CFP last date
22 April 2024
Reseach Article

Enterprise Cloud Storage and Computation Security

by Rajeev Yadav, Shreya Sharma, Avinash Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 11
Year of Publication: 2015
Authors: Rajeev Yadav, Shreya Sharma, Avinash Sharma
10.5120/ijca2015907115

Rajeev Yadav, Shreya Sharma, Avinash Sharma . Enterprise Cloud Storage and Computation Security. International Journal of Computer Applications. 130, 11 ( November 2015), 11-15. DOI=10.5120/ijca2015907115

@article{ 10.5120/ijca2015907115,
author = { Rajeev Yadav, Shreya Sharma, Avinash Sharma },
title = { Enterprise Cloud Storage and Computation Security },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 11 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 11-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number11/23252-2015907115/ },
doi = { 10.5120/ijca2015907115 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:25:06.052318+05:30
%A Rajeev Yadav
%A Shreya Sharma
%A Avinash Sharma
%T Enterprise Cloud Storage and Computation Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 11
%P 11-15
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing acts as a computing paradigm that aims to provide huge amount of computing in a fully virtualized manner by aggregating resources and thus offering a single system view. Cloud Computing is also delivered as utility assuring customized and quality of service guaranteed computation environments for cloud users. While an enterprise organization is composed of different departments like finance, admin etc these departments are segregated as sub network zone which are thus interconnected via network. Securities are essential for authorization of storage and computing. In this paper we have proposed a privacy cheating discouragement and computation auditing approach that bridging secure storage and computation auditing in cloud. Privacy cheating discouragement is designated by verifier signature, batch verification and probabilistic sampling techniques.

