Skip to main content
Erschienen in: The Journal of Supercomputing 1/2019

11.12.2015

A domain-divided configurable security model for cloud computing-based telecommunication services

verfasst von: Jinan Shen, Deqing Zou, Hai Jin, Bin Yuan, Weiqi Dai

Erschienen in: The Journal of Supercomputing | Ausgabe 1/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud computing emerges as one of the most promising technologies and is widely used in many fields. Cloud computing has been considered as an appropriate environment for telecommunication services. However, more threats appear in the migration of applications and telecommunication services from a traditional computing environment to a cloud platform. Traditional device-centric security systems are not effective as resources in the cloud are out of the users control. Data storage and processing for a telecommunication service in the cloud can be structured as a data service in PaaS (Platform-as-a-Service) level. Upper-level applications exchange data with the data service. In this paper, we propose a domain-divided security model in which different security policies are separately applied for three domains: the data storage domain, the data processing domain and the data transmission domain. In addition, security policies can be configured for upper-level applications based on their security requirements. Experimental results show that our proposed security model is both practical and lightweight as it can provide differentiated security protection for cloud computing-based telecommunication service with a low overhead.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhu Z, Gupta P, Wang Q, Kalyanaraman S, Lin Y, Franke H, Sarangi S (2011) Virtual base station pool: towards a wireless network cloud for radio access networks. In: Proceedings of the 8th ACM international conference on computing frontiers. ACM, p 34 Zhu Z, Gupta P, Wang Q, Kalyanaraman S, Lin Y, Franke H, Sarangi S (2011) Virtual base station pool: towards a wireless network cloud for radio access networks. In: Proceedings of the 8th ACM international conference on computing frontiers. ACM, p 34
2.
Zurück zum Zitat Campowsky K, Carella G, Magedanz T, Schreiner F (2012) Optimization of elastic cloud brokerage mechanisms for future telecommunication service environments. PIK-Praxis der Informationsverarbeitung und Kommunikation 35(3):153–159CrossRef Campowsky K, Carella G, Magedanz T, Schreiner F (2012) Optimization of elastic cloud brokerage mechanisms for future telecommunication service environments. PIK-Praxis der Informationsverarbeitung und Kommunikation 35(3):153–159CrossRef
3.
Zurück zum Zitat Khan AN, Kiah MM, Madani SA, Ali M et al (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Supercomput 66(3):1687–1706CrossRef Khan AN, Kiah MM, Madani SA, Ali M et al (2013) Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J Supercomput 66(3):1687–1706CrossRef
4.
Zurück zum Zitat Nkosi M., Mekuria F (2010) Cloud computing for enhanced mobile health applications. In: 2010 IEEE second international conference on cloud computing technology and science (CloudCom). IEEE, pp 629–633 Nkosi M., Mekuria F (2010) Cloud computing for enhanced mobile health applications. In: 2010 IEEE second international conference on cloud computing technology and science (CloudCom). IEEE, pp 629–633
5.
Zurück zum Zitat Ahmed M, Xiang Y (2010) Above the trust and security in cloud computing: a notion towards innovation. In: IEEE/IFIP 2010: proceedings of the IEEE/IFIP 8th international conference embedded and ubiquitous computing 2010. IEEE, pp 723–730 Ahmed M, Xiang Y (2010) Above the trust and security in cloud computing: a notion towards innovation. In: IEEE/IFIP 2010: proceedings of the IEEE/IFIP 8th international conference embedded and ubiquitous computing 2010. IEEE, pp 723–730
6.
Zurück zum Zitat Cao N, Yang Z, Wang C, Ren K, Lou W (2011) Privacy-preserving query over encrypted graph-structured data in cloud computing. In: 2011 31st International conference on distributed computing systems (ICDCS). IEEE, pp 393–402 Cao N, Yang Z, Wang C, Ren K, Lou W (2011) Privacy-preserving query over encrypted graph-structured data in cloud computing. In: 2011 31st International conference on distributed computing systems (ICDCS). IEEE, pp 393–402
