skip to main content
10.1145/2908446.2908459acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfosConference Proceedingsconference-collections
research-article

A Cloud Computing Security Framework Based on Cloud Security Trusted Authority

Published: 09 May 2016 Publication History

Abstract

Cloud computing is a promising technology that provides dynamic resource allocation, power saving, and low running cost. On the other hand, security risks of cloud computing represent a major concern that slows down its market growth. There are many frameworks for handling security risks of cloud computing, most of them trust the cloud service provider and do not focus on the new types of security risks that might face the cloud. Hence, they cannot detect attacks that might come from cloud service provider's side or due to vulnerabilities or attacks at the cloud service provider system. Therefore, a new security framework for cloud computing is introduced in this paper that tries to tackle these problems. Additionally, it is assumed that the introduced framework does not trust the cloud service provider. The introduced framework keeps the sensitive data encrypted at a cloud trusted authority and, hence, the sensitive data are kept away from attacks occurred at the cloud service provider.

References

[1]
Azab, A. M., Ning, P., and Zhang, X. 2011. SICE: A hardware-level strongly isolated computing environment for x86 multi-core platforms. In Proceedings of the 18th ACM Conference on Computer and Communications Security (Chicago, IL, Oct. 2011), 375--388.
[2]
Baker, D. 2012. A Guide to Physical Security for Data Centers. The Datacenter Journal (Jul. 2012).
[3]
Cloud Security Alliance. 2011. Security Guidance for Critical Areas of Focus in Cloud Computing, v. 3.0 (2011).
[4]
Cloud Security Alliance. 2012. SecaaS implementation guidance. Category 1: Identity and access management (Sept. 2012).
[5]
Cloud Standards Customer Council. 2015. Security for cloud computing: Ten steps to ensure success, v. 2 (Mar. 2015).
[6]
Hansen, J. H. 2013. How ISO 27001 revision affects your risk management process. Neupart Information Security management, White paper (2013).
[7]
Hibbard, E. A. 2013. Latest in Cloud Computing Standards. In Proceedings of CSA Congress 2013 (Orlando, FL, Dec. 2013).
[8]
Lang, U. and Schreiner, R. 2011. Analysis of recommended cloud security controls to validate open PMF "policy as a service". Elsevier, Information Security Technical Report 16 (2011), 131--141.
[9]
Popović, K. and Hocenski, Z. 2010. Cloud Computing Security Issues and Challenges. In Proceedings of the 33rd International Convention MIPRO (Opatija, Croatia, May 2010), 344--349.
[10]
Rebollo, O., Mellado, D., and Fernandez-Medina, E. 2012. A systematic review of information security governance frameworks in the cloud computing environment. Journal of Universal Computer Science (J.UCS) 18, 6 (Jun. 2012), 798--815.
[11]
Tari, Z. 2014. Security and privacy in cloud computing. IEEE Cloud Computing 1, 1 (May 2014), 54--57.
[12]
Ukil, A., Jana, D., and De Sarkar, A. 2013. A Security framework in cloud computing infrastructure. International Journal of Network Security & Its Applications (IJNSA) 5, 5 (Sept. 2013), 11--24.
[13]
Wang, C., Liu, C., Liu, B., and Dong, Y. 2014. DIV: Dynamic Integrity Validation framework for detecting compromises on virtual machine based cloud services in real time. China Communications 11, 8 (Aug. 2014), 15--27.
[14]
Youssef, A. E. and Alageel, M. 2012. A framework for secure cloud computing. International Journal of Computer Science Issues (IJCSI) 9, 4 (Jul. 2012), 487--500.

Cited By

View all
  • (2020)Biometrics based access framework for secure cloud computing2020 International Conference on Computational Science and Computational Intelligence (CSCI)10.1109/CSCI51800.2020.00246(1318-1321)Online publication date: Dec-2020
  • (2017)Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generationCluster Computing10.1007/s10586-017-1187-7Online publication date: 21-Sep-2017

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
INFOS '16: Proceedings of the 10th International Conference on Informatics and Systems
May 2016
347 pages
ISBN:9781450340625
DOI:10.1145/2908446
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 May 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Cloud computing
  2. cloud security
  3. cloud service provider
  4. data center
  5. trusted cloud computing

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

INFOS '16

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Biometrics based access framework for secure cloud computing2020 International Conference on Computational Science and Computational Intelligence (CSCI)10.1109/CSCI51800.2020.00246(1318-1321)Online publication date: Dec-2020
  • (2017)Enhanced intrusion detection and prevention system on cloud environment using hybrid classification and OTS generationCluster Computing10.1007/s10586-017-1187-7Online publication date: 21-Sep-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media