Abstract
Use of cloud infrastructure by enterprises for hosting their data and applications is growing at a rapid pace. This calls for proper security measures for protecting sensitive enterprise data within the Cloud. Absence of owners’ control over data stored in Cloud introduces major security concerns that should be handled by the Cloud Service Provider. One of the most critical aspects is secure handling of data deletion; it should be ensured that sensitive data is completely deleted from the Cloud on an owner’s request to avoid data leakages. This paper presents a methodology for effective and efficient allocation of Virtual Machines to users, while ensuring security of sensitive data that belongs to users within the same Conflict of Interest classes. The issue of secured data deletion has been addressed by the proposed methodology which, being a provider-end solution, does not incur any additional user overhead.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Buyya, R., Yeo, C.S., Venugopal, S., Broberg, J., Brandic, I.: Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility. J. Future Gener. Comput. Syst. 25, 599–616 (2008)
Hashizume, K., Rosado, D.G., Fernández-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. J. Int. Serv. Appl. 4(5), 1–13 (2013)
Rong, C., Nguyen, S.T., Jaatun, M.J.: Beyond lightning: a survey on security challenges in cloud computing. J. Recent Adv. Technol. Theor. Grid Cloud Comput. Bio-Eng. 39(1), 4–54 (2013)
Sun, Y., Zhang, J., Zhiong, Y., Zhu, G.: Data security and privacy in cloud computing. J. Dist. Sens. Netw. 2014, 1–9 (2014)
Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1–11 (2010)
Majumder, A., Namasudra, S., Nath, S.: Taxonomy and classification of access control models for cloud environments. In: Zaigham, M. (ed.) Continued Rise of the Cloud: Advances and Trends in Cloud Computing. Computer Communications and Networks, Springer. London (2014)
Wang, C., Wang, Q., Ren, K., Louu, W.: Privacy-preserving public auditing for data storage security in cloud computing. In: 2010 Proceedings of INFOCOM, pp. 1–9. IEEE Press, San Diego (2010)
Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 Proceedings of INFOCOM, pp. 1–9. IEEE Press, San Diego (2010)
Liu, Q., Wang, G., Wu, J.: Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. J. Inf. Sci. 258, 35–370 (2014)
Wang, H., He, D., Tang, S.: Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud. J. IEEE Trans. Inf. For. Secur. 11(6), 1165–1176 (2016)
Aceto, G., Botta, A., de Donato, W., Pescapè, A.: Cloud monitoring: definitions, issues and future directions. In: 2012 Proceedings of IEEE CloudNet, pp. 63—67. IEEE Press, Paris (2012)
Basu, S., Sengupta, A., Mazumdar C.: Implementing Chinese wall security model for cloud-based services. In: ICGCIoT 2015, pp. 1083–1089. IEEE Press, Noida (2015)
Cloud Management and Monitoring. http://searchcloudcomputing.techtarget.com/definition/cloud-sprawl
Infrastructure as a Service Cloud Concepts. http://www.ibmpressbooks.com/articles/article.asp?p=1927741&seqNum=7
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Basu, S., Sengupta, A., Mazumdar, C. (2016). An Automated Methodology for Secured User Allocation in Cloud. In: Mueller, P., Thampi, S., Alam Bhuiyan, M., Ko, R., Doss, R., Alcaraz Calero, J. (eds) Security in Computing and Communications. SSCC 2016. Communications in Computer and Information Science, vol 625. Springer, Singapore. https://doi.org/10.1007/978-981-10-2738-3_12
Download citation
DOI: https://doi.org/10.1007/978-981-10-2738-3_12
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2737-6
Online ISBN: 978-981-10-2738-3
eBook Packages: Computer ScienceComputer Science (R0)