CFP last date
15 July 2024
Reseach Article

Verified Message Exchange in Providing Security for Cloud Computing in Heterogeneous and Dynamic Environment

by Atul Verma, Gaurav Kant Shankhdhar, Manuj Darbari
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 11 - Number 10
Year of Publication: 2017
Authors: Atul Verma, Gaurav Kant Shankhdhar, Manuj Darbari
10.5120/ijais2017451648

Atul Verma, Gaurav Kant Shankhdhar, Manuj Darbari . Verified Message Exchange in Providing Security for Cloud Computing in Heterogeneous and Dynamic Environment. International Journal of Applied Information Systems. 11, 10 ( Feb 2017), 15-18. DOI=10.5120/ijais2017451648

@article{ 10.5120/ijais2017451648,
author = { Atul Verma, Gaurav Kant Shankhdhar, Manuj Darbari },
title = { Verified Message Exchange in Providing Security for Cloud Computing in Heterogeneous and Dynamic Environment },
journal = { International Journal of Applied Information Systems },
issue_date = { Feb 2017 },
volume = { 11 },
number = { 10 },
month = { Feb },
year = { 2017 },
issn = { 2249-0868 },
pages = { 15-18 },
numpages = {9},
url = { https://www.ijais.org/archives/volume11/number10/967-2017451648/ },
doi = { 10.5120/ijais2017451648 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T19:04:48.166948+05:30
%A Atul Verma
%A Gaurav Kant Shankhdhar
%A Manuj Darbari
%T Verified Message Exchange in Providing Security for Cloud Computing in Heterogeneous and Dynamic Environment
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 11
%N 10
%P 15-18
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Providers to cloud computing including Amazon, Google, Microsoft, Rachspace and Terremark have all contributed at a high end for this bulk storage technology. As goes with all the software packages including CRMs and ERPs the need for security has to be redefined, restructured and its domain adjusted because as the development progresses the vulnerabilities are exposed. To deal with the security issues in cloud computing this paper discusses some concepts like ontology, web semantics, and message passing within or between cloud components. This paper introduces a Context Sensitivity Policy approach for the Cloud Security Paradigm.

