Research on System Architecture to Provide Maximum Security, End User Device Independency and User Centric Control over Content in Cloud

Cloud computing is the emerging technology providing IT as a utility through internet. The benefits of cloud computing are but not limited to service based, scalable, elastic, shared pool of resources, metered by use. Due to mentioned benefits the concept of cloud computing fits very well with the concept of m-learning which differs from other forms of e-learning, covers a wide range of possibilities opened up by the convergence of new mobile technologies, wireless communication structure and distance learning development. The concept of cloud computing like any other concept has not only benefits but also introduces myriad of security issues, such as transparency between cloud user and provider, lack of standards, security concerns related to identity, Service Level Agreements (SLA) inadequacy etc. Providing secure, transparent, and reliable services in cloud computing environment is an important issue. This paper introduces a secured three layered architecture with an advance Intrusion Detection System (advIDS), which overcomes different vulnerabilities on cloud deployed applications. This proposed architecture can reduce the impact of different attacks by providing timely alerts, rejecting the unauthorized access over services, and recording the new threat profiles for future verification. The goal of this research is to provide more control over data and applications to the cloud user, which are now mainly controlled by Cloud Service Provider (CSP). Research on System Architecture to Provide Maximum Security, End User Device Independency and User Centric Control over Content in Cloud

[1]  Dan Curticapean,et al.  Learning in the cloud: a new challenge for a global teaching system in optics and photonics , 2014 .

[2]  Cong Wang,et al.  Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.

[3]  Sai Manoj Marepalli,et al.  THE CHALLENGES OF COLLABORATIVE LEARNING IN CLOUD AND A THREE LAYERED ARCHITECTURE TOWARDS THE SOLUTION , 2013, DICTAP 2013.

[4]  Bharat K. Bhargava,et al.  An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing , 2010, 2010 29th IEEE Symposium on Reliable Distributed Systems.

[5]  Robert C. Daley,et al.  An experimental time-sharing system , 1962, AIEE-IRE '62 (Spring).

[6]  Hassan Takabi,et al.  Policy Management as a Service: An Approach to Manage Policy Heterogeneity in Cloud Computing Environment , 2012, 2012 45th Hawaii International Conference on System Sciences.

[7]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[8]  Marios D. Dikaiakos,et al.  Cloud Computing: Distributed Internet Computing for IT and Scientific Research , 2009, IEEE Internet Computing.

[9]  Chun-Jung Chen,et al.  Information security issue of enterprises adopting the application of cloud computing , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.

[10]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[11]  Eui-nam Huh,et al.  A Collaborative Intrusion Detection System Framework for Cloud Computing , 2011, ICITCS.

[12]  Daniel Minoli,et al.  Information Security Risk Management , 2009 .

[13]  Christoph Meinel,et al.  Intrusion Detection in the Cloud , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[14]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[15]  Christopher Strachey,et al.  Time sharing in large, fast computers , 1959, IFIP Congress.

[16]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.