CFP last date
20 May 2024
Reseach Article

Secured Services in Cloud Computing Environment

by Sahar Mohammed Abduljalil, Osman Hegazy, Ehab E. Hassanein
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 88 - Number 1
Year of Publication: 2014
Authors: Sahar Mohammed Abduljalil, Osman Hegazy, Ehab E. Hassanein
10.5120/15320-3632

Sahar Mohammed Abduljalil, Osman Hegazy, Ehab E. Hassanein . Secured Services in Cloud Computing Environment. International Journal of Computer Applications. 88, 1 ( February 2014), 44-49. DOI=10.5120/15320-3632

@article{ 10.5120/15320-3632,
author = { Sahar Mohammed Abduljalil, Osman Hegazy, Ehab E. Hassanein },
title = { Secured Services in Cloud Computing Environment },
journal = { International Journal of Computer Applications },
issue_date = { February 2014 },
volume = { 88 },
number = { 1 },
month = { February },
year = { 2014 },
issn = { 0975-8887 },
pages = { 44-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume88/number1/15320-3632/ },
doi = { 10.5120/15320-3632 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:06:32.675881+05:30
%A Sahar Mohammed Abduljalil
%A Osman Hegazy
%A Ehab E. Hassanein
%T Secured Services in Cloud Computing Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 88
%N 1
%P 44-49
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Securing data is always of vital importance and because of the critical nature of cloud computing and large amounts of complex data it carries, the need is even important. Cryptographic algorithms are one of the most important areas in security. They are processes that protect data by making sure that unwanted people can't access it. Unfortunately, when the dataset size is huge, both memory use and computational cost can still be very expensive. In addition, single processor's memory and CPU resources are very limited, which make the algorithm performance inefficient. Security issues investigated in [1] requires that applications and services be capable of supporting a variety of security functionality such as authentications, authorization, and auditing and so on. Those mechanisms are likely to evolve over time because new mechanisms are developed and changed. So developer must avoid embedding security mechanisms statically and manually in order to adapt to changing requirements. The Cloud security service proposed casts those security functionalities in to a service. These strategy allows interfaces to be defined and permits an application to outsource security functionality from the cloud security service to fit it's current need. We are addressing in this paper a clear separation of concerns between the "business logic" and the "security logic" in order for any service implementing the proposed security service to be considered a high level secured service. This model is targeting developers willing to write secured services without burdening the developer of continuously rewriting security routines, and only be concerned with the business logic of the service, on the other hand it targets the end user that need to use the service as it is, and get the result or output.

References
  1. Sahar Mohammed Abduljalil, O. H. (May 2013). A Novel Approach for Handling Security in Cloud Computing. International Journal of Computer Applications , 9-14.
  2. http://www. webopedia. com/TERM/C/cloudcomputing. htmlcited on Aug 21, 2013
  3. Strickland, J. (n. d. ). How Cloud Computing Works. Retrieved November 20 , 2012, from HowStuffWorks: http://computer. howstuffworks. com/cloud-computing/cloud-computing. htm
  4. https://bluelabelhost. com/whatisthecloud, cited on Aug 21,2013
  5. Gurpreet Kaur, M. M. (2013). Analyzing Data Security for Cloud Computing Using Cryptographic Algorithms. Journal of Engineering Research and Application , 782-786.
  6. Gurpreet Singh, S. (2013). A Study of Encryption Algorithms (RSA, DES, 3DES and AES) for Information Security. International Journal of Computer Applications , 67, 33-38.
  7. Amanpreet Kaur, G. R. ( March 2013 ). Secure Broker Cloud Computing Paradigm Using AES And Selective AES Algorithm. International Journal of Advanced Research in Computer Science and Software Engineering
  8. Seyed Hossein Kamali, M. H. (2010). A New Modified Version of Advanced Encryption Standard Based Algorithm for Image Encryption. International Conference on Electronics and Information Engineering
  9. Mehboob Alam, W. B. (2002). A Novel Pipelined Threads Architecture for AES Encryption Algorithm. IEEE , 296 - 302.
  10. Abha Sachdev, M. B. (April 2013). Enhancing Cloud Computing Security using AES Algorithm. International Journal of Computer Applications , 67.
  11. G. Jai Arul Jose, C. S. (2011). Implementation of Data Security in Cloud Computing. International Journal of P2P Network Trends and Technology- , 2249-2615.
  12. Esh Narayan, M. M. (Sep. 2012 ). To enhance the data security of cloud in cloud computing using RSA algorithm. International Journal of Software Engineering.
  13. Eman M. Mohamed, H. S. -E. (2012). Enhanced Data Security Model for Cloud Computing. The 8th International Conference on INFOrmatics and Systems
  14. Kahate, A. (2007, july 11). What are Digital Signatures? Compute and Verify a Digital Signature Using Java. Retrieved January 4, 2012, from Indic Threads: http://www. indicthreads. com/1480/what-are-digital-signatures-compute-and-verify-a-digital-signature-using-java/
  15. Ravneet Kaur, A. K. (2012). Digital Signature. International Conference on Computing Sciences, IEEE .
  16. Hobbs, C. a. (2006). Time-sensitive Service-Orient. Nortel Technical Journal .
  17. Jean Bacon, D. E. (2010). Enforcing End-to-end Application Security in the Cloud. International Conference on Middleware, (pp. 293-312).
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Security Cloud services.