RACE: REGISTRY WITH ACCESS CONTROL ENCLOSURE BASED SERVICE RELIABILITY AND INFORMATION SECURITY OVER CLOUD

被引:0
|
作者
Rao, R. V. Raghavendra [1 ]
Ramchandra, G. A. [2 ]
Akash [3 ]
机构
[1] BMS Coll Engn, Bengaluru, India
[2] Sri Krishnadevaraya Univ, Anatapur, India
[3] BMSCE, Bengaluru, India
关键词
Cloud Computing; Cloud Security; Information Security; Framework; Web enabled Service; ISSUES;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has been evolved from server based context to service-oriented context. This transformation poses lots of challenges to a cloud environment in terms of cloud service reliability and information security. In most of the aspects of current cloud service environment, lot of information exchange taking place without much security. In this context cloud computing, with reliability and security is an important issue. Migration of data from one end to another poses a serious threat to the shared environment. This work proposing Registry with Access Control Enclosure (RACE) framework for reliable cloud service and information security. The framework comprises three independent entities Cloud Service Provider (CSP), cloud Service Consumer (SC) and Registering Process (RP). CSP need to register its service with RACE to offer services to Consumers. Consumers can avail the services through defined framework. RACE provides necessary environment to connect Consumer/Client and CSP. This framework provides a standardized, customized and secure environment for cloud computing.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] System security model based on trusted access control under cloud computing environment
    Wang F.
    Wang, Fengqi (fengqiwang@21cn.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (10): : 236 - 242
  • [42] Lattice based access control for protecting user data in cloud environments with hybrid security
    Saravanan, N.
    Umamakeswari, A.
    COMPUTERS & SECURITY, 2021, 100
  • [43] A Security Evaluation of Chaos Attribute-Based Access Control (ABAC) for Cloud Computing
    BenMarak, Omessead
    Naanaa, Anis
    Elasmi, Sadok
    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 3, AINA 2024, 2024, 201 : 415 - 425
  • [44] Access control security model based on dual identity authentication in cloud computing environment
    Ning, Yumei
    Ding, Zhenguo
    Zeng, Ping
    Wang, Chen
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2012, 40 (SUPPL.1): : 288 - 292
  • [45] Ontology-based access control model for security policy reasoning in cloud computing
    Choi, Chang
    Choi, Junho
    Kim, Pankoo
    JOURNAL OF SUPERCOMPUTING, 2014, 67 (03): : 711 - 722
  • [46] Ontology-based access control model for security policy reasoning in cloud computing
    Chang Choi
    Junho Choi
    Pankoo Kim
    The Journal of Supercomputing, 2014, 67 : 711 - 722
  • [47] ISCS (Information Security Check Service) for the Safety and Reliability of Communications
    Shin, Jong-Whoi
    Lee, Jin-Tae
    Jang, Sang-Soo
    Lee, Jae-Il
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 6, 2005, : 22 - 25
  • [48] Research on security communication and access control of grid service
    Wang, Yu-Bo
    Chen, Cai-Sen
    Wang, Xi-Ren
    Ma, Xiang-Liang
    Xue, Lei-Ze
    Journal of Computers (Taiwan), 2020, 31 (01) : 261 - 265
  • [49] A Security Framework for Service Overlay Networks: Access Control
    Kurian, Jinu
    Sarac, Kamil
    2008 5TH INTERNATIONAL CONFERENCE ON BROADBAND COMMUNICATIONS, NETWORKS AND SYSTEMS (BROADNETS 2008), 2008, : 412 - 419
  • [50] Simplifying CORBA security service to support service level access control
    Kumar, A
    Jalote, P
    Gupta, D
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2003: OTM 2003 WORKSHOPS, 2003, 2889 : 793 - 806