Shade Hope - A Protection Model
Keywords:
Cloud computing, advanced persistent threats, centralized server, cloud watch.Abstract
The cloud is considered to be one of the most emerging technologies all around the globe. Cloud differs massively from other methods rather than having a centralized server. Hence we present a protection model in order to present the cloud from the advanced persistent threats. The penetration the cloud leads the vulnerability to the data present in the cloud hence protection to the cloud is considered to be the one of the major action to be action to be taken. Hence we introduce the cloud watch technique by implementing the trust manager and monitor the cloud in order to prevent the cloud from penetration.
References
- W. Jansen and T. Grance, “Guidelines on security and privacy in public cloud computing,” NIST Spec. Publ. 800–144, National Institute of Standards and Technology, Gaithersburg, MD 20899, Dec. 2011.
- P. Mell and T. Grance, “The NIST definition of cloud computing,” NIST, Gaithersburg, MD, USA, Tech, Rep. SP 800-145, 2011.
- P. Jamshidi, A. Ahmad, and C. Pahl, “Cloud migration research: A systematic review,” IEEE Trans. Cloud Comput., vol. 1, no. 2, pp. 142–157, Jul.–Dec. 2013.
- L. Vaquero, L. Rodero-Merino, and D. Moran, “Locking the sky: A survey on IaaS cloud security,” Computing, vol. 91, no. 1, pp. 93–118, Jan. 2011.
- T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, “Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds,” in Proc. 16th ACM Conf. Comput. Commun. Security, 2009, pp. 199–212.
- A. Sood and R. Enbody, “Targeted cyber-attacks-a superset of advanced persistent threats,” IEEE Security Privacy, vol. 11, no. 1, pp. 54–61, Jan./Feb. 2013.
- B. Krekel, “Capability of the people’s republic of china to conduct cyber warfare and computer network exploitation,” U.S.-China Economic and Security Review Commission, Northrop Grumman Corp., DTIC Document, 2009.
- S. Zevin, Standards for Security Categorization of Federal Information and Information Systems, DIANE Publishing, 2009.
- J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, “All your clouds are belong to us: security analysis of cloud management interfaces,” in Proc. 3rd ACM Workshop Cloud.
- Comput. Security Workshop, 2011, pp. 3–14. V. J. Winkler, Securing the Cloud: Cloud Computer Security Techniques and Tactics. Amsterdam, The Netherlands: Elsevier, 2011.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.