Role of Security Mechanisms in the Building Blocks of the Cloud Infrastructure

This chapter describes how security plays a vital role in cloud computing, as the name itself specifies the data can be stored from any place and can be owned by anyone. Even though the cloud offers many benefits such as flexibility, scalability and agility, security issues are still backlog the cloud infrastructure. Much research is being done on cloud security equal to the scheduling problems in the cloud environment. The customers under the cloud providers are very concerned about their data, which has been stored in the cloud environment. In this regard, it is essential for a cloud provider to implement some powerful tools for security, to provide a secure cloud infrastructure to the customers. Generally speaking, there are some foundational needs to be attained and some actions to be combined to ensure data security in both cloud, as well as, non-cloud infrastructure. This book chapter concentrates only on the security issues, security measures, security mechanisms, and security tools of the cloud environment. Role of Security Mechanisms in the Building Blocks of the Cloud Infrastructure

[1]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[2]  Stuart Harvey Rubin,et al.  Distributed denial of service attacks , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[3]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[4]  Muthu Ramachandran,et al.  Cloud Computing Adoption Framework – a security framework for business clouds , 2015 .

[5]  Sergio Ledesma,et al.  Practical Considerations for Simulated Annealing Implementation , 2008 .

[6]  A. B. M. Shawkat Ali,et al.  A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing , 2012, Future Gener. Comput. Syst..

[7]  Don Coppersmith,et al.  The Data Encryption Standard (DES) and its strength against attacks , 1994, IBM J. Res. Dev..

[8]  Yun Wang,et al.  Cloud Security: Services, Risks, and a Case Study on Amazon Cloud Services , 2014 .

[9]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[10]  Amandeep Saini,et al.  Security Mechanisms at different Levels in Cloud Infrastructure , 2014 .

[11]  Ronald L. Krutz,et al.  Cloud Security: A Comprehensive Guide to Secure Cloud Computing , 2010 .

[12]  M. Kowsigan,et al.  Efficient Scheduling in Computational Grid with an Improved Ant Colony Algorithm , 2011 .

[13]  P. Balasubramanie,et al.  An Improved Job Scheduling in Cloud Environment using Auto-Associative-Memory Network , 2016 .

[14]  Lawrence A. Gordon,et al.  The economics of information security investment , 2002, TSEC.

[15]  Hong Zhao,et al.  Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[16]  M. Kowsigan,et al.  An Enhanced Job Scheduling in Cloud Environment Using Probability Distribution , 2017 .

[17]  Robert Hawley,et al.  File System Security: Secure Network Data Sharing for NT and Unix , 1998, LISA-NT.

[18]  Siani Pearson,et al.  Privacy, Security and Trust Issues Arising from Cloud Computing , 2010, 2010 IEEE Second International Conference on Cloud Computing Technology and Science.

[19]  Hellen Adams,et al.  Patent and Trademark Office , 2017 .

[20]  M. Kowsigan,et al.  An Enhanced Job Scheduling in Cloud Environment using Improved Metaheuristic Approach , 2017 .

[21]  David Clark,et al.  Quantitative Analysis of the Leakage of Confidential Data , 2002, QAPL.

[22]  T. S. Raghu,et al.  The Information Assurance Practices of Cloud Computing Vendors , 2010, IT Professional.

[23]  Balachandra Reddy Kandukuri,et al.  Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.

[24]  Y. C. Gangadharaiah Synthesis and Characterization of Cadmium Substituted Copper Nano – Ferrites , 2017 .

[25]  V. K. Agrawal,et al.  Multi-level authentication technique for accessing cloud services , 2012, 2012 International Conference on Computing, Communication and Applications.

[26]  M. Kowsigan Data Security and Data Dissemination of Distributed Data in Wireless Sensor Networks , 2017 .