Secured Services in Cloud Computing Environment
Securing data is always of vital importance and because of the critical nature of cloud computing and large amounts of complex data it carries, the need is even important. Cryptographic algorithms are one of the most important areas in security. They are processes that protect data by making sure th...
Gespeichert in:
Veröffentlicht in: | International journal of computer applications 2014-01, Vol.88 (1), p.44-49 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 49 |
---|---|
container_issue | 1 |
container_start_page | 44 |
container_title | International journal of computer applications |
container_volume | 88 |
creator | Abduljalil, Sahar Mohammed Hegazy, Osman Hassanein, Ehab E |
description | Securing data is always of vital importance and because of the critical nature of cloud computing and large amounts of complex data it carries, the need is even important. Cryptographic algorithms are one of the most important areas in security. They are processes that protect data by making sure that unwanted people can't access it. Unfortunately, when the dataset size is huge, both memory use and computational cost can still be very expensive. In addition, single processor's memory and CPU resources are very limited, which make the algorithm performance inefficient. Security issues investigated in [1] requires that applications and services be capable of supporting a variety of security functionality such as authentications, authorization, and auditing and so on. Those mechanisms are likely to evolve over time because new mechanisms are developed and changed. So developer must avoid embedding security mechanisms statically and manually in order to adapt to changing requirements. The Cloud security service proposed casts those security functionalities in to a service. These strategy allows interfaces to be defined and permits an application to outsource security functionality from the cloud security service to fit it's current need. We are addressing in this paper a clear separation of concerns between the "business logic" and the "security logic" in order for any service implementing the proposed security service to be considered a high level secured service. This model is targeting developers willing to write secured services without burdening the developer of continuously rewriting security routines, and only be concerned with the business logic of the service, on the other hand it targets the end user that need to use the service as it is, and get the result or output. |
doi_str_mv | 10.5120/15320-3632 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1520934063</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3222552961</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1322-c211227b962502cf085d3f0ceb86f1319c01a5103e50f8fb3cea741a0d3c851b3</originalsourceid><addsrcrecordid>eNpdkE1Lw0AQhhdRsNRe_AUBLyLEzuxkk81RQv2AgofqeUk2u5KS7NbdpuC_N7UexLnMHB6G930Yu0a4F8hhiYI4pJQTP2MzKAuRSimL8z_3JVvEuIVpqOR5mc3YcmP0GEybbEw4dNrEpHNJ1fuxTSo_7MZ95z6SlTt0wbvBuP0Vu7B1H83id8_Z--PqrXpO169PL9XDOtVInKeaI3JeNGXOBXBtQYqWLGjTyNwiYakBa4FARoCVtiFt6iLDGlrSUmBDc3Z7-rsL_nM0ca-GLmrT97UzfowKBYeSMshpQm_-oVs_BjelU5iVU3WJVEzU3YnSwccYjFW70A11-FII6qhP_ehTR330DW89XoU</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1499758137</pqid></control><display><type>article</type><title>Secured Services in Cloud Computing Environment</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Abduljalil, Sahar Mohammed ; Hegazy, Osman ; Hassanein, Ehab E</creator><creatorcontrib>Abduljalil, Sahar Mohammed ; Hegazy, Osman ; Hassanein, Ehab E</creatorcontrib><description>Securing data is always of vital importance and because of the critical nature of cloud computing and large amounts of complex data it carries, the need is even important. Cryptographic algorithms are one of the most important areas in security. They are processes that protect data by making sure that unwanted people can't access it. Unfortunately, when the dataset size is huge, both memory use and computational cost can still be very expensive. In addition, single processor's memory and CPU resources are very limited, which make the algorithm performance inefficient. Security issues investigated in [1] requires that applications and services be capable of supporting a variety of security functionality such as authentications, authorization, and auditing and so on. Those mechanisms are likely to evolve over time because new mechanisms are developed and changed. So developer must avoid embedding security mechanisms statically and manually in order to adapt to changing requirements. The Cloud security service proposed casts those security functionalities in to a service. These strategy allows interfaces to be defined and permits an application to outsource security functionality from the cloud security service to fit it's current need. We are addressing in this paper a clear separation of concerns between the "business logic" and the "security logic" in order for any service implementing the proposed security service to be considered a high level secured service. This model is targeting developers willing to write secured services without burdening the developer of continuously rewriting security routines, and only be concerned with the business logic of the service, on the other hand it targets the end user that need to use the service as it is, and get the result or output.</description><identifier>ISSN: 0975-8887</identifier><identifier>EISSN: 0975-8887</identifier><identifier>DOI: 10.5120/15320-3632</identifier><language>eng</language><publisher>New York: Foundation of Computer Science</publisher><subject>Algorithms ; Business ; Cloud computing ; Computer information security ; Computer simulation ; Developers ; End users ; Logic</subject><ispartof>International journal of computer applications, 2014-01, Vol.88 (1), p.44-49</ispartof><rights>Copyright Foundation of Computer Science 2014</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Abduljalil, Sahar Mohammed</creatorcontrib><creatorcontrib>Hegazy, Osman</creatorcontrib><creatorcontrib>Hassanein, Ehab E</creatorcontrib><title>Secured Services in Cloud Computing Environment</title><title>International journal of computer applications</title><description>Securing data is always of vital importance and because of the critical nature of cloud computing and large amounts of complex data it carries, the need is even important. Cryptographic algorithms are one of the most important areas in security. They are processes that protect data by making sure that unwanted people can't access it. Unfortunately, when the dataset size is