preview

Based On The Study Of Various Security Models Of Cloud

Decent Essays

Based on the study of various security models of cloud computing we have proposed a new security model of cloud computing the steps in the proposed security model are: first the user creates a local user agent, and establish a temporary security certificate, and then user agents use this certificate for secure authentication in an effective time. With this certificate, which includes the host name, user name, user id, start time, end time and security attributes etc; the user’s security access and authorization is complete. When the user’s task is to use the resource on the cloud service provider, mutual authentication take place between user agent and specific application, while the application checks if the user agents certificate is …show more content…

Standards, procedures, and guidelines referred to as policy in the superior sense of a worldwide information security policy [14].
Privilege Control: This security component is necessary to control cloud usage by different individuals and organizations. It protects user’s privacy and ensures data integrity and secrecy by applying an anthology of rules and policies. Cloud users are granted different levels of access permissions and resource ownerships based on their account type. Only authorized users can access the authorized parts of the encrypted data through identity-based decryption algorithm. For example, in a healthcare cloud, not all practitioners have the same privileges to access patient’s data, this may depend on the degree to which a practitioner is involved/specialized in treatment; patients can also allow or refuse distribution their information with other healthcare practitioners or hospitals [24]. Encryption/Decryption algorithms [23] such as AES [5] [7] and RC4 [6] can be employed by this component to achieve confidentiality of information [22].
Data Protection: Data stored in the cloud storage resources may be very sensitive and critical, for example, clouds may host electronic healthcare records (EHR) which contain patients’ private information and their health history [15]. They may also

Get Access