Secured Services in Cloud Computing Environment

Securing data is always of vital importance and because of the critical nature of cloud computing and large amounts of complex data it carries, the need is even important. Cryptographic algorithms are one of the most important areas in security. They are processes that protect data by making sure th...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of computer applications 2014-01, Vol.88 (1), p.44-49
Hauptverfasser: Abduljalil, Sahar Mohammed, Hegazy, Osman, Hassanein, Ehab E
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 49
container_issue 1
container_start_page 44
container_title International journal of computer applications
container_volume 88
creator Abduljalil, Sahar Mohammed
Hegazy, Osman
Hassanein, Ehab E
description Securing data is always of vital importance and because of the critical nature of cloud computing and large amounts of complex data it carries, the need is even important. Cryptographic algorithms are one of the most important areas in security. They are processes that protect data by making sure that unwanted people can't access it. Unfortunately, when the dataset size is huge, both memory use and computational cost can still be very expensive. In addition, single processor's memory and CPU resources are very limited, which make the algorithm performance inefficient. Security issues investigated in [1] requires that applications and services be capable of supporting a variety of security functionality such as authentications, authorization, and auditing and so on. Those mechanisms are likely to evolve over time because new mechanisms are developed and changed. So developer must avoid embedding security mechanisms statically and manually in order to adapt to changing requirements. The Cloud security service proposed casts those security functionalities in to a service. These strategy allows interfaces to be defined and permits an application to outsource security functionality from the cloud security service to fit it's current need. We are addressing in this paper a clear separation of concerns between the "business logic" and the "security logic" in order for any service implementing the proposed security service to be considered a high level secured service. This model is targeting developers willing to write secured services without burdening the developer of continuously rewriting security routines, and only be concerned with the business logic of the service, on the other hand it targets the end user that need to use the service as it is, and get the result or output.
doi_str_mv 10.5120/15320-3632
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1520934063</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3222552961</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1322-c211227b962502cf085d3f0ceb86f1319c01a5103e50f8fb3cea741a0d3c851b3</originalsourceid><addsrcrecordid>eNpdkE1Lw0AQhhdRsNRe_AUBLyLEzuxkk81RQv2AgofqeUk2u5KS7NbdpuC_N7UexLnMHB6G930Yu0a4F8hhiYI4pJQTP2MzKAuRSimL8z_3JVvEuIVpqOR5mc3YcmP0GEybbEw4dNrEpHNJ1fuxTSo_7MZ95z6SlTt0wbvBuP0Vu7B1H83id8_Z--PqrXpO169PL9XDOtVInKeaI3JeNGXOBXBtQYqWLGjTyNwiYakBa4FARoCVtiFt6iLDGlrSUmBDc3Z7-rsL_nM0ca-GLmrT97UzfowKBYeSMshpQm_-oVs_BjelU5iVU3WJVEzU3YnSwccYjFW70A11-FII6qhP_ehTR330DW89XoU</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1499758137</pqid></control><display><type>article</type><title>Secured Services in Cloud Computing Environment</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Abduljalil, Sahar Mohammed ; Hegazy, Osman ; Hassanein, Ehab E</creator><creatorcontrib>Abduljalil, Sahar Mohammed ; Hegazy, Osman ; Hassanein, Ehab E</creatorcontrib><description>Securing data is always of vital importance and because of the critical nature of cloud computing and large amounts of complex data it carries, the need is even important. Cryptographic algorithms are one of the most important areas in security. They are processes that protect data by making sure that unwanted people can't access it. Unfortunately, when the dataset size is huge, both memory use and computational cost can still be very expensive. In addition, single processor's memory and CPU resources are very limited, which make the algorithm performance inefficient. Security issues investigated in [1] requires that applications and services be capable of supporting a variety of security functionality such as authentications, authorization, and auditing and so on. Those mechanisms are likely to evolve over time because new mechanisms are developed and changed. So developer must avoid embedding security mechanisms statically and manually in order to adapt to changing requirements. The Cloud security service proposed casts those security functionalities in to a service. These strategy allows interfaces to be defined and permits an application to outsource security functionality from the cloud security service to fit it's current need. We are addressing in this paper a clear separation of concerns between the "business logic" and the "security logic" in order for any service implementing the proposed security service to be considered a high level secured service. This model is targeting developers willing to write secured services without burdening the developer of continuously rewriting security routines, and only be concerned with the business logic of the service, on the other hand it targets the end user that need to use the service as it is, and get the result or output.</description><identifier>ISSN: 0975-8887</identifier><identifier>EISSN: 0975-8887</identifier><identifier>DOI: 10.5120/15320-3632</identifier><language>eng</language><publisher>New York: Foundation of Computer Science</publisher><subject>Algorithms ; Business ; Cloud computing ; Computer information security ; Computer simulation ; Developers ; End users ; Logic</subject><ispartof>International journal of computer applications, 2014-01, Vol.88 (1), p.44-49</ispartof><rights>Copyright Foundation of Computer Science 2014</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Abduljalil, Sahar Mohammed</creatorcontrib><creatorcontrib>Hegazy, Osman</creatorcontrib><creatorcontrib>Hassanein, Ehab E</creatorcontrib><title>Secured Services in Cloud Computing Environment</title><title>International journal of computer applications</title><description>Securing data is always of vital importance and because of the critical nature of cloud computing and large amounts of complex data it carries, the need is even important. Cryptographic algorithms are one of the most important areas in security. They are processes that protect data by making sure that unwanted people can't access it. Unfortunately, when