END-TO-END SECURITY ARCHITECTURE FOR CLOUD COMPUTING ENVIRONMENTS

END-TO-END SECURITY ARCHITECTURE FOR CLOUD COMPUTING ENVIRONMENTS


08-25-2013, 05:43 PM


  » http://sudaneseonline.com/cgi-bin/sdb/2bb.cgi?seq=msg&board=440&msg=1377452623&rn=0


Post: #1
Title: END-TO-END SECURITY ARCHITECTURE FOR CLOUD COMPUTING ENVIRONMENTS
Author: كمال الدين الريح
Date: 08-25-2013, 05:43 PM

END-TO-END SECURITY ARCHITECTURE FOR CLOUD COMPUTING
ENVIRONMENTS
Alargam Elrayah Elsayed Ali, Prof. Dr. Abdul Hanan Abdullah
Faculty of Computer Science and Information Systems,
Universiti Teknologi Malaysia
[email protected], [email protected]
ABSTRACT
Cloud computing is the long dreamed vision of computing as a utility, where data
owners can remotely store their data in the cloud to enjoy on-demand high-quality
applications and services from a shared pool of configurable computing resources,
it has grown from being a promising business concept to one of the fastest growing
segments of the IT industry. Now, many of companies are increasingly realizing
that simply by tapping into the cloud they can gain fast access to best-of-breed
business applications or drastically boost their infrastructure resources, all at
negligible cost. But as more and more information on individuals and companies is
placed in the cloud, concerns are beginning to grow about just how safe an
environment it is. A major concern in cloud computing adoption is security;
however, basic network security is flawed at best. Even with modern protocols,
hackers and worms can attack a system and create havoc within a few hours.
Within a cloud computing, the prospects for incursion are many and the rewards
are rich. Architectures and applications must be protected and security must be
appropriate, emergent and adaptive. There are a lot of companies providing cloud
computing services and all of them have security techniques to provide secure
services to their customers and to solve the current cloud computing security
issues, but still the problem that each one of those services providers have his own
security architecture, policies and techniques which means that there is no one endto-
end security architecture provided as standard solution for the cloud computing
security issues. This research focuses on providing a concrete and orchestrate
solution for security in cloud computing and providing an end-to-end security
architecture to help in securing the cloud computing users’ information and privacy,
and also preventing and protecting the ongoing attacks and threads from attacking
or destroying the cloud computing user’s information.
KEYWORD
Secure cloud computing, Cloud computing Security, Secure computation, End-to-
End security.