Sustainable wireless clouds with security assurance

被引:0
|
作者
Sathish K. [1 ]
Kolli K. [2 ]
机构
[1] Department of Computer Science and Engineering, Tirumala Engineering College, Narasaraopet
[2] Department of Computer Science and Engineering, Geethanjali College of Engineering and Technology, Hyderabad
来源
Sathish, Kuppani (skuppani@gmail.com) | 1600年 / Inderscience Publishers卷 / 14期
关键词
Dataflow management; Decision making; Delay; Security assurance; Smart planning; Sustainable wireless clouds; Throughput;
D O I
10.1504/IJICS.2021.113171
中图分类号
学科分类号
摘要
The smart technology development being an entailment to have an improved quality of living under clean environment, with enhanced social, economic development, public safety and efficient governing would be made possible by the cloud computing, that pillars the smart planning with enhanced decision making and service provisioning. The smart developments must be well planned with the sustainable wireless cloud and should be supported by evaluating, analysing and synthesising to manage with the enormous data flow from diverse fields. This dataflow management that is subjected to threats causing data loss and data mishandling is efficiently prevented by the preventive measures undertaken in the proposed system of security assurance to regulate continuous data transmission to permitted users with authentication, encryption and decryption. The proposed system is validated in CloudSim with regard to throughput and delay to ensure the systems reliability and timely perfect delivery. Copyright © 2021 Inderscience Enterprises Ltd.
引用
收藏
页码:146 / 159
页数:13
相关论文
共 50 条
  • [41] Information security assurance lifecycle research
    XIE, Cheng-shan
    XUJIA, Gu-yue
    WANG, Li
    Journal of China Universities of Posts and Telecommunications, 2007, 14 (04): : 77 - 81
  • [42] Assurance cases for security: The metrics challenge
    Bloomfield, Robin
    Masera, Marcelo
    Miller, Ann
    Saydjari, O. Sami
    Weinstock, Charles B.
    37TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2007, : 807 - 808
  • [43] Regulatory Compliance and Information Security Assurance
    Tashi, Igli
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 670 - 674
  • [44] Hardware Security Through Chain Assurance
    Obeng, Yaw
    Nolan, Colm
    Brown, David
    PROCEEDINGS OF THE 2016 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE), 2016, : 1535 - 1537
  • [45] Evaluating Security Assurance Case Adaptation
    Jahan, Sharmin
    Marshall, Allen
    Gamble, Rose F.
    PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 7312 - 7321
  • [46] BASECASS: A methodology for CAPTCHAs security assurance
    Hernandez-Castro, Carlos Javier
    Barrero, David F.
    R-Moreno, Maria D.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63
  • [47] Tools for information security assurance arguments
    Park, JS
    Montrose, B
    Froscher, JN
    DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 287 - 296
  • [48] A reference model for enterprise security -: High assurance enterprise security
    Enstrom, David W.
    Walsh, D'Arcy
    Hossendoust, Siavosh
    ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: INFORMATION SYSTEMS ANALYSIS AND SPECIFICATION, 2007, : 355 - +
  • [49] Assessing of software security reliability: Dimensional security assurance techniques
    Ali, Mohammad
    Ullah, Ahsan
    Islam, Md. Rashedul
    Hossain, Rifat
    COMPUTERS & SECURITY, 2025, 150
  • [50] Information security assurance lifecycle research
    XIE Cheng-shan State Key Laboratory of Information Security
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2007, (04) : 77 - 81