کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
426056 685988 2012 10 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Addressing cloud computing security issues
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر نظریه محاسباتی و ریاضیات
پیش نمایش صفحه اول مقاله
Addressing cloud computing security issues
چکیده انگلیسی

The recent emergence of cloud computing has drastically altered everyone’s perception of infrastructure architectures, software delivery and development models. Projecting as an evolutionary step, following the transition from mainframe computers to client/server deployment models, cloud computing encompasses elements from grid computing, utility computing and autonomic computing, into an innovative deployment architecture. This rapid transition towards the clouds, has fuelled concerns on a critical issue for the success of information systems, communication and information security. From a security perspective, a number of unchartered risks and challenges have been introduced from this relocation to the clouds, deteriorating much of the effectiveness of traditional protection mechanisms. As a result the aim of this paper is twofold; firstly to evaluate cloud security by identifying unique security requirements and secondly to attempt to present a viable solution that eliminates these potential threats. This paper proposes introducing a Trusted Third Party, tasked with assuring specific security characteristics within a cloud environment. The proposed solution calls upon cryptography, specifically Public Key Infrastructure operating in concert with SSO and LDAP, to ensure the authentication, integrity and confidentiality of involved data and communications. The solution, presents a horizontal level of service, available to all implicated entities, that realizes a security mesh, within which essential trust is maintained.

Research highlights
► This paper attempts to evaluate cloud computing security.
► A solution is presented which attempts to eliminate unique threats.
► This paper introduces a Trusted Third Party.
► TTP is tasked with assuring security characteristics within a cloud environment.
► The solution employs Public Key Infrastructure in concert with SSO and LDAP.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Future Generation Computer Systems - Volume 28, Issue 3, March 2012, Pages 583–592
نویسندگان
, ,