RACE: REGISTRY WITH ACCESS CONTROL ENCLOSURE BASED SERVICE RELIABILITY AND INFORMATION SECURITY OVER CLOUD

被引:0
|
作者
Rao, R. V. Raghavendra [1 ]
Ramchandra, G. A. [2 ]
Akash [3 ]
机构
[1] BMS Coll Engn, Bengaluru, India
[2] Sri Krishnadevaraya Univ, Anatapur, India
[3] BMSCE, Bengaluru, India
关键词
Cloud Computing; Cloud Security; Information Security; Framework; Web enabled Service; ISSUES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has been evolved from server based context to service-oriented context. This transformation poses lots of challenges to a cloud environment in terms of cloud service reliability and information security. In most of the aspects of current cloud service environment, lot of information exchange taking place without much security. In this context cloud computing, with reliability and security is an important issue. Migration of data from one end to another poses a serious threat to the shared environment. This work proposing Registry with Access Control Enclosure (RACE) framework for reliable cloud service and information security. The framework comprises three independent entities Cloud Service Provider (CSP), cloud Service Consumer (SC) and Registering Process (RP). CSP need to register its service with RACE to offer services to Consumers. Consumers can avail the services through defined framework. RACE provides necessary environment to connect Consumer/Client and CSP. This framework provides a standardized, customized and secure environment for cloud computing.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Access Control Research on Data Security in Cloud Computing
    Zhang, Pin
    Xu, Jing
    Muazu, Halilu
    Mao, Wenmin
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 873 - 877
  • [32] The Cloud Data Security and Access Control Model in the Study
    Dong, Jing
    PROCEEDINGS OF THE 2016 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND MEDICINE (EMCM 2016), 2017, 59 : 498 - 500
  • [33] Data Security Access Control Model of Cloud Computing
    Hu, Jun
    Chen, Lei
    Wang, Yunhua
    Chen, Shi-hong
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 29 - 34
  • [34] Fine Grained Security in Cloud with Cryptographic Access Control
    Manikonda, Aparna
    Nalini, N
    2021 International Conference on Advance Computing and Innovative Technologies in Engineering, ICACITE 2021, 2021, : 154 - 157
  • [35] Payment Status and Service Level Agreement Based Access Control Method in Cloud Service Business
    Liu, Chi-Lun
    2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC), 2012, : 67 - 70
  • [36] Information Security Needs and Practices for Cloud Based Healthcare Software-As-A-Service Model
    Turner, P.
    Sleeman, W.
    Srinivasan, S.
    Bose, P.
    Ghosh, P.
    Palta, J.
    Kapoor, R.
    MEDICAL PHYSICS, 2022, 49 (06) : E676 - E677
  • [37] Security Incident Information Exchange for Cloud Service Provisioning Chains
    Froystad, Christian
    Tondel, Inger Anne
    Jaatun, Martin Gilje
    CRYPTOGRAPHY, 2018, 2 (04) : 1 - 16
  • [38] An Integrated Access Control Service Enabler for Cloud Applications
    Tran Quang Thanh
    Covaci, Stefan
    Ertl, Benjamin
    Zampognano, Paolo
    FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2015, 2015, 523 : 101 - 112
  • [39] Access Control Approach in Public Software as a Service Cloud
    Poniszewska-Maranda, Aneta
    Rutkowska, Roksana
    THEORY AND ENGINEERING OF COMPLEX SYSTEMS AND DEPENDABILITY, 2015, 365 : 381 - 390
  • [40] Cloud Computing Service Security and Access: From the Providers and Customers' Perspective
    Zhao, Xianghui
    Liu, Hui
    Yi, Jin
    Tian, Wen
    Luo, Ning
    Ye, Lin
    2013 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA), 2013, : 379 - 383