CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Conceptual Security Framework based on Cloud Computing Services for Spatial Database

by Mazloh Al-Enazi, Saleh Mesbah, Amani Anwar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 161 - Number 1
Year of Publication: 2017
Authors: Mazloh Al-Enazi, Saleh Mesbah, Amani Anwar
10.5120/ijca2017911599

Mazloh Al-Enazi, Saleh Mesbah, Amani Anwar . Conceptual Security Framework based on Cloud Computing Services for Spatial Database. International Journal of Computer Applications. 161, 1 ( Mar 2017), 1-4. DOI=10.5120/ijca2017911599

@article{ 10.5120/ijca2017911599,
author = { Mazloh Al-Enazi, Saleh Mesbah, Amani Anwar },
title = { Conceptual Security Framework based on Cloud Computing Services for Spatial Database },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2017 },
volume = { 161 },
number = { 1 },
month = { Mar },
year = { 2017 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume161/number1/27109-2017911599/ },
doi = { 10.5120/ijca2017911599 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:06:32.157462+05:30
%A Mazloh Al-Enazi
%A Saleh Mesbah
%A Amani Anwar
%T Conceptual Security Framework based on Cloud Computing Services for Spatial Database
%J International Journal of Computer Applications
%@ 0975-8887
%V 161
%N 1
%P 1-4
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing is a point of attraction and got a lot of attention because of the numerous abilities it offers. On the other hand spatial-data is vital and considered to be a global important aspect. The security challenges it poses online is significant. The cloud computing security solution is used to avoid all the risks or the potential vulnerabilities being introduced by the computer industry. Solution is moving data to the cloud, while it is imperative for cloud service providers guarantying the security of geo-spatial-data information, providing cloud service users the terms and conditions of services provided by the cloud service providers and trusting them with their data. Although many different security solutions are provided to secure the data within the enterprise, the cloud solution is becoming vital for many other reasons too. The paper proposes a conceptual spatial data based on cloud infrastructure and applied security methods framework, which is capable of achieving user authentication and authorization.

References
  1. Liu, C.Y. (2013) Research and Practice on Key Technologies of Electronic Chart Cloud Service, PLA Information Engineering University, Zhengzhou, Henan, China.
  2. Liu, Y., Guo, W., Jiang, W. S., & Gong, J. Y. (2009) Research of remote sensing service based on cloud computing mode. Application Research of Computers 26(9), pp 3428-3431.
  3. Rezgui, A., Malik, Z., & Yang, C. (2013) High-resolution spatial interpolation on cloud platforms. In Proceedings of the 28th Annual ACM Symposium on Applied Computing, pp 377-382.
  4. Fay Chang, Jeffrey Dean, Sanjay Ghemawat et al. BigTable: a distributed storage system for structured data [A]. Operating Systems Design and Implementation, 2006.
  5. Blower, J. D. (2010) GIS in the cloud: implementing a Web Map Service on Google App Engine. In Proceedings of the 1st International Conference and Exhibition on Computing for Geospatial Research & Application, ACM, p 34.
  6. Siládi, V., Huraj, L., Polčák, N., &Vesel, E. (2012) A parallel processing of spatial data interpolation on computing cloud.In Proceedings of the Fifth Balkan Conference in Informatics, ACM, pp 193-198.
  7. Ali, A.,Irum, S.,Kausar, F., Khan, F.A. A cluster-based key agreement scheme using keyed hashing for Body Area Networks.Multimedia Tools and Applications vol. 66, pp.201–214, 2013.
  8. Ali, A., Khan, F.A. Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications. EURASIP Journal on Wireless Communications and Networking, vol. 2013, no. 1, pp. 216, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Spatial database security Cloud Computing