Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Unique Token based Approach for Secure Cloud Computing


Affiliations
1 Visvesvaraya Technological University, Belgaum, Karnataka, India
     

   Subscribe/Renew Journal


The proposed system highlights a model for large-scale Smartphone based sensor networks, with sensor information processed by clouds and grids, with a mediation layer for processing, filtering and other mashups done via a brokering network. Final aggregate results are assumed to be sent to users through traditional cloud interfaces such as browsers. We conjecture that such a network configuration will have significant sensing applications, and perform some preliminary work in both defining the system, and considering threats to the system as a whole from different perspectives. We then discuss our current, initial approaches to solving three portions of the overall security architecture: i) Risk Analysis relating to the possession and environment of the Smartphone sensors, ii) New malware threats and defenses installed on the sensor network proper, and iii) An analysis of covert channels being used to circumvent encryption in the user/cloud interface.

Keywords

Andriod, Brokered Network, Cloud Computing, Cloud Security Management.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 282

PDF Views: 3




  • A Unique Token based Approach for Secure Cloud Computing

Abstract Views: 282  |  PDF Views: 3

Authors

M. V. Raghavendra Reddy
Visvesvaraya Technological University, Belgaum, Karnataka, India
H. Srinivasa Murthy
Visvesvaraya Technological University, Belgaum, Karnataka, India

Abstract


The proposed system highlights a model for large-scale Smartphone based sensor networks, with sensor information processed by clouds and grids, with a mediation layer for processing, filtering and other mashups done via a brokering network. Final aggregate results are assumed to be sent to users through traditional cloud interfaces such as browsers. We conjecture that such a network configuration will have significant sensing applications, and perform some preliminary work in both defining the system, and considering threats to the system as a whole from different perspectives. We then discuss our current, initial approaches to solving three portions of the overall security architecture: i) Risk Analysis relating to the possession and environment of the Smartphone sensors, ii) New malware threats and defenses installed on the sensor network proper, and iii) An analysis of covert channels being used to circumvent encryption in the user/cloud interface.

Keywords


Andriod, Brokered Network, Cloud Computing, Cloud Security Management.