Social Network Security Management Model using Unified Communications as a Service

被引:0
|
作者
Chandrasekaran, S. [1 ]
Nandita, S. [1 ]
Arvind, Nikhil R. [1 ]
机构
[1] SRM Univ, Dept Comp Sci & Engn, Madras, Tamil Nadu, India
关键词
UCaaS; multi-tenancy; virtual machine; security management; Software as a Service; social networks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The objective of the paper is to propose a social network security management model for a multi-tenancy SaaS application using Unified Communications as a Service (UCaaS) approach. The earlier security management models do not cover the issues when data inadvertently get exposed to other users due to poor implementation of the access management processes. When a single virtual machine moves or dissolves in the network, many separate machines may bypass the security conditions that had been implemented for its neighbors which lead to vulnerability of the hosted services. When the services are multi-tenant, the issue becomes very critical due to lack of asynchronous asymmetric communications between virtual when more number of applications and users are added into the network creating big data issues and its identity. The TRAIN model for the security management using PC-FAST algorithm is proposed in order to detect and identify the communication errors between the hosted services.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Privacy as a service in social network communications
    Vidyalakshmi, B. S.
    Wong, Raymond K.
    Ghanavati, Mojgan
    Chi, Chi-Hung
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2014), 2014, : 456 - 463
  • [2] A Unified Social Network Service Model for Enhancing Privacy and Message Gain
    Hwang, Narae
    Lee, Sanghwan
    [J]. 2015 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC), 2015, : 248 - 250
  • [3] THE COMMUNICATIONS MODEL OF USING SOCIAL NETWORK BY SPORTS CLUBS
    Slawomir, Kowalski
    [J]. MARKETING AND MANAGEMENT OF INNOVATIONS, 2012, (02): : 84 - 92
  • [4] Application Security in Mobile Devices Using Unified Communications
    Josyula, Ramakrishna
    [J]. ADVANCES IN COMPUTING AND INFORMATION TECHNOLOGY, VOL 2, 2013, 177 : 135 - 143
  • [5] Using Multilevel Correlation in a Unified Platform of Network Security Management: Design and Implementation
    Wu, Zheng
    Xiao, Debao
    Xiao, Min
    Peng, Xi
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 402 - 406
  • [6] A Security Model Proposal for a Social Communications Broker
    Sola, Oscar M.
    de La Vieuville, Remi
    Serna, Jorge
    Cadenas, Alejandro
    [J]. 2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 560 - 564
  • [7] Addressing Challenges for Automating Network Readiness Assessment Service for Unified Communications
    Esfahani, Shadan Saniepour
    Siddiqui, Talal
    [J]. PROCEEDINGS OF THE 2013 IEEE 8TH CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA), 2013, : 1765 - 1768
  • [8] Mitigating the Security Risks of Unified Communications
    Almeida, Fernando
    Cruz, Jose
    Oliveira, Jose
    [J]. PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS, 2009, : 303 - 307
  • [9] The Unified Butterfly Effect: Efficient Security Credential Management System for Vehicular Communications
    Simplicio, Marcos A., Jr.
    Cominetti, Eduardo Lopes
    Patil, Harsh Kupwade
    Ricardini, Jefferson E.
    Silva, Marcos Vinicius M.
    [J]. 2018 IEEE VEHICULAR NETWORKING CONFERENCE (VNC), 2018,
  • [10] SERVICE MANAGEMENT TECHNOLOGY FOR ADVANCED INTELLIGENT NETWORK - SERVICE CUSTOMIZATION AND SECURITY MANAGEMENT
    SATOH, K
    [J]. NTT REVIEW, 1993, 5 (05): : 52 - 57