Open Access   Article Go Back

Cloud Security Based on PaaS Model

Saroj Kumar1 , Santosh Kumar2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-7 , Page no. 378-385, Jul-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i7.378385

Online published on Jul 31, 2019

Copyright © Saroj Kumar, Santosh Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Saroj Kumar, Santosh Kumar, “Cloud Security Based on PaaS Model,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.7, pp.378-385, 2019.

MLA Style Citation: Saroj Kumar, Santosh Kumar "Cloud Security Based on PaaS Model." International Journal of Computer Sciences and Engineering 7.7 (2019): 378-385.

APA Style Citation: Saroj Kumar, Santosh Kumar, (2019). Cloud Security Based on PaaS Model. International Journal of Computer Sciences and Engineering, 7(7), 378-385.

BibTex Style Citation:
@article{Kumar_2019,
author = {Saroj Kumar, Santosh Kumar},
title = {Cloud Security Based on PaaS Model},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2019},
volume = {7},
Issue = {7},
month = {7},
year = {2019},
issn = {2347-2693},
pages = {378-385},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4774},
doi = {https://doi.org/10.26438/ijcse/v7i7.378385}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i7.378385}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4774
TI - Cloud Security Based on PaaS Model
T2 - International Journal of Computer Sciences and Engineering
AU - Saroj Kumar, Santosh Kumar
PY - 2019
DA - 2019/07/31
PB - IJCSE, Indore, INDIA
SP - 378-385
IS - 7
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
508 239 downloads 159 downloads
  
  
           

Abstract

Paas provide consumers easier way to produce and deploy software and cloud infrastructure [4], thus Paas doubtless occurs the best impact over any other aspect of cloud computing because it brings custom software development to the cloud. National Institute of Standards and Technology describes Paas as: “The capability provided to the consumer to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider.”[2]. Thus Paas security which is based on framework, environment, interface and different elements with connected data security. In this paper a secure model is proposed with is based on tokenization and masking technique with key management system. This paper conjointly fulfils the SPI service delivery model and FISMA ACT for PAAS security problems in any cloud service.

Key-Words / Index Term

Paas[1], SPI Model[5], Framework Security[7], FISMA[6], Component Security[8], Security[10], Tokenization of sensitive data[13], Interface Security[11], Sensitive Data, Trusted Compute Pools[12].

References

[1] Ankit Kumar Singh, Saroj Kumar, Abhishek Rai “Secure Cloud Architecture based on YAK and ECC” International Journal of Computer Applications (0975 – 8887) Volume 90– No.19, March 2014.
[2] The NIST Definition of Cloud Computing, Special Publication 800-145
[3] Gartner® Says 2011 Will Be the Year of Platform as a Service, March 14, 2011, Gartner Newsroom.
[4] Sosinsky B, Cloud Computing Bible. 1st ed. Wiley; 2011.
[5] S. Subashini and V. Kavitha, "A Survey on Security Minimal issues in service delivery models of cloud computing” Journal of Network and Computer Applications, 34(1), 2011, pp 1-11.
[6] Title III of the E-Government Act, entitled the Federal Information Security Management Act of 2002 (FISMA).
[7] Ayesha Malik, Muhammad Mohsin Nazir “Security Framework for Cloud Computing Environment: A Review” Journal of Emerging Trends in Computing and Information Sciences, ISSN 2079-8407, VOL. 3, NO. 3, March 2012.
[8] A. Buecker, M. Borrett, C. Lorenz, and C. Powers. Introducing the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security. http://www.redbooks.ibm.com/redpapers/pdfs/redp4614.pdf.
[9] Deyan Chen, Hong Zhao “Data Security and Privacy Protection Issues in Cloud Computing” 2012 International Conference on Computer Science and Electronics Engineering.
[10] Bowers KD, Juels A, Oprea A. Proofs of retrievability: Theory and implementation. In: Sion R, ed. Proc. of the 2009 ACM Workshop on Cloud Computing Security, CCSW 2009, Co-Located with the 16th ACM Computer and Communications Security Conf., CCS 2009. New York: Association for Computing Machinery, 2009. 43.54. [doi:10.1145/1655008.1655015].
[11] Practical Security Stories and Security Tasks for Agile Development Environments; http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf.
[12] NIST Interagency Report 7904: Trusted Geolocation in the Cloud: Proof of Concept Implementation (Draft) http://csrc.nist.gov/publications/drafts/ir7904/draft_ nistir_7904.pdf.
[13] Tokenization: What’s Next After PCI?, 2012, EMC Corporation http://www.emc.com/collateral/white-papers/h11918-wp-tokenization-rsa-dpm.pdf.
[14] F. Hao.“ON ROBUST KEY AGREEMENT BASED ON PUBLIC KEY AUTHENTICATION” Proceedings of the 14th International Conference on Financial Cryptography and Data Security, Tenerife, Spain, LNCS 6052, pp. 383-390, Jan 2010.
[15] Arjun Kumar, Byung Gook Lee,Hoonjae Lee,Anu. ”SECURE STORAGE AND ACCESS OF DATA IN CLOUD COMPUTING ” IEEE 2012 P.336339.
[16] S. Ramgovind, M. M. Eloff, E. Smith. “The Management of Security in Cloud Computing” In PROC 2010 IEEE International Conference on Cloud Computing 2010.
[17] Qian Wang, Cong Wang, Kui Ren, Wenjing Lou, JinLi ,”Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing”, IEEE Transactions On Parallel And Distributed Systems, Vol.22, No. 5, 2011
[18] S. Kamara and K. Lauter. Cryptographic cloud storage. In Financial Cryptography and Data Security (FC`10), volume 6054 of LNCS, pages 136{149. Springer, 2010
[19] http://www.cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf
[20] M. Jensen, J. Schwenk, N. Gruschka and L. L. Iacono, "On Technical Security Issues in Cloud Computing." in PROC IEEE ICCC, Bangalore 2009, pp. 109-116.
[21] N. Gruschka, L. L. Iancono, M. Jensen and J. Schwenk. “On Technical Security Issues in Cloud Computing” In PROC 09 IEEE International Conference on Cloud Computing, 2009 pp 110-112.
[22] Ruj S, Nayak A, Stojmernovic I. DACC: distributed access control in clouds. 2011 International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11, IEEE Computer Society, 2011: 91-98
[23] M. Klems, A. Lenk, J. Nimis, T. Sandholm and S. Tai. “What’s Inside the Cloud? An Architectural Map of the Cloud Landscape.” IEEE Xplore, pp 23-31, Jun. 2009
[24] B. Grobauer, T. Walloschek and E. Stöcker, "Understanding Cloud Computing Vulnerabilities," IEEE Security and Privacy, vol. 99, 201
[25] G. Eason, B. Noble, and I.N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529-551,
[26] Security Alliance (CSA) “Security Guidance for critical Areas of Focus in Cloud Computing” ,April 2009
[27] Sze Ming Chow “New Privacy Preserving Architecture for Identity/Attribute Based Encryption” ,New York University 2010.
[28] Kaufman, Lori M. "Can public-cloud security meet its unique challenges?."Security & Privacy, IEEE 8.4 (2010): 55-57.
[29] Ren, Kui, Cong Wang, and Qian Wang. "Security challenges for the public cloud." Internet Computing, IEEE 16.1 (2012): 69-73
[30] Bao Zhang, Changgen Peng, Zhipin Xu “Identity-based distributed cloud storage encryption scheme”, IEEE 2011, pages 610-614.