A review of security models in cloud computing and an Innovative approach

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-30 Number-2
Year of Publication : 2015
Authors : Dr. Amit Chaturvedi, Sajad Ahmad Zarger
DOI :  10.14445/22312803/IJCTT-V30P115

MLA

Dr. Amit Chaturvedi, Sajad Ahmad Zarger "A review of security models in cloud computing and an Innovative approach". International Journal of Computer Trends and Technology (IJCTT) V30(2):87-92, December 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Cloud computing is introducing many huge changes to world of computing and working pattern recently for its multitudinous benefits. However, the security of cloud computing is always the focus of numerous potential cloud customers, and a big barrier for its widespread applications. Actually data security is the main concern. Because of diversity in service models proposed for cloud computing, providing acceptable level of security is main concern. In this paper, we have surveyed several security models and proposed a data security model for cloud computing based on separation of security in different category layers. The proposed model certifies that our method can improve security levels in service oriented systems, especially in cloud computing applications.

References
[1] Takabi H, Joshi J B D, Ahn G. Security a nd privacy challenges in cloud computing environments. IEEE Security & Privacy;2010;
[2] Monjur Ahmed1 and Mohammad Ashraf HossainCloud computing and security issues in cloud computing in 2014International Journal of Network Security & Its Applications (IJNSA) 2014
[3] Top threats to cloud computing prepared by security alliance 2010 http://www. cloudsecurityalliance.org/ topthreats
[4] Agarwal, A. and Agarwal, A. . The Security Risks Associated with Cloud Computing, International Journal of Computer Applications in Engineering Sciences,2011
[5] VMware. Inc. Understanding full virtualization, Para virtualization and hardware assist. Technical report, VMware, 2007.www.elsevier.com
[6] Patrick Nicolas, ”Multi tenant deployment model for SaaS”, White paper , 2006.
[7] Yichuan Zhang, Bin Zhang, Ying Liu, “A Method of SaaS Multi-Tenant Model Recommendation Based on Graph Matching”.
[8] S. Subashini n, V.Kavitha A survey on security issues in service delivery models of cloud computing 2010 Journal of Network and Computer Applications
[9] . Jansen W, GranceT Guidelines on Security and privacy in public Cloud Computing. NIST, Special Publication 800– 144, Gaithersburg, MD 2011
[10] Varia, J., Mathew, S..Overview of amazon web services. http://aws.amazon.com/ whitepapers; 2013
[11]Agarwal, A. and Agarwal, A. (2011). The Security Risks Associated with Cloud Computing, International Journal of Computer Applications in Engineering Sciences, 1 (Special Issue on CNS),
[12] jerichoforum Cloud cube model v.1 2009 http://www.opengroup.org/jericho/publications.htm, ww.jerichoforum.org
[13] Security guidance for critical areas of focus in cloud computing v2.1 by cloud security alliance 2009
[14] Heiser J. What you need to know about cloud computing security and compliance, Gartner, Research, ID Number:G00168345, 2009.
[15] JianhuaChea*, YaminDuanb, Tao Zhanga, JieFanaStudy on security models and strategies of cloud computing 2011 www.elesevier.com
[16] Wayne J. Brown, Vince Anderson, Qing Tan “Multitenancy - Security Risks and Countermeasures”, 2012 15th International Conference on Network-Based Information Systems, IEEE

Keywords
Data security, Cloud computing, cloud service, cloud security, SSL, TSL, security model..