A Secure Cloud Computing Architecture Design

The high costs of network platforms, growth in customer requirements, data volumes and pressures on response time pushed companies to migrate to Cloud Computing providing on demand internet hosted IT services. Cloud computing is based essentially on platforms and servers virtualization and promises the reduction of costs and the increase of flexibility. However, there are still some challenges to be solved. Amongst these are security and trust issues, since the user's data has to be released to the Cloud and thus leaves the protection-sphere of the data owner. In this paper, we propose a cloud computing architecture offering the ease of resources management, access security and service availability in a reliable structure with lower cost.

[1]  Artem Volokyta,et al.  Security risk analysis for cloud computing systems , 2011, IDAACS.

[2]  Abhinav Mishra,et al.  Cloud computing security considerations , 2011, 2011 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC).

[3]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[4]  Farzad Sabahi,et al.  Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[5]  G. H. Raisoni,et al.  Securing Cloud Computing Environment by means of Intrusion Detection and Prevention System (IDPS) , 2013 .

[6]  Paul T. Jaeger,et al.  Weathering the Storm: The Policy Implications of Cloud Computing , 2009 .

[7]  Eduardo B. Fernández,et al.  An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.

[8]  Kashif Munir,et al.  FRAMEWORK FOR SECURE CLOUD COMPUTING , 2013, CloudCom 2013.

[9]  Eystein Mathisen,et al.  Security challenges and solutions in cloud computing , 2011, 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011).

[10]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[11]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[12]  Kashif Munir,et al.  SECURE CLOUD ARCHITECTURE , 2013 .

[13]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[14]  Ahmed E. Youssef,et al.  A Framework for A Framework for A Framework for A Framework for SSSSeeeeccccure Cloud ure Cloud ure Cloud ure Cloud ComputingComputingComputingComputing , 2012 .

[15]  David Teneyuca Internet cloud security: The illusion of inclusion , 2011, Inf. Secur. Tech. Rep..

[16]  Siani Pearson,et al.  A client-based privacy manager for cloud computing , 2009, COMSWARE '09.