Cloud Computing Security Framework based on Elliptical Curve

نویسندگان

  • Ayman Helmy Mohamed
  • Aliaa A. A. Youssif
  • Atef Z. Ghalwash
  • Vipul Patel
  • Rahul Kumar
  • Mohamed Al Morsy
  • John Grundy
چکیده

Technological advancements in cloud computing due to increased connectivity and exponentially proliferating data has resulted in migration towards cloud architecture that employ dynamic load and access balancing. Cloud computing is technology where the clients' can use high end services in form of software that reside on different servers and access data from all over the world. With a promising technology like this, it certainly abandons clients' privacy, management of data and services, putting new security threats towards the assurance of data in cloud. However, there are some security concerns when clients handle and share data in the cloud-computing environment. The security threats such as maintenance of data integrity, data hiding and data safety dominate clients concerns when the issues of cloud security come up. The big data and time-consuming encryption calculations related to applying any encryption method have proved as a hindrance in this field. Cryptography is knowledge of protecting the information for providing encryption techniques In this paper, Cloud computing security framework was tested. The framework ensures a trusted cloud environment that controlled by both the client and the cloud environment. The proposed solution secures the movement of data between client and cloud end. the non-breakability of

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Framework for Evaluating Cloud Computing User’s Satisfaction in Information Technology Management

Cloud computing is a new discussion in enterprise IT. It has already become popular in terms of distributed technology in some companies. It enables managers to setup and run the intended businesses by avoiding excessive spending on computers, software and hiring expert staff, which proves to be cost effective. Cloud computing also helps users pay for the IT services without spending massive am...

متن کامل

An Effective Task Scheduling Framework for Cloud Computing using NSGA-II

Cloud computing is a model for convenient on-demand user’s access to changeable and configurable computing resources such as networks, servers, storage, applications, and services with minimal management of resources and service provider interaction. Task scheduling is regarded as a fundamental issue in cloud computing which aims at distributing the load on the different resources of a distribu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015