huge, both memory use and computational cost can still be very expensive. In addition, single processor's memory and CPU resources are very limited, which make the algorithm performance inefficient. Security issues investigated in [1] requires that applications and services be capable of supporting a variety of security functionality such as authentications, authorization, and auditing and so on. Those mechanisms are likely to evolve over time because new mechanisms are developed and changed. So developer must avoid embedding security mechanisms statically and manually in order to adapt to changing requirements. The Cloud security service proposed casts those security functionalities in to a service. These strategy allows interfaces to be defined and permits an application to outsource security functionality from the cloud security service to fit it's current need. We are addressing in this paper a clear separation of concerns between the "business logic" and the "security logic" in order for any service implementing the proposed security service to be considered a high level secured service. This model is targeting developers willing to write secured services without burdening the developer of continuously rewriting security routines, and only be concerned with the business logic of the service, on the other hand it targets the end user that need to use the service as it is, and get the result or output.</description><subject>Algorithms</subject><subject>Business</subject><subject>Cloud computing</subject><subject>Computer information security</subject><subject>Computer simulation</subject><subject>Developers</subject><subject>End users</subject><subject>Logic</subject><issn>0975-8887</issn><issn>0975-8887</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><recordid>eNpdkE1Lw0AQhhdRsNRe_AUBLyLEzuxkk81RQv2AgofqeUk2u5KS7NbdpuC_N7UexLnMHB6G930Yu0a4F8hhiYI4pJQTP2MzKAuRSimL8z_3JVvEuIVpqOR5mc3YcmP0GEybbEw4dNrEpHNJ1fuxTSo_7MZ95z6SlTt0wbvBuP0Vu7B1H83id8_Z--PqrXpO169PL9XDOtVInKeaI3JeNGXOBXBtQYqWLGjTyNwiYakBa4FARoCVtiFt6iLDGlrSUmBDc3Z7-rsL_nM0ca-GLmrT97UzfowKBYeSMshpQm_-oVs_BjelU5iVU3WJVEzU3YnSwccYjFW70A11-FII6qhP_ehTR330DW89XoU</recordid><startdate>20140101</startdate><enddate>20140101</enddate><creator>Abduljalil, Sahar Mohammed</creator><creator>Hegazy, Osman</creator><creator>Hassanein, Ehab E</creator><general>Foundation of Computer Science</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20140101</creationdate><title>Secured Services in Cloud Computing Environment</title><author>Abduljalil, Sahar Mohammed ; Hegazy, Osman ; Hassanein, Ehab E</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1322-c211227b962502cf085d3f0ceb86f1319c01a5103e50f8fb3cea741a0d3c851b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Algorithms</topic><topic>Business</topic><topic>Cloud computing</topic><topic>Computer information security</topic><topic>Computer simulation</topic><topic>Developers</topic><topic>End users</topic><topic>Logic</topic><toplevel>online_resources</toplevel><creatorcontrib>Abduljalil, Sahar Mohammed</creatorcontrib><creatorcontrib>Hegazy, Osman</creatorcontrib><creatorcontrib>Hassanein, Ehab E</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of computer applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Abduljalil, Sahar Mohammed</au><au>Hegazy, Osman</au><au>Hassanein, Ehab E</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secured Services in Cloud Computing Environment</atitle><jtitle>International journal of computer applications</jtitle><date>2014-01-01</date><risdate>2014</risdate><volume>88</volume><issue>1</issue><spage>44</spage><epage>49</epage><pages>44-49</pages><issn>0975-8887</issn><eissn>0975-8887</eissn><abstract>Securing data is always of vital importance and because of the critical nature of cloud computing and large amounts of complex data it carries, the need is even important. Cryptographic algorithms are one of the most important areas in security. They are processes that protect data by making sure that unwanted people can't access it. Unfortunately, when the dataset size is huge, both memory use and computational cost can still be very expensive. In addition, single processor's memory and CPU resources are very limited, which make the algorithm performance inefficient. Security issues investigated in [1] requires that applications and services be capable of supporting a variety of security functionality such as authentications, authorization, and auditing and so on. Those mechanisms are likely to evolve over time because new mechanisms are developed and changed. So developer must avoid embedding security mechanisms statically and manually in order to adapt to changing requirements. The Cloud security service proposed casts those security functionalities in to a service. These strategy allows interfaces to be defined and permits an application to outsource security functionality from the cloud security service to fit it's current need. We are addressing in this paper a clear separation of concerns between the "business logic" and the "security logic" in order for any service implementing the proposed security service to be considered a high level secured service. This model is targeting developers willing to write secured services without burdening the developer of continuously rewriting security routines, and only be concerned with the business logic of the service, on the other hand it targets the end user that need to use the service as it is, and get the result or output.</abstract><cop>New York</cop><pub>Foundation of Computer Science</pub><doi>10.5120/15320-3632</doi><tpages>6</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0975-8887 |
ispartof | International journal of computer applications, 2014-01, Vol.88 (1), p.44-49 |
issn | 0975-8887 0975-8887 |
language | eng |
recordid | cdi_proquest_miscellaneous_1520934063 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Algorithms Business Cloud computing Computer information security Computer simulation Developers End users Logic |
title | Secured Services in Cloud Computing Environment |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T13%3A41%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secured%20Services%20in%20Cloud%20Computing%20Environment&rft.jtitle=International%20journal%20of%20computer%20applications&rft.au=Abduljalil,%20Sahar%20Mohammed&rft.date=2014-01-01&rft.volume=88&rft.issue=1&rft.spage=44&rft.epage=49&rft.pages=44-49&rft.issn=0975-8887&rft.eissn=0975-8887&rft_id=info:doi/10.5120/15320-3632&rft_dat=%3Cproquest_cross%3E3222552961%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1499758137&rft_id=info:pmid/&rfr_iscdi=true |