{"title":"Security Architecture for Cloud Networking: A Survey","authors":"Vishnu Pratap Singh Kirar","volume":96,"journal":"International Journal of Computer and Information Engineering","pagesStart":2177,"pagesEnd":2181,"ISSN":"1307-6892","URL":"https:\/\/publications.waset.org\/pdf\/10000009","abstract":"
In the cloud computing hierarchy IaaS is the lowest
\r\nlayer, all other layers are built over it. Thus it is the most important
\r\nlayer of cloud and requisite more importance. Along with advantages
\r\nIaaS faces some serious security related issue. Mainly Security
\r\nfocuses on Integrity, confidentiality and availability. Cloud
\r\ncomputing facilitate to share the resources inside as well as outside of
\r\nthe cloud. On the other hand, cloud still not in the state to provide
\r\nsurety to 100% data security. Cloud provider must ensure that end
\r\nuser\/client get a Quality of Service. In this report we describe
\r\npossible aspects of cloud related security.<\/p>\r\n","references":"[1] Seol, J.; Jin, S.; Maeng, S., \"Secure Storage Service for IaaS Cloud\r\nUsers,\" Cluster, Cloud and Grid Computing (CCGrid), 2013 13th\r\nIEEE\/ACM International Symposium, pp.190-191, 13-16 May 2013.\r\n[2] Yandong, Z,; Yongsheng, Z., \"Cloud computing and cloud security\r\nchallenges,\" Information Technology in Medicine and Education\r\n(ITME), 2012 International Symposium, vol.2, pp.1084,1088, 3-5 Aug.\r\n2012\r\n[3] Jog, M.; Madiajagan, M., \"Cloud Computing: Exploring security design\r\napproaches in Infrastructure as a Service,\" Cloud Computing\r\nTechnologies, Applications and Management (ICCCTAM), 2012\r\nInternational, pp.156-159, 8-10 Dec. 2012\r\n[4] Villegas, D.; Bobroff, N.; Rodero, I.; Delgado, J.; Liu, Y.; Devarakonda,\r\nA.; Fong, L.; Sadjadi, S.M.; Parashar, M.; \u201cCloud federation in a layered\r\nservice model,\u201d Journal of Computer and System Sciences, Volume 78,\r\nIssue 5, Pages 1330-1344, September 2012\r\n[5] Banirostam, H.; Hedayati, A.; Zadeh, A.K.; Shamsinezhad, E., \"A Trust\r\nBased Approach for Increasing Security in Cloud Computing\r\nInfrastructure,\" Computer Modelling and Simulation (UKSim), 2013\r\nUKSim 15th International Conference, pp.717-721, 10-12 April 2013\r\n[6] Fusenig, V.; Sharma, A., \"Security architecture for cloud networking,\"\r\nComputing, Networking and Communications (ICNC), 2012\r\nInternational Conference, pp.45-49, Jan. 30 2012-Feb. 2 2012\r\n[7] Kandukuri, B.R.; Paturi, V.R.; Rakshit, A., \"Cloud Security Issues,\"\r\nServices Computing, 2009. SCC '09. IEEE International Conference,\r\npp.517-520, 21-25 Sept. 2009\r\n[8] Peng, Y.; Zhao, W.; Xie, F.; Dai, Z.H.; Gao, Y.; Chen, D.G., \u201cSecure\r\ncloud storage based on cryptographic techniques,\u201d The Journal of China\r\nUniversities of Posts and Telecommunications, Volume 19, Supplement\r\n2, pp. 182-189, October 2012\r\n[9] Dawoud, W.; Takouna, I.; Meinel, C., \"Infrastructure as a service\r\nsecurity: Challenges and solutions,\" Informatics and Systems (INFOS),\r\n2010 The 7th International Conference, pp.1-8, 28-30 March 2010\r\n[10] Gupta, S.; Satapathy, S.R.; Mehta, P.; Tripathy, A., \"A secure and\r\nsearchable data storage in Cloud computing,\" Advance Computing\r\nConference (IACC), 2013 IEEE 3rd International conference, pp.106-\r\n109, 22-23 Feb. 2013\r\n[11] Meera, A.; Swamynathan, S., \u201cAgent based Resource Monitoring\r\nSystem in IaaS Cloud Environment,\u201d Procedia Technology, Volume 10,\r\nPages 200-207, ISSN 2212-0173, 2013","publisher":"World Academy of Science, Engineering and Technology","index":"Open Science Index 96, 2014"}