Security Architecture for Cloud Networking: A Survey
Authors: Vishnu Pratap Singh Kirar
Abstract:
In the cloud computing hierarchy IaaS is the lowest layer, all other layers are built over it. Thus it is the most important layer of cloud and requisite more importance. Along with advantages IaaS faces some serious security related issue. Mainly Security focuses on Integrity, confidentiality and availability. Cloud computing facilitate to share the resources inside as well as outside of the cloud. On the other hand, cloud still not in the state to provide surety to 100% data security. Cloud provider must ensure that end user/client get a Quality of Service. In this report we describe possible aspects of cloud related security.
Keywords: Cloud Computing, Cloud Networking, IaaS, PaaS, SaaS, Cloud Security.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1097419
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2243References:
[1] Seol, J.; Jin, S.; Maeng, S., "Secure Storage Service for IaaS Cloud Users," Cluster, Cloud and Grid Computing (CCGrid), 2013 13th IEEE/ACM International Symposium, pp.190-191, 13-16 May 2013.
[2] Yandong, Z,; Yongsheng, Z., "Cloud computing and cloud security challenges," Information Technology in Medicine and Education (ITME), 2012 International Symposium, vol.2, pp.1084,1088, 3-5 Aug. 2012
[3] Jog, M.; Madiajagan, M., "Cloud Computing: Exploring security design approaches in Infrastructure as a Service," Cloud Computing Technologies, Applications and Management (ICCCTAM), 2012 International, pp.156-159, 8-10 Dec. 2012
[4] Villegas, D.; Bobroff, N.; Rodero, I.; Delgado, J.; Liu, Y.; Devarakonda, A.; Fong, L.; Sadjadi, S.M.; Parashar, M.; “Cloud federation in a layered service model,” Journal of Computer and System Sciences, Volume 78, Issue 5, Pages 1330-1344, September 2012
[5] Banirostam, H.; Hedayati, A.; Zadeh, A.K.; Shamsinezhad, E., "A Trust Based Approach for Increasing Security in Cloud Computing Infrastructure," Computer Modelling and Simulation (UKSim), 2013 UKSim 15th International Conference, pp.717-721, 10-12 April 2013
[6] Fusenig, V.; Sharma, A., "Security architecture for cloud networking," Computing, Networking and Communications (ICNC), 2012 International Conference, pp.45-49, Jan. 30 2012-Feb. 2 2012
[7] Kandukuri, B.R.; Paturi, V.R.; Rakshit, A., "Cloud Security Issues," Services Computing, 2009. SCC '09. IEEE International Conference, pp.517-520, 21-25 Sept. 2009
[8] Peng, Y.; Zhao, W.; Xie, F.; Dai, Z.H.; Gao, Y.; Chen, D.G., “Secure cloud storage based on cryptographic techniques,” The Journal of China Universities of Posts and Telecommunications, Volume 19, Supplement 2, pp. 182-189, October 2012
[9] Dawoud, W.; Takouna, I.; Meinel, C., "Infrastructure as a service security: Challenges and solutions," Informatics and Systems (INFOS), 2010 The 7th International Conference, pp.1-8, 28-30 March 2010
[10] Gupta, S.; Satapathy, S.R.; Mehta, P.; Tripathy, A., "A secure and searchable data storage in Cloud computing," Advance Computing Conference (IACC), 2013 IEEE 3rd International conference, pp.106- 109, 22-23 Feb. 2013
[11] Meera, A.; Swamynathan, S., “Agent based Resource Monitoring System in IaaS Cloud Environment,” Procedia Technology, Volume 10, Pages 200-207, ISSN 2212-0173, 2013