References
  1. Context-Sensitive Policy Based Security in Internet of Things, Context-Sensitive Policy Based Security in Internet of Things, 2016.
  2. V. G. Cerf, “Prospects for the internet of things,” XRDS, vol. 22, no. 2, pp. 28–31, Dec. 2015. [Online]. Available: http://doi.acm.org/10.1145/ 2845145
  3. N. Eddy, “Stress-free parking,” November 2015. [Online]. Available: http://www.informationweek.com/mobile/mobile-devices/ gartner-21-billion-iot-devices-to-invade-by-2020/d/d-id/1323081.
  4. S. Karnouskos, “Stuxnet worm impact on industrial cyber-physical system security,” in IECON 2011 - 37th Annual Conference on IEEE Industrial Electronics Society, Nov 2011, pp. 4490–4494.
  5. K. Kochetkova, “Shock at the wheel: your jeep can be hacked while driving down the road,” July 2015. [Online]. Available: https://blog.kaspersky.com/remote-car-hack/9395/
  6. S. Khandelwal, “100,000 refrigerators and other home appliances hacked to perform cyber attack,” January 2014. [Online]. Available: http:// thehackernews.com/2014/01/100000-refrigerators-and-other-home.html
  7. I. Gartner, “Gartner’s 2015 hype cycle for emerging technologies identifies the computing innovations that organizations should monitor,” August 2015. [Online]. Available: http://www.gartner.com/newsroom/ id/3114217
  8. H. Chen, F. Perich, T. Finin, and A. Joshi, “Soupa: standard ontology for ubiquitous and pervasive applications,” in Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004. The First Annual International Conference on, Aug 2004, pp. 258–267.
  9. L. Kagal, T. Finin, M. Paolucci, N. Srinivasan, K. Sycara, and G. Denker, “Authorization and privacy for semantic web services,” IEEE Intelligent Systems, vol. 19, no. 4, pp. 50–56, Jul 2004.
  10. S. Bechhofer, “Owl: Web ontology language,” in Encyclopedia of Database Systems. Springer, 2009, pp. 2008–2009.
  11. J. Slay and M. Miller, Lessons learned from the maroochy water breach. Springer, 2007.
  12. J. Leyden, “Polish teen derails tram after hacking train network,” The Register, vol. 11, 2008.
  13. D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel, “Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses,” in Security and Privacy, 2008. SP 2008. IEEE Symposium on. IEEE, 2008, pp. 129–142.
  14. M. Abomhara and G. M. Koien, “Security and privacy in the internet of things: Current status and open issues,” in Privacy and Security in Mobile Systems (PRISMS), 2014 International Conference on. IEEE, 2014, pp. 1–8.
  15. K. Zhao and L. Ge, “A survey on the internet of things security,” in Computational Intelligence and Security (CIS), 2013 9th International Conference on. IEEE, 2013, pp. 663–667.
  16. R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Computer Networks, vol. 57, no. 10, pp. 2266–2279, 2013.
  17. S. N. Narayanan, S. Mittal, and A. Joshi, “Using data analytics to detect anomalous states in vehicles,” arXiv preprint arXiv:1512.08048, 2015.
  18. S. Godik, A. Anderson, B. Parducci, P. Humenn, and S. Vajjhala, “Oasis extensible access control 2 markup language (xacml) 3,” Tech. rep., OASIS, Tech. Rep., 2002.
  19. K. Lalana, “Rei: A policy language for the me-centric project,” TechReport, HP Labs, 2002.
  20. J. M. Bradshaw, A. Uszok, M. Breedy, L. Bunch, T. Eskridge, P. Feltovich, M. Johnson, J. Lott, and M. Vignati, “The kaos policy services framework,” in Proc. 8th Cyber Security and Information Intelligence Research Workshop, 2013.
  21. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. Winsborough, and B. Thuraisingham, “R owl bac: representing role based access control in owl,” in Proceedings of the 13th ACM symposium on Access control models and technologies. ACM, 2008, pp. 73–82.
  22. NIST, NIST CPS, 2016 (accessed February 1, 2016). [Online]. Available: http://www.nist.gov/cps/
  23. X. Jin, R. Krishnan, and R. Sandhu, “A unified attribute-based access control model covering dac, mac and rbac,” in Proceedings of 26th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2012), Paris, France, July 2012.
  24. X. Jin, “Attribute-based access control models and implementation in cloud infrastructure as a service,” Ph.D. dissertation, The University of Texas, San Antonio, May 2014.
  25. M. Dean and G. Schreiber, “Owl web ontology language guide,” W3C Recommendation, http://www.w3.org/TR/owl-guide/, 2004.
  26. N. K. Sharma and A. Joshi, “Representing attribute based access control policies in owl,” in 2016 IEEE Tenth International Conference on Semantic Computing (ICSC), California, USA, Feb 2016, pp. 333–336.
  27. C. Seitz and R. Sch¨onfelder, The Semantic Web – ISWC 2011:10th International Semantic Web Conference, Bonn, Germany, October 23-27, 2011, Proceedings, Part II. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, ch. Rule-Based OWL Reasoning for Specific Embedded Devices, pp. 237–252. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-25093-4 16
  28. L. Zavala, P. K. Murukannaiah, N. Poosamani, T. Finin, A. Joshi, I. Rhee, and M. P. Singh, “Platys: From position to place-oriented mobile computing,” AI Magazine, vol. 36, no. 2, 2015.
  29. Google, “Mark up the world using beacons,” March 2016. [Online]. Available: https://developers.google.com/beacons/
  30. IEEE Explore, 2016, Building Custom, Adaptive and Heterogeneous Multi-Agent Systems for Semantic Information Retrieval Using Organizational-Multi-Agent Systems Engineering, O-MaSE, Gaurav Kant Shankhdhar
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing Distributed computing Grid computing Concurrent computing Computer science High performance computing Parallel processing Platform virtualization Computer industry Network servers