CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

An Efficient Security Model in Cloud Computing based on Soft computing Techniques

by Vijay.g.r, A. Rama Mohan Reddy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 60 - Number 14
Year of Publication: 2012
Authors: Vijay.g.r, A. Rama Mohan Reddy
10.5120/9760-3219

Vijay.g.r, A. Rama Mohan Reddy . An Efficient Security Model in Cloud Computing based on Soft computing Techniques. International Journal of Computer Applications. 60, 14 ( December 2012), 18-23. DOI=10.5120/9760-3219

@article{ 10.5120/9760-3219,
author = { Vijay.g.r, A. Rama Mohan Reddy },
title = { An Efficient Security Model in Cloud Computing based on Soft computing Techniques },
journal = { International Journal of Computer Applications },
issue_date = { December 2012 },
volume = { 60 },
number = { 14 },
month = { December },
year = { 2012 },
issn = { 0975-8887 },
pages = { 18-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume60/number14/9760-3219/ },
doi = { 10.5120/9760-3219 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:06:35.910177+05:30
%A Vijay.g.r
%A A. Rama Mohan Reddy
%T An Efficient Security Model in Cloud Computing based on Soft computing Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 60
%N 14
%P 18-23
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In recent years, Cloud computing is one of the most attractive technological research area because of its flexibility as well as cost efficiency. Generally in a cloud the data are transferred among the client and the server. While the transferring of the data takes place, security becomes the major concern. Efficient security system must be employed in a cloud inorder to make the computing environment secure from unauthenticated users. Due to this reason, cloud securities have emerged as the recent discussion in the IT sector. Various techniques have been formulated inorder to make the cloud computing environment secure. In this paper, we presented an efficient security model in cloud computing environment with the help of Soft Computing Techniques. Here, a strong security in cloud computing is managed with the help of reputation management system to ensure the data security. Also maintaining the transaction table that contains the information related to the previous transactions like the previous transaction id of the cloud node involved, timestamp, public keys of the cloud involved, trust evaluation etc, can be very helpful to identify the relevant cloud nodes suitable of data transmission. Soft Computing Techniques utilizes fuzzy logic, neural network or genetic algorithm for processing. In the proposed method, we utilized genetic algorithm as the computing technique to identify the suitable nodes for transmission.

