Skip to main content
Log in

A policy-oriented secured service for the e-commerce applications in cloud

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

The communication process is very easy today due to the rapid growth of information technology. In addition, the development of cloud computing technology makes it easier than earlier days by facilitating the large volume of data exchange anytime and from anywhere in the world. E-businesses are successfully running today due to the development of cloud computing technology. Specifically in cloud computing, cloud services are providing enormous support to share the resources and data in an efficient way with less cost expenses for businessmen. However, security is an essential issue for cloud users and services. For this purpose, many security policies have been introduced by various researchers for enhancing the security in e-commerce applications. However, the available security policies are also failing to provide the secured services in the society and e-commerce applications. To overcome this disadvantage, we propose a new policy-oriented secured service model for providing the security of the services in the cloud. The proposed model is the combination of a trust aware policy scheduling algorithm and an effective and intelligent re-encryption scheme. Here, the dynamic trust aware policy-oriented service for allocating the cloud user’s request by the cloud service provider and an effective and re-encryption scheme is used that uses intelligent agent for storing the data in the cloud database securely. The proposed model assures the scalability, reliability, and security for the stored e-commerce data and service access.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Shafiq B, Ghayyur S, Masood A, Pervaiz Z, Almutairi A (2017) Composability verification of multi-service workflows in a policy-driven cloud computing environment. IEEE Transactions on Dependable and Secure Computing 14(5):478–493

    Article  Google Scholar 

  2. Ming Li, Shao S, Huang GQ, and Xu G (2017) Cloud gateway operation system for e-commerce consolidation, IEEE Conf. on Automation Science and Engineering, pp. 395–400

  3. Moghaddam FF, Wieder P, Yahyapour R (2017) POBRES: Policy-based re-encryption schema for secure resource management in clouds, IEEE EUROCON 2017 -17th International Conference on Smart Technologies, pp. 6–8

  4. Hon WK, Millard C, Law C, Mary Q (2018) Banking in the cloud: part 1—banks’ use of cloud services. Comput Law Secur Rev 34(1):4–24

    Article  Google Scholar 

  5. Bhadoria RS, Chaudhari NS, Tharinda Nishantha Vidanagama VG (2018) Analyzing the role of interfaces in enterprise service bus: a middleware epitome for service-oriented systems. Comput Stand Interfaces 55:146–155

    Article  Google Scholar 

  6. Baig ZA, Sait SM, Binbeshr F (2016) Controlled access to cloud resources for mitigating Economic Denial of Sustainability (EDoS) attacks. Comput Netw 97:31–47

    Article  Google Scholar 

  7. Tan WA, Sun Y, Li LX, Lu GZ, Wang T (2014) A trust service-oriented scheduling model for workflow applications in cloud computing. IEEE Syst J 8(3):868–878

    Article  Google Scholar 

  8. Shin J, Jo M, Lee J, Lee D (2014) Strategic management of cloud computing services: focusing on consumer adoption behavior. IEEE Trans Eng Manag 61(3):419–427

    Article  Google Scholar 

  9. Rama Krishna Rao TK, Sajid Ali Khan, Zeenat Begum, Divakar C (2013) Mining the e-commerce cloud: a survey on emerging relationship between Web mining, e-commerce and cloud computing, 2013 I.E. International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 13–16

  10. Yang K, Jia X, Ren R, Member S (2015) Secure and verifiable policy update outsourcing for big data access control in the cloud. IEEE Trans Parallel Distrib Syst 26(12):3461–3470

    Article  Google Scholar 

  11. Fu Z, Shu J, Sun X, Linge N (2014) Smart cloud search services: verifiable keyword-based semantic search over encrypted cloud data. IEEE Trans Consum Electron 60(4):762–770

    Article  Google Scholar 

  12. Thilakanathan D, Chen S (2016) SafeProtect: controlled data sharing with user-defined policies in cloud-based collaborative environment. IEEE Trans Emerg Topics Comput 4(2):301–315

    Article  Google Scholar 

  13. Sarkari S and Das S (2015) Secure E-Govemance: from observation to policy formulation society, International Conference on Image Information Processing, pp. 208–213

  14. Mart G, Gomez AFS, Mar JM (2017) SecRBAC: secure data in the clouds. IEEE Trans Serv Comput 10(5):726–740

    Article  Google Scholar 

  15. Sarojini G, Vijayakumar A, Selvamani K (2016) Trusted and reputed services using enhanced mutual trusted and reputed access control algorithm in cloud. Procedia Comput Sci 92:506–512

    Article  Google Scholar 

  16. Wei Zheng, Ying sheng Qin, Emmanuel Bugingo, Dongzhan Zhang, Jinjun Chen, Cost optimization for deadline-aware scheduling of big-data processing jobs on clouds, Futur Gener Comput Syst, Vol. 82, pp. 244–255, 2018

  17. Visheratin AA, Melnik M, DenisNasonov NB, Boukhanovsky AV (2018) Hybrid scheduling algorithm in early warning systems. Futur Gener Comput Syst 79(2):630–642

    Article  Google Scholar 

  18. Sharma V, Rathi R, Bola SK (2013) Round-robin data center selection in single region for service proximity service broker in cloud analyst. Int J Comput Technol 4(2a1):254–260

    Google Scholar 

  19. Zimmermann HJ (1978) Fuzzy programming and linear programming with several objective function. Fuzzy Sets Systems 1(1):45–55

    Article  MathSciNet  Google Scholar 

  20. Joel Weise, Charles R. Martin, Developing a security policy, available in online and downloaded from http://www.sun.com/blueprints

  21. Radi M (2015) Efficient service broker policy for large-scale cloud environments. Int J Comput Sci Issues 12(1):85–90

    Google Scholar 

  22. Faraz Fatemi Moghaddam, Philipp Wieder, Ramin Yahyapour (2017) POBRES: policy-based re-encryption schema for secure resource management in clouds, IEEE EUROCON 2017 -17th International Conference on Smart Technologies, pp. 15–21

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. S. Murali Dhar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Murali Dhar, M.S., Manimegalai, R. A policy-oriented secured service for the e-commerce applications in cloud. Pers Ubiquit Comput 22, 911–919 (2018). https://doi.org/10.1007/s00779-018-1138-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-018-1138-1

Keywords

Navigation