Abstract
Cloud computing emerges as one of the most promising technologies and is widely used in many fields. Cloud computing has been considered as an appropriate environment for telecommunication services. However, more threats appear in the migration of applications and telecommunication services from a traditional computing environment to a cloud platform. Traditional device-centric security systems are not effective as resources in the cloud are out of the users control. Data storage and processing for a telecommunication service in the cloud can be structured as a data service in PaaS (Platform-as-a-Service) level. Upper-level applications exchange data with the data service. In this paper, we propose a domain-divided security model in which different security policies are separately applied for three domains: the data storage domain, the data processing domain and the data transmission domain. In addition, security policies can be configured for upper-level applications based on their security requirements. Experimental results show that our proposed security model is both practical and lightweight as it can provide differentiated security protection for cloud computing-based telecommunication service with a low overhead.
Similar content being viewed by others
References
Zhu Z, Gupta P, Wang Q, Kalyanaraman S, Lin Y, Franke H, Sarangi S (2011) Virtual base station pool: towards a wireless network cloud for radio access networks. In: Proceedings of the 8th ACM international conference on computing frontiers. ACM, p 34
Campowsky K, Carella G, Magedanz T, Schreiner F (2012) Optimization of elastic cloud brokerage mechanisms for future telecommunication service environments. PIK-Praxis der Informationsverarbeitung und Kommunikation 35(3):153–159
Khan AN, Kiah MM, Madani SA, Ali M et al (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Supercomput 66(3):1687–1706
Nkosi M., Mekuria F (2010) Cloud computing for enhanced mobile health applications. In: 2010 IEEE second international conference on cloud computing technology and science (CloudCom). IEEE, pp 629–633
Ahmed M, Xiang Y (2010) Above the trust and security in cloud computing: a notion towards innovation. In: IEEE/IFIP 2010: proceedings of the IEEE/IFIP 8th international conference embedded and ubiquitous computing 2010. IEEE, pp 723–730
Cao N, Yang Z, Wang C, Ren K, Lou W (2011) Privacy-preserving query over encrypted graph-structured data in cloud computing. In: 2011 31st International conference on distributed computing systems (ICDCS). IEEE, pp 393–402
Mowbray M, Pearson S, Shen Y (2012) Enhancing privacy in cloud computing via policy-based obfuscation. J Supercomput 61(2):267–291
Feng D-G, Zhang M, Zhang Y, Xu Z (2011) Study on cloud computing security. J Softw 22(1):71–83
Chen D, Zhao H (2012) Data security and privacy protection issues in cloud computing. In: 2012 International conference on computer science and electronics engineering (ICCSEE), vol 1. IEEE, pp 647–651
Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11
Angeli D, Masala E (2012) A cost-effective cloud computing framework for accelerating multimedia communication simulations. J Parallel Distrib Comput 72(10):1373–1385
Bellavista P, Carella G, Foschini L, Magedanz T, Schreiner F, Campowsky K (2012) QoS-aware elastic cloud brokering for IMS infrastructures. In: 2012 IEEE symposium on computers and communications (ISCC). IEEE, pp 000157–000160
Khan AN, Kiah MM, Khan SU, Madani SA (2013) Towards secure mobile cloud computing: a survey. Future Gener Comput Syst 29(5):1278–1299
Pan W, Duan Y (2010) Research of the application of cloud computing in telecommunication industry. Telecommun Sci 26(6):26–29
Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I et al (2010) A view of cloud computing. Commun ACM 53(4):50–58
López-Ibáñez M, Prasad TD, Paechter B (2008) Ant colony optimization for optimal control of pumps in water distribution networks. J Water Resour Plan Manag 134(4):337–346
Bagirov AM, Barton A, Mala-Jetmarova H, Al Nuaimat A, Ahmed S, Sultanova N, Yearwood J (2013) An algorithm for minimization of pumping costs in water distribution systems using a novel approach to pump scheduling. Math Comput Model 57(3):873–886
Acknowledgments
This work is supported by National 973 Fundamental Basic Research Program under Grant No. 2014CB340600, National Science Foundation of China under Grant No. 61272072, and Program for New Century Excellent Talents in University Under Grant NCET-13-0241.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Shen, J., Zou, D., Jin, H. et al. A domain-divided configurable security model for cloud computing-based telecommunication services. J Supercomput 75, 109–122 (2019). https://doi.org/10.1007/s11227-015-1587-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-015-1587-5