References
  1. A. Mell and T. Grance. "The NIST definition of cloud computing". [Online]. Available:csrc. nist. gov/groups/SNS/cloudcomputing/ cloud-def-v15. doc ,2009.
  2. S. Subashini and V. Kavitha. (2010) "A Survey on Security issues in Service delivery Models of cloud computing" Journal of Network and Computer Applications (JNCA), Vol. 34, No. 1, Jul, 2010
  3. Chang-Lung Tsai and Uei-Chin Li, "Information Security of Cloud Computing for Enterprises", Advances on Information Sciences and Service Sciences. (AISSS), Vol. 3, No. 1, pp. 132-142, Feb 2011
  4. Danish Jamil, Hassan Zaki, "Security Issues In Cloud Computing And Countermeasures", International Journal of Engineering Science and Technology (IJEST), Vol. 3 No. 4, pp. 2672-2676, April 2011
  5. V. Krishna Reddy, B. Thirumala Rao, Dr. L. S. S. Reddy and P. Sai Kiran, "Research Issues in Cloud Computing", Global Journal of Computer Science and Technology (GJCST) Vol. 11, No. 11, pp. 59-64,July 2011
  6. Krishna Chaitanya. Y, Bhavani Shankar. Y, Kali Rama Krishna. V and V Srinivasa Rao, "Study of Security Issues in Cloud Computing", International Journal of Computer Science and Technology(IJCST) Vol. 2, No. 3, Sept 2011
  7. Aderemi A. Atayero, Oluwaseyi Feyisetan , "Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption", Journal of Emerging Trends in Computing and Information Sciences, (JETCIS). Vol. 2, No. 10, October 2011
  8. Kuyoro S. O, Ibikunle. F and Awodele O, "Cloud Computing Security Issues and Challenges" International Journal of Computer Networks (IJCN)", Vol. 3, No. 5, pp. 247-255, December 2011
  9. Seccombe A, Hutton A, Meisel A, Windel A, Mohammed A, Licciardi A, et al. Security guidance for critical areas of focus incloudcomputing,v2. 1. CloudSecurityAlliance, 2009, 25 p.
  10. Viega J. ,"Cloud computing and the common man", Computer, pp. 42, No. 8, pp. 106–108,2009
  11. Bo Peng, Bin Cui and Xiaoming Li, "Implementation Issues of A Cloud Computing Platform", IEEE Computer Society Technical Committee on Data Engineering, pp. 1-8, 2009
  12. Parkhill, D. The Challenge of the Computer Utility. Addison-Wesley Educational Publishers Inc. , US, 1966.
  13. Kevin Hamlen, Murat Kantarcioglu, Latifur Khan and Bhavani Thuraisingham, "Security Issues for cloud computing", International Journal of Information Security and Privacy, Vol. 4, No. 2, pp. 39-51, April-June 2010
  14. G. Fowler, B. Worthen, The Internet Industry is on a Cloud – Whatever That May Mean, The Wall Street Journal, March 26, 2009
  15. Wayne A. Jansen, "Cloud Hooks: Security and Privacy Issues in Cloud Computing", Proceedings of the 44th Hawaii International Conference on System Sciences, pp. 1-10, Jan 2011
  16. Peter Mell, and Tim Grance, "The NIST Definition of Cloud Computing," 2010.
  17. http://www. wheresmyserver. co. nz/storage/media/faq-files/clouddef-v15. pdf, Accessed April 2010
  18. A Platform Computing Whitepaper, "Enterprise Cloud Computing: Transforming IT," Platform Computing, pp6, viewed 13 March 2010.
  19. Meiko Jensen J ,org Schwenk,Nils Gruschka, Luigi Lo Iacono,"On Technical Security Issues in Cloud Computing,"IEEE International Conference on Cloud Computing,pp. 109-116,2009.
  20. Ramgovind S,Eloff M M,Smith E, "The management of security in Cloud computing," Information Security for South Africa,pp. 1-7,2010.
  21. Dai Yuefa, Wu Bo, Gu Yaqiang, Zhang Quan, Tang Chaojing, "Data Security Model for Cloud Computing," Proceedings of the 2009 International Workshop on Information Security and Application, 2009.
  22. Kaufman L M,"Data Security in the World of Cloud Computing,"IEEE Security & Privacy, vol. 7, no. 4, pp. 61-64, 2009.
  23. Kevin Hamlen, Murat Kantarcioglu, Latifur Khan, Bhavani Thuraisingham "Security Issues for Cloud Computing," International Journal of Information Security and Privacy, vol. 4, no. 2, pp. 39-51, 2010.
  24. Mihai Christodorescu, Reiner Sailer, Douglas Lee Schales,Daniele Sgandurra, Diego Zamboni, "Cloud Security Is Not (Just) Virtualization Security," Proceeding CCSW '09 Proceedings of the 2009 ACM workshop on Cloud computing security, pp. 97-102,2009.
  25. Chung Il Sun and Tae Ho Cho ,"Path Selection Method for Reliable Data Transmission in Sensor Networks using GA", International Journal of Computer Science and Network Security, (IJCSNS) Vol. 11 No. 2, Feb, 2011.
  26. Ehsan Heidari and Ali Movaghar ,"An Efficient Method Based on Genetic Algorithms to Solve Sensor Network Optimization Problem", International journal on applications of graph theory in wireless ad hoc networks and sensor networks (GRAPH-HOC) Vol. 3, No. 1, Mar, 2011.
  27. Aloysius George, B. R. Rajakumar and D. Binu, "Genetic algorithm based airlines booking terminal open/close decision system", In proceedings of the International Conference on Advances in Computing, Communications and Informatics, pages 174-179, 2012.
  28. Sheikh Mahbub Habib, Sebastian Riesy, Max Muhlhauser ,"Towards a Trust Management System for Cloud Computing", In. proc. of IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Security Issues