An Enforcement of Guaranteed Client Level Defensive Mechanism in Public Cloud Services

Main Article Content

R. Poorvadevi
S.Keerthana

Abstract

In the current era of cloud computing, distinct enterprise information technology (IT) and business decision-makers analyze the security implications of cloud computing to benefit and improve business agility. Cloud computing has been playing a major role in various multidisciplinary domains, with recent surveys indicating that 70% of research issues focus on cloud security. Despite providing a vast array of services to users, cloud computing still faces challenges in eradicating client-end security problems. Therefore, there is a significant focus on improving and finding solutions for cloud security, particularly in understanding potential risks at the customer end. Several large cloud vendors have implemented security mechanisms primarily to protect the cloud infrastructure from insider threats and advanced persistent threats. To address these concerns, a proposed model aims to provide guaranteed cloud services in an attack-free manner to web clients. This will be achieved through a client-level guaranteed security system defensive approach. The mechanism will focus on protecting user authentication procedures, security policies, and employing a security layered approach in client-level transactions. The proposed work will be simulated using the cloud sim tool, enabling end-users to obtain a better security solution in the public cloud environment.

Article Details

How to Cite
[1]
R. Poorvadevi and S.Keerthana, “An Enforcement of Guaranteed Client Level Defensive Mechanism in Public Cloud Services”, Int. J. Comput. Eng. Res. Trends, vol. 4, no. 2, pp. 20–24, Mar. 2017.
Section
Research Articles

References

Jang, M., Yoon, M., & Chang, J. (2014). A Privacy-aware query authentication index for database outsourcing. IEEE Conference Publications.

Lu, W., Varna, A. L., & Wu, M. (2014). Confidentiality-Preserving Image Search: A Comparative Study between Homomorphic Encryption and Distance-Preserving Randomization. IEEE Transactions on Volume 2.

Velciu, M.-A., Patrascu, A., & Patriciu, V.-V. (2014). Bio-cryptographic authentication in cloud storage sharing. In Applied Computational Intelligence and Informatics (SACI), 2014 IEEE 9th International Symposium.

Poornima, B., & Rajendran, T. (2014). Improving Cloud Security by Enhanced HASBE Using Hybrid Encryption Scheme. In Computing and Communication Technologies (WCCCT), 2014 World Congress on March-14.

Durrani, A. (2014). Analysis and prevention of vulnerabilities in cloud applications. In Information Assurance and Cyber Security (CIACS), 2014 IEEE Conference.

Liu, C., & more authors. (2014). Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates Parallel and Distributed Systems. IEEE Transactions on Cloud Computing.

Hussain, M. (2014). Effective Third Party Auditing in Cloud Computing. In Advanced Information Networking and Applications Workshops (WAINA), 28th International Conference on 13-16 May 2014.

Saxena, V., et al. (Year). Implementation of a secure genome sequence search platform on a public cloud leveraging open source solutions. Journal of Cloud Computing.