Security Enhancement in Multi Clouds Using Serverless Computing Approach
Internet of Things and Cloud Computing
Volume 6, Issue 1, March 2018, Pages: 12-16
Received: Jan. 18, 2018; Accepted: Feb. 1, 2018; Published: Mar. 14, 2018
Views 348      Downloads 21
Authors
R. Poorvadevi, Department of Computer Science and Engineering, Sri Chandra Sekharendra Saraswathi Viswa Maha Vidhyala (SCSVMV) University, Kanchipuram, India
S. Ramamoorthy, Department of Computer Science and Engineering, Sri Chandra Sekharendra Saraswathi Viswa Maha Vidhyala (SCSVMV) University, Kanchipuram, India
Article Tools
Follow on us
Abstract
Nowadays, in any application specific domain security plays a vital role in the service access environment. Because customers needs to make use of distinct services and resources in an attacks free surface. In cloud computing environment, the security services and portal systems have been highly progressed based on the user requirements. However, cloud offers plenty of resources through the service vendor globally; still the multi clouds problems are not resolved completely. So, it is very essential to protect the data and other resources from the intruders are a most primary factor. The proposed work will establish a security layer on the multiple cloud environments by introducing the concept of “Serverless Computing”. The serverless computing is a kind of cloud computing execution model through which the cloud service provider (CSP) can manage the allocation of system resources in a dynamic manner. This mechanism will follow the property of utility computing. This approach can be used to hide the operations on entire cloud server management end and capacity planning decisions and also uses no provisioned services. Any type of vulnerabilities is taken care of by the cloud service provider. In this process, attacks rate are compared with the traditional security architectures and each component is an entry point to the serverless application. With this approach, customers can control and monitor the workloads by using IDS / IPS technique.
Keywords
Cloud User, Cloud Service Provider, Virtual Machine, Virtual Machine Manager, Intrusion Detection System, Intrusion Prevention System, Cloud Let, Multiple Clouds
To cite this article
R. Poorvadevi, S. Ramamoorthy, Security Enhancement in Multi Clouds Using Serverless Computing Approach, Internet of Things and Cloud Computing. Vol. 6, No. 1, 2018, pp. 12-16. doi: 10.11648/j.iotcc.20180601.12
Copyright
Copyright © 2018 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
References
[1]
M. King, M. Muehlemann, "Transforming the reliability, security and scalability of IT communications through the pervasive deployment of serverless software infrastructure", IEEE Journal on peer-to-peer computing, ISBN: 0-7695-1810-9, 2002.
[2]
Nilton Bila, Paolo Dettori et.al, "Leveraging the Serverless Architecture for Securing Linux Containers", Published in: Distributed Computing Systems Workshops (ICDCSW), IEEE International Conference on Distributed computing systems, ISSN: 2332-5666, 2017.
[3]
Youngioo Shin, Dongyoung Koo et.al, "SEED: Enabling Serverless and Efficient Encrypted Deduplication for Cloud Storage", IEEE international conference on Cloud Computing Technology and Science (CloudCom), ISSN: 2330-2186, 2016.
[4]
Collins Mtita, Maryline Laurent et.al, "Serverless lightweight mutual authentication protocol for small mobile computing devices", International Conference on New Technologies, Mobility and Security (NTMS), ISSN: 2157-4960, 2015.
[5]
Sheikh I. Ahamed, Farzana Rahman et.al, "S3PR: Secure Serverless Search Protocols for RFID", International Conference on Information Security and Assurance, ISBN: 978-0-7695-3126-7, 2008.
[6]
Poornima, B.; Rajendran, T, “Improving Cloud Security by Enhanced HASBE Using Hybrid Encryption Scheme”, Computing and Communication Technologies (WCCCT), 2014 World Congress on march-14.
[7]
Durrani, A, “Analysis and prevention of vulnerabilities in cloud applications”, Information Assurance and Cyber Security (CIACS), 2014 IEEE Conference on 2014.
[8]
Chang Liu; “Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates Parallel and Distributed Systems”, IEEE Transactions on cloud computing - 2014.
[9]
Hussain, M.; “Effective Third Party Auditing in Cloud Computing”, International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2014.
[10]
Vikas Saxena, et.al, “Implementation of a secure genome sequence search platform on public cloud-leveraging open source solutions”, Journal of Cloud Computing: Advances, Systems and Applications 2014.
ADDRESS
Science Publishing Group
548 FASHION AVENUE
NEW YORK, NY 10018
U.S.A.
Tel: (001)347-688-8931