A DISTRIBUTED KEY BASED SECURITY FRAMEWORK FOR PRIVATE CLOUDS
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 9
Abstract
Cloud computing in its various forms continues to grow in popularity as organizations of all sizes seek to capitalize on the cloud’s scalability, externalization of infrastructure and administration and generally reduced application deployment costs. But while the attractiveness of these public cloud services is obvious, the ability to capitalize on these benefits is significantly limited for those organization requiring high levels of data security. It is often difficult if not impossible from a legal or regulatory perspective for government agencies or health services organizations for instance to use these cloud services given their many documented data security issues. As a middle ground between the benefits and security concerns of public clouds, hybrid clouds have emerged as an attractive alternative; limiting access, conceptually, to users within an organization or within a specific subset of users within an organization. Private clouds being significant options in hybrid clouds, however, are still susceptible to security vulnerabilities, a fact which points to the necessity of security frameworks capable of addressing these issues. In this paper we introduce the Treasure Island Security Framework (TISF), a conceptual security framework designed to specifically address the security needs of private clouds. We have based our framework on a Distributed Key and Sequentially Addressing Distributed file system (DKASA); itself borrowing heavily from the Google File System and Hadoop. Our approach utilizes a distributed key methodology combined with sequential chunk addressing and dynamic reconstruction of metadata to produce a more secure private cloud. The goal of this work is not to evaluate framework from an operational perspective but to instead provide the conceptual underpinning for the TISF. Experimental findings from our evaluation of the framework within a pilot project will be provided in a subsequent work.
Authors and Affiliations
Ali Shahbazi, Julian Brinkley, Nasseh Tabrizi
Camera Mouse Including “Ctrl-Alt-Del” Key Operation Using Gaze, Blink, and Mouth Shape
This paper presents camera mouse system with additional feature: "CTRL - ALT - DEL" key. The previous gaze-based camera mouse systems are only considering how to obtain gaze and making selection. We proposed gaze-based c...
Energy Provisioning Technique to Balance Energy Depletion and Maximize the Lifetime of Wireless Sensor Networks
With the promising technology of Wireless Sensor Networks (WSNs), lots of applications have been developed for monitoring and tracking in military, commercial, and educational environments. Characteristics of WSNs and re...
Fuzzy Ontology based Approach for Flexible Association Rules Mining
Data mining is used for extracting related data. The association rules approach is one of the used methods for analyzing, discovering and extracting knowledge and mining the relationships among raw data. Commonly, it is...
An Empirical Investigation of Predicting Fault Count, Fix Cost and Effort Using Software Metrics
Software fault prediction is important in software engineering field. Fault prediction helps engineers manage their efforts by identifying the most complex parts of the software where errors concentrate. Researchers usua...
Definition of Tactile Interactions for a Multi-Criteria Selection in a Virtual World
Tablets, smartphones are becoming increasingly common and interfaces are predominantly tactile and often multi-touch. More and more schools are testing them with their pupils in the hope of bringing pedagogic benefits. W...