above the trust and security in cloud computing: a notion towards innovation. In: IEEE/IFIP 2010: proceedings of the IEEE/IFIP 8th international conference embedded and ubiquitous computing 2010. IEEE, pp 723–730

  6. Cao N, Yang Z, Wang C, Ren K, Lou W (2011) Privacy-preserving query over encrypted graph-structured data in cloud computing. In: 2011 31st International conference on distributed computing systems (ICDCS). IEEE, pp 393–402

  7. Mowbray M, Pearson S, Shen Y (2012) Enhancing privacy in cloud computing via policy-based obfuscation. J Supercomput 61(2):267–291

    Article  Google Scholar 

  8. Feng D-G, Zhang M, Zhang Y, Xu Z (2011) Study on cloud computing security. J Softw 22(1):71–83

    Article  Google Scholar 

  9. Chen D, Zhao H (2012) Data security and privacy protection issues in cloud computing. In: 2012 International conference on computer science and electronics engineering (ICCSEE), vol 1. IEEE, pp 647–651

  10. Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11

    Article  Google Scholar 

  11. Angeli D, Masala E (2012) A cost-effective cloud computing framework for accelerating multimedia communication simulations. J Parallel Distrib Comput 72(10):1373–1385

    Article  Google Scholar 

  12. Bellavista P, Carella G, Foschini L, Magedanz T, Schreiner F, Campowsky K (2012) QoS-aware elastic cloud brokering for IMS infrastructures. In: 2012 IEEE symposium on computers and communications (ISCC). IEEE, pp 000157–000160

  13. Khan AN, Kiah MM, Khan SU, Madani SA (2013) Towards secure mobile cloud computing: a survey. Future Gener Comput Syst 29(5):1278–1299

    Article  Google Scholar 

  14. Pan W, Duan Y (2010) Research of the application of cloud computing in telecommunication industry. Telecommun Sci 26(6):26–29

    Google Scholar 

  15. Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I et al (2010) A view of cloud computing. Commun ACM 53(4):50–58

    Article  Google Scholar 

  16. López-Ibáñez M, Prasad TD, Paechter B (2008) Ant colony optimization for optimal control of pumps in water distribution networks. J Water Resour Plan Manag 134(4):337–346

    Article  Google Scholar 

  17. Bagirov AM, Barton A, Mala-Jetmarova H, Al Nuaimat A, Ahmed S, Sultanova N, Yearwood J (2013) An algorithm for minimization of pumping costs in water distribution systems using a novel approach to pump scheduling. Math Comput Model 57(3):873–886

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by National 973 Fundamental Basic Research Program under Grant No. 2014CB340600, National Science Foundation of China under Grant No. 61272072, and Program for New Century Excellent Talents in University Under Grant NCET-13-0241.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deqing Zou.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shen, J., Zou, D., Jin, H. et al. A domain-divided configurable security model for cloud computing-based telecommunication services. J Supercomput 75, 109–122 (2019). https://doi.org/10.1007/s11227-015-1587-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-015-1587-5

Keywords

Navigation