Skip to main content
Log in

A new model to ensure security in cloud computing services

  • Published:
Journal of Service Science Research

Abstract

In the commercial world, various computing needs are provided as a service. Service providers meet these computing needs in different ways, for example, by maintaining software or purchasing expensive hardware. Security is one of the most critical aspects in a cloud computing environment due to the sensitivity and importance of information stored in the cloud. The risk of malicious insiders in the cloud and the failure of cloud services have received a great deal of attention by companies. This paper focuses on issues related to data security and privacy in cloud computing and proposes a new model, called Multi-Cloud Databases (MCDB). The purpose of the proposed new model is to address security and privacy risks in the cloud computing environment. Three security issues will be examined in our proposed model: data integrity, data intrusion, and service availability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Abu-Libdeh H, Princehouse L, & Weatherspoon H (2010) RACS: a case for cloud storage diversity, Proceedings of the 1st ACM symposium on Cloud computing (ACM):229–240.

  • Agrawal D, et al. (2009) Database Management as a Service: Challenges and Opportunities, Proceedings of The 2009 25th International Conference on Data Engineering (IEEE): 1709–1716.

  • Akioka S, Muraoka Y (2010) HPC benchmarks on Amazon EC2, Proceedings of The 2010 24th International Conference on Advanced Information Networking and Applications Workshops (IEEE):1029–1034.

  • AlZain MA, Pardede E (2011) Using Multi Shares for Ensuring Privacy in Database-as-a-Service, Proceedings of The 2011 44th Hawaii International Conference on System Sciences (HICSS) (IEEE):1–9.

  • AlZain MA, Pardede E, Soh B, & Thom JA (2012) Cloud Computing Security: From Single to Multi-clouds, Proceedings of The 2012 45th Hawaii International Conference on System Science (HICSS) (IEEE):5490–5499.

  • Amazon (2006) Amazon Web Services. Web services licensing agreement, Accessed in May-2011.

  • Amazon (2010) Amazon Web Services. Web services licensing agreement.

  • Bessani A, et al. (2011) DepSky: dependable and secure storage in a cloud-of-clouds’ Proceedings of the sixth conference on Computer systems (ACM):31–46.

  • BNA. Privacy & security law report, 8 PVLR 10, Copyright 2009 by The Bureau of National Affairs, Inc. 800-372-1033):2009.

  • Bowers KD, Juels A, & Oprea A (2009) HAIL: A high-availability and integrity layer for cloud storage, Proceedings of the 16th ACM conference on Computer and communi cations security (ACM):187–198.

  • Cachin C, Keidar I, & Shraer A (2009) Trusting the cloud, ACM SIGACT News 40(2):81–86.

    Article  Google Scholar 

  • Cachin C, Haas R, & Vukolic M (2010) Dependable storage in the Intercloud, IBM Research 3783:1–6.

    Google Scholar 

  • Chockler G, et al. (2009) Reliable distributed storage, Computer 42(4):60–67.

    Article  Google Scholar 

  • Clavister (2008) Security in the cloud, Clavister White Paper 1–6.

  • Garfinkel SL (2007) An evaluation of amazon’s grid computing services: EC2, S3, and SQS, http://simson.net/clips/academic/2007.Harvard.S3.pdf:1–15.

  • Garfinkel SL (2003) Email-based identification and authentication: An alternative to PKI? IEEE Security and Privacy 1(6):20–26.

    Article  Google Scholar 

  • Kamara S, Lauter K (2010) Cryptographic cloud storage, Financial Cryptography and Data Security, 6054:136–49.

    Article  Google Scholar 

  • Kaufman LM (2009) Data security in the world of cloud computing, IEEE Security and Privacy 7(4):61–64.

    Article  Google Scholar 

  • Krawczyk H, Bellare M, & Canetti R (1997) HMAC: Keyed-hashing for message authentication, in RFC Editor (ed.):1–11.

  • Lee YW, et al. (2002) AIMQ: a methodology for information quality assessment, Information and Management 40(2):133–46.

    Article  Google Scholar 

  • Mei H, et al. (2009) Supporting Database Applications as a Service, Proceedings of the 2009 International Conference on Data Engineering (IEEE):832–843.

  • Na KS, Baik D-K, & Kim P-K (2001) A practical approach for modeling the quality of multimedia data, Proceedings of the ninth ACM international conference on Multimedia (Ottawa, Canada: ACM).

  • Ristenpart T, et al. (2009) Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds, Proceedings of the 16th ACM conference on Computer and communications security (ACM):199–212.

  • Seccombe A, Hutton A, Meisel A, Windel A, Mohammed A, & Licciardi A, et al. (2009) Security guidance for critical areas of focus in cloud computing, Cloud Security Alliance 25:1–177.

    Google Scholar 

  • Shamir Adi (1979) How to share a secret, Commun. ACM 22(11):612–613.

    Article  Google Scholar 

  • Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications: 1–11. Sun http://blogs.sun.com/gbrunett/entry/amazon_s3_silent_data_corruption, Accessed in May-2011.

  • Takabi H, Joshi JBD, & Ahn G (2010) Security and Privacy Challenges in Cloud Computing Environments, Security and Privacy, IEEE 8(6):24–31.

    Article  Google Scholar 

  • Viega J (2009) Cloud computing and the common man, Computer 42(8):106–08.

    Article  Google Scholar 

  • Vukolic M (2010) The Byzantine empire in the intercloud, ACM SIGACT News 41(3):105–11.

    Article  Google Scholar 

  • Wang C, et al. (2009) Ensuring data storage security in cloud computing, Proceedings of The 2009 17th International Workshop on Quality of Service (IEEE):1–9.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammed A. AlZain.

Additional information

Mohammed A. AlZain is a PhD candidate in the Department of Computer Science and Computer Engineering at La Trobe University, Melbourne, Australia since Oct-2010. Currently, his PhD research is in Cloud Computing Security under Assoc/Prof. Ben Soh and Dr. Eric Pardede. He has achieved his Bachelor degree in Computer Science from King Abdulaziz University, Saudi Arabia in 2004, and then achieved his Master’s degree in Information Technology from La Trobe University in 2010. He is a lecturer in the faculty of Computer Science and Information Technology at Al Taif University in Saudi Arabia. His area of interest: Cloud Computing, Database As Services.

Ben Soh is an Associate Professor in the Department of Computer Science and Computer Engineering at La Trobe University, Melbourne, Australia and a Senior Member of IEEE. He in 1995 obtained his PhD in Computer Science and Engineering at La Trobe. Since then, he has had numerous successful PhD graduates and published more than 150 peer-reviewed research papers. He has made significant contributions in various research areas, including fault-tolerant and secure computing, and web services.

Eric Pardede received the Master of Information Technology degree and Ph.D. degree in computer science from La Trobe University, Melbourne, Australia, in 2002 and 2006, respectively. He is currently a Lecturer with the Department of Computer Science and Computer Engineering, La Trobe University. He has wide range of teaching and research experience including in the area of databases, software engineering, information systems, entrepreneurship, and professional communication.

Rights and permissions

Reprints and permissions

About this article

Cite this article

AlZain, M.A., Soh, B. & Pardede, E. A new model to ensure security in cloud computing services. J Serv Sci Res 4, 49–70 (2012). https://doi.org/10.1007/s12927-012-0002-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12927-012-0002-5

Keywords

Navigation