CFP last date
20 May 2024
Reseach Article

A Novel Approach for Handling Security in Cloud Computing Services

by Sahar Mohammed Abduljalil, Osman Hegazy, Ehab E. Hassanein
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 69 - Number 5
Year of Publication: 2013
Authors: Sahar Mohammed Abduljalil, Osman Hegazy, Ehab E. Hassanein
10.5120/11837-7562

Sahar Mohammed Abduljalil, Osman Hegazy, Ehab E. Hassanein . A Novel Approach for Handling Security in Cloud Computing Services. International Journal of Computer Applications. 69, 5 ( May 2013), 9-14. DOI=10.5120/11837-7562

@article{ 10.5120/11837-7562,
author = { Sahar Mohammed Abduljalil, Osman Hegazy, Ehab E. Hassanein },
title = { A Novel Approach for Handling Security in Cloud Computing Services },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 69 },
number = { 5 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 9-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume69/number5/11837-7562/ },
doi = { 10.5120/11837-7562 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:29:25.011305+05:30
%A Sahar Mohammed Abduljalil
%A Osman Hegazy
%A Ehab E. Hassanein
%T A Novel Approach for Handling Security in Cloud Computing Services
%J International Journal of Computer Applications
%@ 0975-8887
%V 69
%N 5
%P 9-14
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The rapid advances in cloud computing has introduced a variety of security issues; each requires certain skills and knowledge. While developing business services requires conducting analysis and design for the business activities that does not include common security functions for these services. Currently there is no framework existing from the logical level for securely orchestrating of cloud services in a heterogeneous environment. We are addressing in the paper a clear separation of concerns between the "business logic" and the "security logic" in order for any service implementing the proposed security service to be considered a high level secured service in terms of access and communication in order for it to be widely used and acceptable. A development model is proposed to write secured services without burdening the developer of continuously rewriting security routines.

References
  1. Deepa Krishnan, M. C. (2012). Cloud Security Management Suite- Security as a Service. IEEE .
  2. Mathisen, E. (2011). Security Challenges and Solutions in Cloud Computing. IEEE .
  3. Subashini, S. , & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications , 1-11.
  4. Rohit Bhadauria, R. C. (2011). A Survey on Security Issues in Cloud Computing. IEEE .
  5. Qaisar, S. , & Khawaja, K. F. (2012). Cloud Computing: Network/Security Threats And Countermeasures. Interdisciplinary Journal Od Contemporary Research in Business.
  6. Bernstein, D. , & Vij, D. (2010). Intercloud Security Considerations. IEEE International Conference on Cloud Computing Technology and Science .
  7. F. Lombardi, D. P. (2010). Transparent security for cloud. ACM Symposium on Applied Computing Sierre , 414--415.
  8. Ayesha Malik, M. M. ( 2012). Security Framework for Cloud Computing Environment: A Review. Journal of Emerging Trends in Computing and Information Sciences .
  9. Sameera Abdulrahman Almulla, C. Y. (2010). Cloud Computing Security Management. International Conference on the Engineering Systems Management and its application .
  10. Sanjeev Kumar Pippal, A. K. (2011). CTES based Secure approach for Authentication and Authorization of Resource and Service in Clouds. International Conference on Computer & Communication Technology .
  11. Talal H. Noor, Q. Z. (2011). Trust as a Service: A Framework for Trust Management in Cloud Environments. WISE'11 Proceedings , ACM , 314–321.
  12. Yashaswi Singh, F. K. (2011). A Secured Cost-effective Multi-Cloud Storage in Cloud Computing. IEEE INFOCOM .
  13. Ryan K L Ko, P. J. (2011). TrustCloud: A Framework for Accountability and Trust in Cloud Computing. IEEE World Congress on Services .
  14. Jean Bacon, D. E. (2010). Enforcing End-to-end Application Security in the Cloud. International Conference on Middleware, (pp. 293-312).
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Security Cloud services Identity Access Management Security Assertion Markup Language Java authentication authorization Service