Abstract
The communication process is very easy today due to the rapid growth of information technology. In addition, the development of cloud computing technology makes it easier than earlier days by facilitating the large volume of data exchange anytime and from anywhere in the world. E-businesses are successfully running today due to the development of cloud computing technology. Specifically in cloud computing, cloud services are providing enormous support to share the resources and data in an efficient way with less cost expenses for businessmen. However, security is an essential issue for cloud users and services. For this purpose, many security policies have been introduced by various researchers for enhancing the security in e-commerce applications. However, the available security policies are also failing to provide the secured services in the society and e-commerce applications. To overcome this disadvantage, we propose a new policy-oriented secured service model for providing the security of the services in the cloud. The proposed model is the combination of a trust aware policy scheduling algorithm and an effective and intelligent re-encryption scheme. Here, the dynamic trust aware policy-oriented service for allocating the cloud user’s request by the cloud service provider and an effective and re-encryption scheme is used that uses intelligent agent for storing the data in the cloud database securely. The proposed model assures the scalability, reliability, and security for the stored e-commerce data and service access.
Similar content being viewed by others
References
Shafiq B, Ghayyur S, Masood A, Pervaiz Z, Almutairi A (2017) Composability verification of multi-service workflows in a policy-driven cloud computing environment. IEEE Transactions on Dependable and Secure Computing 14(5):478–493
Ming Li, Shao S, Huang GQ, and Xu G (2017) Cloud gateway operation system for e-commerce consolidation, IEEE Conf. on Automation Science and Engineering, pp. 395–400
Moghaddam FF, Wieder P, Yahyapour R (2017) POBRES: Policy-based re-encryption schema for secure resource management in clouds, IEEE EUROCON 2017 -17th International Conference on Smart Technologies, pp. 6–8
Hon WK, Millard C, Law C, Mary Q (2018) Banking in the cloud: part 1—banks’ use of cloud services. Comput Law Secur Rev 34(1):4–24
Bhadoria RS, Chaudhari NS, Tharinda Nishantha Vidanagama VG (2018) Analyzing the role of interfaces in enterprise service bus: a middleware epitome for service-oriented systems. Comput Stand Interfaces 55:146–155
Baig ZA, Sait SM, Binbeshr F (2016) Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks. Comput Netw 97:31–47
Tan WA, Sun Y, Li LX, Lu GZ, Wang T (2014) A trust service-oriented scheduling model for workflow applications in cloud computing. IEEE Syst J 8(3):868–878
Shin J, Jo M, Lee J, Lee D (2014) Strategic management of cloud computing services: focusing on consumer adoption behavior. IEEE Trans Eng Manag 61(3):419–427
Rama Krishna Rao TK, Sajid Ali Khan, Zeenat Begum, Divakar C (2013) Mining the e-commerce cloud: a survey on emerging relationship between Web mining, e-commerce and cloud computing, 2013 I.E. International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 13–16
Yang K, Jia X, Ren R, Member S (2015) Secure and verifiable policy update outsourcing for big data access control in the cloud. IEEE Trans Parallel Distrib Syst 26(12):3461–3470
Fu Z, Shu J, Sun X, Linge N (2014) Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data. IEEE Trans Consum Electron 60(4):762–770
Thilakanathan D, Chen S (2016) SafeProtect: controlled data sharing with user-defined policies in cloud-based collaborative environment. IEEE Trans Emerg Topics Comput 4(2):301–315
Sarkari S and Das S (2015) Secure E-Govemance: from observation to policy formulation society, International Conference on Image Information Processing, pp. 208–213
Mart G, Gomez AFS, Mar JM (2017) SecRBAC: secure data in the clouds. IEEE Trans Serv Comput 10(5):726–740
Sarojini G, Vijayakumar A, Selvamani K (2016) Trusted and reputed services using enhanced mutual trusted and reputed access control algorithm in cloud. Procedia Comput Sci 92:506–512
Wei Zheng, Ying sheng Qin, Emmanuel Bugingo, Dongzhan Zhang, Jinjun Chen, Cost optimization for deadline-aware scheduling of big-data processing jobs on clouds, Futur Gener Comput Syst, Vol. 82, pp. 244–255, 2018
Visheratin AA, Melnik M, DenisNasonov NB, Boukhanovsky AV (2018) Hybrid scheduling algorithm in early warning systems. Futur Gener Comput Syst 79(2):630–642
Sharma V, Rathi R, Bola SK (2013) Round-robin data center selection in single region for service proximity service broker in cloud analyst. Int J Comput Technol 4(2a1):254–260
Zimmermann HJ (1978) Fuzzy programming and linear programming with several objective function. Fuzzy Sets Systems 1(1):45–55
Joel Weise, Charles R. Martin, Developing a security policy, available in online and downloaded from http://www.sun.com/blueprints
Radi M (2015) Efficient service broker policy for large-scale cloud environments. Int J Comput Sci Issues 12(1):85–90
Faraz Fatemi Moghaddam, Philipp Wieder, Ramin Yahyapour (2017) POBRES: policy-based re-encryption schema for secure resource management in clouds, IEEE EUROCON 2017 -17th International Conference on Smart Technologies, pp. 15–21
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Murali Dhar, M.S., Manimegalai, R. A policy-oriented secured service for the e-commerce applications in cloud. Pers Ubiquit Comput 22, 911–919 (2018). https://doi.org/10.1007/s00779-018-1138-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-018-1138-1