the dataset size is huge, both memory use and computational cost can still be very expensive. In addition, single processor's memory and CPU resources are very limited, which make the algorithm performance inefficient. Security issues investigated in [1] requires that applications and services be capable of supporting a variety of security functionality such as authentications, authorization, and auditing and so on. Those mechanisms are likely to evolve over time because new mechanisms are developed and changed. So developer must avoid embedding security mechanisms statically and manually in order to adapt to changing requirements. The Cloud security service proposed casts those security functionalities in to a service. These strategy allows interfaces to be defined and permits an application to outsource security functionality from the cloud security service to fit it's current need. We are addressing in this paper a clear separation of concerns between the "business logic" and the "security logic" in order for any service implementing the proposed security service to be considered a high level secured service. This model is targeting developers willing to write secured services without burdening the developer of continuously rewriting security routines, and only be concerned with the business logic of the service, on the other hand it targets the end user that need to use the service as it is, and get the result or output.</description><subject>Algorithms</subject><subject>Business</subject><subject>Cloud computing</subject><subject>Computer information security</subject><subject>Computer simulation</subject><subject>Developers</subject><subject>End users</subject><subject>Logic</subject><issn>0975-8887</issn><issn>0975-8887</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><recordid>eNpdkE1Lw0AQhhdRsNRe_AUBLyLEzuxkk81RQv2AgofqeUk2u5KS7NbdpuC_N7UexLnMHB6G930Yu0a4F8hhiYI4pJQTP2MzKAuRSimL8z_3JVvEuIVpqOR5mc3YcmP0GEybbEw4dNrEpHNJ1fuxTSo_7MZ95z6SlTt0wbvBuP0Vu7B1H83id8_Z--PqrXpO169PL9XDOtVInKeaI3JeNGXOBXBtQYqWLGjTyNwiYakBa4FARoCVtiFt6iLDGlrSUmBDc3Z7-rsL_nM0ca-GLmrT97UzfowKBYeSMshpQm_-oVs_BjelU5iVU3WJVEzU3YnSwccYjFW70A11-FII6qhP_ehTR330DW89XoU</recordid><startdate>20140101</startdate><enddate>20140101</enddate><creator>Abduljalil, Sahar Mohammed</creator><creator>Hegazy, Osman</creator><creator>Hassanein, Ehab E</creator><general>Foundation of Computer Science</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20140101</creationdate><title>Secured Services in Cloud Computing Environment</title><author>Abduljalil, Sahar Mohammed ; Hegazy, Osman ; Hassanein, Ehab E</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1322-c211227b962502cf085d3f0ceb86f1319c01a5103e50f8fb3cea741a0d3c851b3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Algorithms</topic><topic>Business</topic><topic>Cloud computing</topic><topic>Computer information security</topic><topic>Computer simulation</topic><topic>Developers</topic><topic>End users</topic><topic>Logic</topic><toplevel>online_resources</toplevel><creatorcontrib>Abduljalil, Sahar Mohammed</creatorcontrib><creatorcontrib>Hegazy, Osman</creatorcontrib><creatorcontrib>Hassanein, Ehab E</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of computer applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Abduljalil, Sahar Mohammed</au><au>Hegazy, Osman</au><au>Hassanein, Ehab E</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secured Services in Cloud Computing Environment</atitle><jtitle>International journal of computer applications</jtitle><date>2014-01-01</date><risdate>2014</risdate><volume>88</volume><issue>1</issue><spage>44</spage><epage>49</epage><pages>44-49</pages><issn>0975-8887</issn><eissn>0975-8887</eissn><abstract>Securing data is always of vital importance and because of the critical nature of cloud computing and large amounts of complex data it carries, the need is even important. Cryptographic algorithms are one of the most important areas in security. They are processes that protect data by making sure that unwanted people can't access it. Unfortunately, when the dataset size is huge, both memory use and computational cost can still be very expensive. In addition, single processor's memory and CPU resources are very limited, which make the algorithm performance inefficient. Security issues investigated in [1] requires that applications and services be capable of supporting a variety of security functionality such as authentications, authorization, and auditing and so on. Those mechanisms are likely to evolve over time because new mechanisms are developed and changed. So developer must avoid embedding security mechanisms statically and manually in order to adapt to changing requirements. The Cloud security service proposed casts those security functionalities in to a service. These strategy allows interfaces to be defined and permits an application to outsource security functionality from the cloud security service to fit it's current need. We are addressing in this paper a clear separation of concerns between the "business logic" and the "security logic" in order for any service implementing the proposed security service to be considered a high level secured service. This model is targeting developers willing to write secured services without burdening the developer of continuously rewriting security routines, and only be concerned with the business logic of the service, on the other hand it targets the end user that need to use the service as it is, and get the result or output.</abstract><cop>New York</cop><pub>Foundation of Computer Science</pub><doi>10.5120/15320-3632</doi><tpages>6</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0975-8887
ispartof International journal of computer applications, 2014-01, Vol.88 (1), p.44-49
issn 0975-8887
0975-8887
language eng
recordid cdi_proquest_miscellaneous_1520934063
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Algorithms
Business
Cloud computing
Computer information security
Computer simulation
Developers
End users
Logic
title Secured Services in Cloud Computing Environment
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-05T13%3A41%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secured%20Services%20in%20Cloud%20Computing%20Environment&rft.jtitle=International%20journal%20of%20computer%20applications&rft.au=Abduljalil,%20Sahar%20Mohammed&rft.date=2014-01-01&rft.volume=88&rft.issue=1&rft.spage=44&rft.epage=49&rft.pages=44-49&rft.issn=0975-8887&rft.eissn=0975-8887&rft_id=info:doi/10.5120/15320-3632&rft_dat=%3Cproquest_cross%3E3222552961%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1499758137&rft_id=info:pmid/&rfr_iscdi=true