Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Conceptual Security Framework based on Cloud Computing Services for Spatial Database

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Mazloh Al-Enazi, Saleh Mesbah, Amani Anwar

Mazloh Al-Enazi, Saleh Mesbah and Amani Anwar. Conceptual Security Framework based on Cloud Computing Services for Spatial Database. International Journal of Computer Applications 161(1):1-4, March 2017. BibTeX

	author = {Mazloh Al-Enazi and Saleh Mesbah and Amani Anwar},
	title = {Conceptual Security Framework based on Cloud Computing Services for Spatial Database},
	journal = {International Journal of Computer Applications},
	issue_date = {March 2017},
	volume = {161},
	number = {1},
	month = {Mar},
	year = {2017},
	issn = {0975-8887},
	pages = {1-4},
	numpages = {4},
	url = {},
	doi = {10.5120/ijca2017911599},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Cloud Computing is a point of attraction and got a lot of attention because of the numerous abilities it offers. On the other hand spatial-data is vital and considered to be a global important aspect. The security challenges it poses online is significant. The cloud computing security solution is used to avoid all the risks or the potential vulnerabilities being introduced by the computer industry. Solution is moving data to the cloud, while it is imperative for cloud service providers guarantying the security of geo-spatial-data information, providing cloud service users the terms and conditions of services provided by the cloud service providers and trusting them with their data. Although many different security solutions are provided to secure the data within the enterprise, the cloud solution is becoming vital for many other reasons too. The paper proposes a conceptual spatial data based on cloud infrastructure and applied security methods framework, which is capable of achieving user authentication and authorization.


  1. Liu, C.Y. (2013) Research and Practice on Key Technologies of Electronic Chart Cloud Service, PLA Information Engineering University, Zhengzhou, Henan, China.
  2. Liu, Y., Guo, W., Jiang, W. S., & Gong, J. Y. (2009) Research of remote sensing service based on cloud computing mode. Application Research of Computers 26(9), pp 3428-3431.
  3. Rezgui, A., Malik, Z., & Yang, C. (2013) High-resolution spatial interpolation on cloud platforms. In Proceedings of the 28th Annual ACM Symposium on Applied Computing, pp 377-382.
  4. Fay Chang, Jeffrey Dean, Sanjay Ghemawat et al. BigTable: a distributed storage system for structured data [A]. Operating Systems Design and Implementation, 2006.
  5. Blower, J. D. (2010) GIS in the cloud: implementing a Web Map Service on Google App Engine. In Proceedings of the 1st International Conference and Exhibition on Computing for Geospatial Research & Application, ACM, p 34.
  6. Siládi, V., Huraj, L., Polčák, N., &Vesel, E. (2012) A parallel processing of spatial data interpolation on computing cloud.In Proceedings of the Fifth Balkan Conference in Informatics, ACM, pp 193-198.
  7. Ali, A.,Irum, S.,Kausar, F., Khan, F.A. A cluster-based key agreement scheme using keyed hashing for Body Area Networks.Multimedia Tools and Applications vol. 66, pp.201–214, 2013.
  8. Ali, A., Khan, F.A. Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications. EURASIP Journal on Wireless Communications and Networking, vol. 2013, no. 1, pp. 216, 2013.


Spatial database, security, Cloud, Computing