A novel privacy and security framework for the cloud network services

This paper presents an overview of security and it's issues in cloud computing. Nowadays cloud computing has tremendous usage in so many fields such as financial management, communications and collaboration, office productivity suits, accounting applications, customer relationship management, online storage management, human resource and employment. Owing to increase in use of these services by companies, several security issues have emerged and this challenges cloud computing architectures to secure, protect and process user's data. These services have certain cons like security, lock-in, lack of control, and reliability. Privacy and security are the major concerns in cloud computing services. In this paper, we have designed a novel secure framework for cloud services, as well as presented a critical analysis of CCMP (Counter with Cipher Block Message Authentication Code Protocol) protocol for secure data management of cloud services.

[1]  M. Razvi Doomun,et al.  AES CCMP Algorithm with N-Way Interleaved Cipher Block Chaining , 2012, ArXiv.

[2]  Dhananjay Singh Developing an architecture: Scalability, mobility, control, and isolation on future internet services , 2013, 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[3]  Jin Tong,et al.  NIST cloud computing standards roadmap :: version 1.0 , 2011 .

[4]  Dhananjay Singh,et al.  Critical analysis of counter mode with cipher block chain message authentication mode protocol - CCMP , 2014, Secur. Commun. Networks.

[5]  Rajkumar Buyya,et al.  A data-centric framework for development and deployment of Internet of Things applications in clouds , 2015, 2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).

[6]  William J. Caelli,et al.  Mutual Protection in a Cloud Computing Environment , 2010, 2010 IEEE 12th International Conference on High Performance Computing and Communications (HPCC).

[7]  C. Yeun,et al.  Cloud computing security management , 2010, 2010 Second International Conference on Engineering System Management and Applications.

[8]  Ravin Ahuja,et al.  SLA Based Scheduler for Cloud for Storage & Computational Services , 2011, 2011 International Conference on Computational Science and Its Applications.

[9]  Mihir Bellare,et al.  EAX: A Conventional Authenticated-Encryption Mode , 2003, IACR Cryptol. ePrint Arch..