Open Access Open Access  Restricted Access Subscription or Fee Access

An Effective Cloud-Based Effect Safe keeping Classification by Arithmetical Document

D. Jansirani, D. Jayakumar

Abstract


Developments in Cloud Computing and its robust nature has made academic institutions to build their institution applications which include results around the Cloud. The challenges of security of data in when it is managed as a service (DBaaS) in the Cloud and the believe that the data is really secured remain a problem for Cloud application service users. In order to ensure trust and security of students results and who access it an efficient security method is required. This paper investigates some of the privacy and security issues encountered in cloud computing, and a cloud result security system is developed using a two form authentication. This is achieved by the use of digital certificate in combination with normal Cloud security system for authentication of users and encryption for storage of data. We apply the MVC architecture in developing the user interface in order to control unauthorized access to different parts of the application, using role based authorization. Though this study is carried out using students results of higher academic institutions, but other organizations can also adopt the security techniques applied here to secure their Cloud application systems.


Keywords


Cloud, Security, Digital Certificate, Students Result, Dbaas, Unauthorized Access

Full Text:

PDF

References


Chase, N. (2014). Understanding the Cloud and Building Your Own Infrastructure-As-A-Service. Cloud Platform Research Report, DZone. 15, 16.

NIST (2011). The NIST Definition of Cloud Computing. Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-145.1-3.

Obunadike, G., Tyokyaa, R. and Umeh, A., (2014). A Phase Approach for Adopting Private Clouds as a Collaborative Platform for Nigerian Universities. Information and Knowledge Management.www.iiste.org ISSN 2224-5758 (Paper) ISSN 2224-896X (Online) Vol.4, No.9.

Labourey, S. (2014).CloudBees: 4 Key Things You Should Know About Platform-as-a-Service. Dzone Research - The 2014 Cloud Platform Research Report.

William S. (2016) How to Choose a DBaaS, DZone Guide to Data Persistence, DZone USA

IBM (2012). Applying the cloud in education: An innovative approach to IT. White Paper by International Business Machine, 3- 7

Sclater, N. (2010). Cloud Computing in Education, Policy Brief.UNESCO Institute for Information Technologies in Education, Russian Federation, Moscow, 2010. 3-5

Crucial Cloud Hosting, (2014). Cloud Computing in Education: Introducing Classroom Innovation. Whitepaper by http://www.crucial.com.au.2-7.

Ahmad, N. and Habib, K. (2010).Analysis of Network Security Threats and Vulnerabilities by Development & Implementation of a Security Network Monitoring Solution.Blekinge Institute of Technology. 41-50

Entrust (2007). Understanding Digital Certificates & Secure Sockets Layer: A Fundamental Requirement for Internet Transactions. „Author‟.4.

G. ReeseCloud Application Architectures: Building Applications and Infrastructure in the Cloud, Theory in Practice, O’Reilly Media (2009)

National Institute of Standards and Technology, The NIST Definition of Cloud Computing, Information Technology Laboratory, 2009.

A. Nagarajan, V. Varadharajan Dynamic trust enhanced security model for trusted platform based Future Generation Computer Systems (2010) http://dx.doi.org/10.1016/j.future.2010.10.008

Security and Economic Benefits of Standardization for Security as a Service. September 2011 Proceedings. United Nations ITU-T.

International Workshop on Grid Economics and Business Models (GECON’09) , pp. 60-73, August 25-28, 2009, Delft, The Netherl Ands.


Refbacks

  • There are currently no refbacks.