7.
Zurück zum Zitat Mowbray M, Pearson S, Shen Y (2012) Enhancing privacy in cloud computing via policy-based obfuscation. J Supercomput 61(2):267–291CrossRef Mowbray M, Pearson S, Shen Y (2012) Enhancing privacy in cloud computing via policy-based obfuscation. J Supercomput 61(2):267–291CrossRef
8.
Zurück zum Zitat Feng D-G, Zhang M, Zhang Y, Xu Z (2011) Study on cloud computing security. J Softw 22(1):71–83CrossRef Feng D-G, Zhang M, Zhang Y, Xu Z (2011) Study on cloud computing security. J Softw 22(1):71–83CrossRef
9.
Zurück zum Zitat Chen D, Zhao H (2012) Data security and privacy protection issues in cloud computing. In: 2012 International conference on computer science and electronics engineering (ICCSEE), vol 1. IEEE, pp 647–651 Chen D, Zhao H (2012) Data security and privacy protection issues in cloud computing. In: 2012 International conference on computer science and electronics engineering (ICCSEE), vol 1. IEEE, pp 647–651
10.
Zurück zum Zitat Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11CrossRef Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11CrossRef
11.
Zurück zum Zitat Angeli D, Masala E (2012) A cost-effective cloud computing framework for accelerating multimedia communication simulations. J Parallel Distrib Comput 72(10):1373–1385CrossRef Angeli D, Masala E (2012) A cost-effective cloud computing framework for accelerating multimedia communication simulations. J Parallel Distrib Comput 72(10):1373–1385CrossRef
12.
Zurück zum Zitat Bellavista P, Carella G, Foschini L, Magedanz T, Schreiner F, Campowsky K (2012) QoS-aware elastic cloud brokering for IMS infrastructures. In: 2012 IEEE symposium on computers and communications (ISCC). IEEE, pp 000157–000160 Bellavista P, Carella G, Foschini L, Magedanz T, Schreiner F, Campowsky K (2012) QoS-aware elastic cloud brokering for IMS infrastructures. In: 2012 IEEE symposium on computers and communications (ISCC). IEEE, pp 000157–000160
13.
Zurück zum Zitat Khan AN, Kiah MM, Khan SU, Madani SA (2013) Towards secure mobile cloud computing: a survey. Future Gener Comput Syst 29(5):1278–1299CrossRef Khan AN, Kiah MM, Khan SU, Madani SA (2013) Towards secure mobile cloud computing: a survey. Future Gener Comput Syst 29(5):1278–1299CrossRef
14.
Zurück zum Zitat Pan W, Duan Y (2010) Research of the application of cloud computing in telecommunication industry. Telecommun Sci 26(6):26–29 Pan W, Duan Y (2010) Research of the application of cloud computing in telecommunication industry. Telecommun Sci 26(6):26–29
15.
Zurück zum Zitat Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I et al (2010) A view of cloud computing. Commun ACM 53(4):50–58CrossRef Armbrust M, Fox A, Griffith R, Joseph AD, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I et al (2010) A view of cloud computing. Commun ACM 53(4):50–58CrossRef
16.
Zurück zum Zitat López-Ibáñez M, Prasad TD, Paechter B (2008) Ant colony optimization for optimal control of pumps in water distribution networks. J Water Resour Plan Manag 134(4):337–346CrossRef López-Ibáñez M, Prasad TD, Paechter B (2008) Ant colony optimization for optimal control of pumps in water distribution networks. J Water Resour Plan Manag 134(4):337–346CrossRef
17.
Zurück zum Zitat Bagirov AM, Barton A, Mala-Jetmarova H, Al Nuaimat A, Ahmed S, Sultanova N, Yearwood J (2013) An algorithm for minimization of pumping costs in water distribution systems using a novel approach to pump scheduling. Math Comput Model 57(3):873–886CrossRef Bagirov AM, Barton A, Mala-Jetmarova H, Al Nuaimat A, Ahmed S, Sultanova N, Yearwood J (2013) An algorithm for minimization of pumping costs in water distribution systems using a novel approach to pump scheduling. Math Comput Model 57(3):873–886CrossRef
Metadaten
Titel
A domain-divided configurable security model for cloud computing-based telecommunication services
verfasst von
Jinan Shen
Deqing Zou
Hai Jin
Bin Yuan
Weiqi Dai
Publikationsdatum
11.12.2015
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 1/2019
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-015-1587-5

Weitere Artikel der Ausgabe 1/2019

The Journal of Supercomputing 1/2019 Zur Ausgabe