Object Oriented Techniques for Cloud Computing Security

  • Madhuri R Dhange University of Pune
  • S P Deshmukh
Keywords: Cloud Computing, Cloud Computing Models, General Security Policies, Security Requirements, Use case, Misuse case, swim lane diagram

Abstract

cloud computing is a upcoming computing model which is new technology The based on distributed computing, virtualization technology, grid computing, parallel computing, utility computing and other computer technologies. It has characters such as large scale computation and data storage, virtualization, high reliability, high expansibility, and low price service. Cloud computing is becoming popular enterprise model in computer world in which computing resources are made available on-demand to the user as their requirements. Cloud computing use the internet technologies for delivery of ITEnabled services to any needed users i.e. through cloud computing we can access anything from anywhere to any computer without worrying about their storage, structure, cost, management etc. So as we use internet, it is prone to several types of security risks. Therefore a systematic strategies and processes are essential to analyze security needs. The Security policies should be implemented for cloud computing systems at multiple levels to threats, risk and weakness. Here this paper introduce a high order object oriented techniques and methods for construction of vigorous security policy to build cloud system more reliable.

References

[1] G. Sindre, A. L. Opdahl, "Eliciting Security Requirements with Misuse Cases, Requirements Engineering", SpringerVerlag London Limited,pg 34-44,2004. [2] R. J. A. Buhr, R. S. Casselman, "Use Case Maps for Oject Oriented Systems", Prentice Hall, 1995. ICCCNT'12 26th_28th July 2012, Coimbatore, India IEEE-201S0 [3] R. J. A. Buhr, " Use case maps for attributing behavior to system architecture", Proceedings of the 4th International Workshop on Parallel and Distributed Real-Time Systems, p.3, 1996. [4] Peter Karpati, Andreas L. Opdahl, GuttormSindre, "Experimental Comparison of Misuse Case Maps with Misuse Cases and System Architecture Diagrams for Eliciting Security Vulnerabilities and Mitigations", Sixth International Conference on Availability, ReI iabil ity and Security, 2011. [5] Swim Lane Diagrams, Available at www.niatx. netlPDF/PIToolbox/swimlane.pdf [6] Gartner, "Cloud Computing will be as influential as ebusiness" Available at http://www.gartner.comlitlpage.jsp?id=707508. 2008 [7] Architecture resources Bredemeyer Consulting, Available at http://www.bredemeyer.com.pdf [8] National Institute of Standards and Technology, "Cloud Computing", Available at http://csrc.nist.gov/groups/SNS/cloudcomputing/inx. html, October 2009.
[9] Peter Mell and Timothy Grance, "The NIST Definition of Cloud Computing", Special Publication 800-145,2009.
[10] SojanMarkose, Xiaoqing (Frank) Liu, and Bruce McMillin, "A Systematic Framework for Structured Object-Oriented Security Requirements Analysis in Embedded Systems",TEEE,20 Jan 2009 [11] ZhidongShen and Qiang Tong, "The Security of Cloud Computing System enabled by Trusted Computing Technology", 2nd International Conference on Signal Processing Systems (ICSPS), 2010 [12] White Paper, "Cloud Computing Use Cases Cloud Computing Use", Open Cloud Manifesto, Version 2.0, 30 October 2009 [13] Research Report, "Security of Cloud Computing Providers study" Ponemon Institute, April 2011.
Published
2018-03-23
How to Cite
Dhange, M., & Deshmukh, S. (2018). Object Oriented Techniques for Cloud Computing Security. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 1(1). Retrieved from http://www.asianssr.org/index.php/ajct/article/view/113
Section
Article

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.