References
  1. Y. Bartal, A. Mayer, K. Nissim, and A. Wool, ―Firmato: a novel firewall management toolkit," ACM Trans. Comput. Syst., vol. 22, no. 4, pp. 381-420, Nov. 2004.
  2. E. S. Al-Shaer and H. H. Hammed, ―Discovery of policy anomalies in distributed firewalls," in Proc. IEEE INFOCOM’04, pp. 2605-2626,Hong Kong, China, Mar. 2004.
  3. T. E. Uribe and S. Cheung, ―Automatic analysis of firewall and network intrusion detection system configurations," in Proc. ACM WorkshopFormal Methods Security Eng., pp. 66-71, Washington, DC, USA, Oct.2004.
  4. E. S. Al-shaer and H. H. Hamed, ―Firewall policy advisor for anomaly discovery and rule editing," in Proc. IFIP/IEEE 8th International Symp.Integrated Netw. Management, pp. 17-30, Colorado Springs, USA, Mar.2003.
  5. L. Yuan, J. Mai, Z. Su, H. Chen, C. Chuah, and P. Mohapatra,FIREMAN: a toolkit for firewall modeling and analysis," in 27th IEEE Symp. Security Privacy, Oakland, CA, USA, May 2006.
  6. A. X. Liu and M. G. Gouda, ―Complete redundancy detection in firewalls," in Proc. 19th Annual IFIP Conf. Data Applications Security,pp. 196-209, Aug. 2005.
  7. High level firewall language." [Online]. Available: http://www.hlfl.org/.Accessed on Apr. 2009.
  8. B. Zhang, E. S. Al-Shaer, R. Jagadeesan, J. Riely, and C. Pitcher,―Specifications of a high-level conflict-free firewall policy language for multi-domain networks," in Proc. 12th ACM Symp. Access Control Models Technologies (SACMAT 2007), pp. 185-194, France, June 2007.
  9. CISCO: Configuring IP access lists," CISCO White Papers 23602 edition, July 2007.
  10. Configuring ACL in Huawei switches," Huawei 3 Com Switch 4500G Release Notes, pp. 1-28, Feb. 2009.
  11. Alcatel-OS-LS-6200 User Guide," Part No. 060202-10, pp. 1-762, June 2007.
  12. J. D. Guttman and A. L. Herzog, ―Rigorous automated network security management," International J. Inf. Security, vol. 4, no. 2, pp. 29-48, 2005.
  13. Y. S. Mahajan, Z. Fu, and S. Malik, ―Zchaff 2004: an efficient SAT solver," in Proc. 8th International Conf. Theory Application Satisfiability Testing, pp. 360-375, Scotland, June 2005.
  14. C. C. Zhang, M. Winslet, and C. A. Gunter, ―On the safety and efficiency of firewall policy deployment," in 28th IEEE Symp. Security Privacy, pp. 33-50, Oakland, CA, USA, May 2007.
  15. P. Matousek, J. Rab, O. Rysavy, and M. Sveda, ―A formal model for network-wide security analysis," in Proc. 15th IEEE International Conf. Workshop ECBS, Belfast, Ireland, 2008.
  16. T. Hofmeister, U. Schoning, R. Schuler, and O. Watanabe, ―A probabilistic 3-SAT algorithm further improved," in Proc. 19th Annual
  17. Symp. Theoretical Aspects Computer Science (SATACS), pp. 192-202, 2002.
  18. O. Dubois, P. Andre, Y. Boufkhad, and J. Carlier, SAT Versus UNSAT,Second DIMACS Challenge, D. S. Johnson and M. A. Trick, editors,1993.
  19. L. Zhang and S. Malik, ―Towards symmetric treatment of conflicts and satisfaction in quantified Boolean satisfiability," in Proc. 8th International Conf. Principles Practice Constraint Programming (CP 2002), pp. 200-215, 2002.
  20. S. Matsumoto and A. Bouhoula, ―Automatic verification of firewall configuration with respect to security policy requirements," in Proc.International Workshop Computational Intelligence Security Inf. Syst.(CISIS’08), pp. 123-130, Barcelona, Spain, Oct. 2008.
  21. D. Gabby, Ch. Hogger, and J. Robinson, editors, ―Temporal Logic,"Handbook of Logic in AI and Logic Programming, vol. 4. Oxford University Press, 1995.
  22. Y. Venema, ―A modal logic for quantification and substitution," L. Csirmaz, D. Gabby and M. de Rijke, editors, Logic Colloquium 92, Veszprem, Hungary, Studies in Logic, Languages and Information. CSLI Publications, Stanford, pp. 293-309, 1995.
  23. P. Bera, P. Dasgupta, and S. K. Ghosh, ―A verification framework for analyzing security implementations in an enterprise LAN," in Proc. IEEE International Advance Computing Conf. (IACC 09), pp 1008-1015, Mar. 2009.
  24. S. K. Ghosh, ―Analyzing security policy implementations in enterprise networks–a formal approach," in Indo-US Conf. Workshop Cyber Security, Cyber Crime Cyber Forensic (ICSCF 2009), invited position paper, Kochi, India, July 2009.
  25. P. Bera, P. Dasgupta, and S. K. Ghosh, ―Formal analysis of security policy implementations in enterprise networks," International J. Computer Netw. Commun., vol. 2009, no. 2, pp 56-73, June 2009.
  26. M. Ahmed, H. Yanikomeroglu, and S. Mahmoud, ―Call admission control in wireless communications:a comprehensive survey,‖to be submitted to IEEE Wireless CommunicationsMagazine.
  27. M. Andrews, K. Kumaran, K. Ramanan, A. Stolyar, P. Whiting, and R. Vijayakumar, ―Providing quality of service over a shared wireless link,‖ IEEE Communications Magazine, vol. 39,no. 2, pp. 150–154, Feb. 2001.
  28. A. Eleftheriadis and D. Anastassiou, ―Meeting arbitrary QoS constraints using dynamic rate shaping of coded digital video,‖ in Proc. IEEE Int. Workshop on Network and Operating System Support for Digital Audio and Video (NOSSDAV’95), pp. 95–106, April 1995.
  29. R. Guerin and V. Peris, ―Quality-of-service in packet networks: basic mechanisms and directions,‖Computer Networks and ISDN, vol. 31, no. 3, pp. 169–179, Feb. 1999.
  30. A. Sadeghi, T. Schneider, M. Winandy, Token-based cloud computing: Secure outsourcing of data and arbitrary computations with lower latency, in: Trust and Trustworthy Computing, Berlin, Germany, June 21–23, 2010.
  31. H. Takabi, J. Joshi, G. Ahn, Security and privacy challenges in cloud computing environments, IEEE Security & Privacy 8 (6) (2010) 24–31.
  32. C. Wang, K. Ren, J. Wang, Secure and practical outsourcing of linear programming in cloud computing, in: 30th IEEE Conference on Computer Communications (INFOCOM 2011), Shanghai, China, April 11–15, 2011.
  33. C. Wang, Q. Wang, K. Ren, W. Lou, Privacy-preserving public auditing for data storage security in cloud computing, in: 29th IEEE Conference on Computer Communications (INFOCOM’10), San Diego, California, USA, March 14–19, 2010.
  34. Q. Wang, C. Wang, J. Li, K. Ren, W. Lou, Enabling public verifiability and data dynamics for storage security in cloud computing, in: 14th European Symposium on Research in Computer Security (ESORICS’09), Saint Malo, France, September 21–23, 2009.
  35. L. Wei, H. Zhu, Z. Cao, W. Jia, A. Vasilakos, Seccloud: bridging secure storage and computation in cloud, in: 30th International Conference on Distributed Computing Systems Workshops (IEEE ICDCSW 2010), Genova, Italy, June 21–25, 2010.
  36. T. Yuen, W. Susilo, Y. Mu, How to construct identity-based signatures without the key escrow problem, International Journal of Information Security 9 (4) (2010) 297–311.
  37. J. Zhang, J. Mao, A novel ID-based designated verifier signature scheme, Information Sciences 178 (3) (2008) 766–773.
Index Terms

Computer Science
Information Sciences

Keywords

Secure computation auditing Secure storage Privacy-cheating discouragement Designated verifier signature Batch verification Cloud computing.