Reference Hub1
Performance Evaluation of Secure Data Transmission Mechanism (SDTM) for Cloud Outsourced Data and Transmission Layer Security (TLS)

Performance Evaluation of Secure Data Transmission Mechanism (SDTM) for Cloud Outsourced Data and Transmission Layer Security (TLS)

Abdullah A. Alhaj
Copyright: © 2014 |Volume: 4 |Issue: 1 |Pages: 5
ISSN: 2156-1834|EISSN: 2156-1826|EISBN13: 9781466653016|DOI: 10.4018/ijcac.2014010104
Cite Article Cite Article

MLA

Alhaj, Abdullah A. "Performance Evaluation of Secure Data Transmission Mechanism (SDTM) for Cloud Outsourced Data and Transmission Layer Security (TLS)." IJCAC vol.4, no.1 2014: pp.45-49. http://doi.org/10.4018/ijcac.2014010104

APA

Alhaj, A. A. (2014). Performance Evaluation of Secure Data Transmission Mechanism (SDTM) for Cloud Outsourced Data and Transmission Layer Security (TLS). International Journal of Cloud Applications and Computing (IJCAC), 4(1), 45-49. http://doi.org/10.4018/ijcac.2014010104

Chicago

Alhaj, Abdullah A. "Performance Evaluation of Secure Data Transmission Mechanism (SDTM) for Cloud Outsourced Data and Transmission Layer Security (TLS)," International Journal of Cloud Applications and Computing (IJCAC) 4, no.1: 45-49. http://doi.org/10.4018/ijcac.2014010104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. In Cloud, the data and associated software are not under their control. In addition, with the growing demands for Cloud networks communication. With the increasing demand for computer communications the need for security is growing dramatically. The existing research related to security mechanisms focuses on security of the data transmission in the communication networks only. The authors developed specific Secure Data Transmission Mechanism (S SDTM) for cloud outsourced data is a set of technologies and solutions to enforce security policy and bandwidth compliance on all devices seeking to access network computing resources, in order to limit damage from emerging security threats and to allow network access only to compliant and trusted endpoint devices. IPSec is a suite of protocols that adds security to communications at the IP level. Protocols within the IPSec suite make extensive use of cryptographic algorithms. Since these algorithms are computationally sophisticated, some hardware accelerators are needed to support high throughput. In this paper, the authors compare between secure data transmission mechanism for cloud outsourced data with preemption control algorithm and TLS to improve the properties of the S SDTM and the Virtual Private Networks (VPN) built with both protocols.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.