CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Privacy in Cloud System

by Tariq Alwada’n, Adel Hamdan Mohammad, Hamza Aldabbas
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 93 - Number 2
Year of Publication: 2014
Authors: Tariq Alwada’n, Adel Hamdan Mohammad, Hamza Aldabbas
10.5120/16184-2255

Tariq Alwada’n, Adel Hamdan Mohammad, Hamza Aldabbas . Privacy in Cloud System. International Journal of Computer Applications. 93, 2 ( May 2014), 1-4. DOI=10.5120/16184-2255

@article{ 10.5120/16184-2255,
author = { Tariq Alwada’n, Adel Hamdan Mohammad, Hamza Aldabbas },
title = { Privacy in Cloud System },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 93 },
number = { 2 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume93/number2/16184-2255/ },
doi = { 10.5120/16184-2255 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:14:44.287833+05:30
%A Tariq Alwada’n
%A Adel Hamdan Mohammad
%A Hamza Aldabbas
%T Privacy in Cloud System
%J International Journal of Computer Applications
%@ 0975-8887
%V 93
%N 2
%P 1-4
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud computing technology is used as inexpensive systems to gather and utilize computational capability. This technology improves applications services by arranging machines and distributed resources in a single huge computational entity. Clouds consist of data centers which are owned by the same institute. The homogeneity within each data centre in the infrastructure is the main feature for the cloud computing but any conflict between heterogeneous data centers and/or different administration domains can become a serious issue for cloud interoperability and privacy. This paper suggests a new framework to solve the interoperability problem.

References
  1. Amazon. Amazon elastic compute cloud (amazon ec2), 2012.
  2. Amazon. Amazon simple storage service (amazon s3), 2012.
  3. M. -E. BEGIN. An egee comparative study: Grids and clouds- evolution or revolution. EGEE III, project Report, 30, 2008.
  4. Rajkumar Buyya, Chee Shin Yeo, and Srikumar Venugopal. Market-oriented cloud computing: Vision, hype, and reality for delivering it services as computing utilities. In Proceedings of the 2008 10th IEEE International Conference on High Performance Computing and Communications, HPCC '08, pages 5–13, Washington, DC, USA, 2008. IEEE Computer Society.
  5. Shirlei Aparecida de Chaves, Rafael Brundo Uriarte, and Carlos Becker Westphall. Toward an architecture for monitoring private clouds. IEEE Communications Magazine, 49(12):130–137, 2011.
  6. Shirlei Aparecida de Chaves, Carlos Becker Westphall, and Flavio Rodrigo Lamin. Sla perspective in security management for cloud computing. In Proceedings of the 2010 Sixth International Conference on Networking and Services, ICNS '10, pages 212–217, Washington, DC, USA, 2010. IEEE Computer Society.
  7. KEVIN J. DELANEY and VAUHINI VARA. Google plans service to store users' data, NOVEMBER 27, 2007.
  8. I. Foster and K. Kesselman. The grid: Blueprint for a future computing infrastructure. In Morgan Kaufmann in Computer Architecture and Design, 1999.
  9. Ian Foster, Yong Zhao, Ioan Raicu, and Shiyong Lu. Cloud computing and grid computing 360-degree compared. 2008 Grid Computing Environments Workshop, abs/0901. 0(5):1– 10, 2008.
  10. Ian Foster, Yong Zhao, Ioan Raicu, and Shiyong Lu. Cloud computing and grid computing 360-degree compared. 2008 Grid Computing Environments Workshop, abs/0901. 0(5):1– 10, 2008.
  11. A. S. Grimshaw, M. A. Humphrey, and A. Natrajan. A philosophical and technical comparison of legion and globus. IBM J. Res. Dev. , 48:233–254, March 2004.
  12. Eric Hand. Head in the clouds, 24 October 200.
  13. Thomas Heyman, Riccardo Scandariato, Christophe Huygens, and Wouter Joosen. Using security patterns to combine security metrics. In Proceedings of the 2008 Third International Conference on Availability, Reliability and Security, pages 1156–1163, Washington, DC, USA, 2008. IEEE Computer Society.
  14. Fei Hu, Meikang Qiu, Jiayin Li, Travis Grant, Draw Tylor, Seth McCaleb, Lee Butler, and Richard Hamner. A review on cloud computing: Design challenges in architecture and security. CIT, 19(1):25–55, 2011.
  15. Marty Humphrey and Mary R. Thompson. Security implications of typical grid computing usage scenarios. Cluster Computing, 5:257–264, July 2002.
  16. Paul Jaeger, Jimmy Lin, and Justin Grimes. Cloud computing and information policy: Computing in a policy cloud? Journal of Information Technology Politics, 5(3):269–283, 2008.
  17. Neal Leavitt. Is cloud computing really ready for prime time? Computer, 42:15–20, January 2009.
  18. Lijun Mei, W. K. Chan, and T. H. Tse. A tale of clouds: Paradigm comparisons and some thoughts on research issues. In Proceedings of the 2008 IEEE Asia-Pacific Services Computing Conference, pages 464–469, Washington, DC, USA, 2008. IEEE Computer Society.
  19. Peter Mell and Timothy Grance. The nist definition of cloud computing ( draft ) recommendations of the national institute of standards and technology. Nist Special Publication, 145(6):7, 2011.
  20. Carlos Oberdan Rolim, Fernando Luiz Koch, Carlos Becker Westphall, Jorge Werner, Armando Fracalossi, and Giovanni Schmitt Salvador. A cloud computing solution for patient's data collection in health care institutions. In Proceedings of the 2010 Second International Conference on eHealth, Telemedicine, and Social Medicine, ETELEMED '10, pages 95–99, Washington, DC, USA, 2010. IEEE Computer Society.
  21. Borja Sotomayor, Rub´en S. Montero, Ignacio M. Llorente, and Ian Foster. Virtual infrastructure management in private and hybrid clouds. IEEE Internet Computing, 13:14–22, September 2009.
  22. K Vieira, A Schulter, C B Westphall, and C M Westphall. Intrusion detection for grid and cloud computing. It Professional, 12(4):38–43, 2010.
  23. J. Werner, G. Geronimo, C. Westphall, F. Koch, and R. Freitas. Simulator improvements to validate the green cloud computing approach. In Network Operations and Management Symposium (LANOMS), 2011 7th Latin American, pages 1 –8, Oct. 2011.
  24. C. M; KOCH F. L. ; ROLIM C. O; VIEIRA K. M. ; R. S. ; BRINHOSA R. B. ; GERONIMO G. A. ; FREITAS R. R. WESTPHALL, C. B; WESTPHALL. Management and security for grid, cloud and cognitive networks. Revista de Sistemas de Informao da FSMA, 8:8–21, 2011.
  25. Yunpeng Xiao, Yang Tao, and Qian Li. A new wireless web access mode based on cloud computing. In Proceedings of the 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application - Volume 01, PACIIA '08, pages 645–649, Washington, DC, USA, 2008. IEEE Computer Society.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Policy Management Grid Services Security Privacy.