Open Access Open Access  Restricted Access Subscription or Fee Access

Data Security using Cloud Computing Adaption Framework

Safeeda ., Savitha C.K, Prajna M.R, Ujwal U.J

Abstract


It is important to provide real-time data security for huge amount of data in cloud computing. A recent survey on cloud security stated that security of users’ data has the highest priority as well as concern. This can be able to achieve with an approach, which is systematic, adoptable and well structured. Therefore, here a framework called as Cloud Computing Adoption Framework (CCAF) has been developed which has been customized for securing cloud data. This paper presents the overview, components in the CCAF, which enables data security. CCAF is designed to provide multi-layered security. Since the Data Centre has 10 petabytes of data, there is a huge challenge to provide real-time protection and quarantine. In order to simulate how data in use, here we make use of Business Process Modelling Notation (BPMN). The use of BPMN simulation will allow evaluating the chosen security performances before actual implementation. Results show that the time taken for controlling security breach is between 50 and 125 hours. This means that additional security is required to ensure that all data are well protected in the crucial 125 hours. This paper has also demonstrated that CCAF multi-layered security is able to protect data in real-time and it has three layers of security: (1) firewall and access control; (2) identity management and intrusion prevention and (3) convergent encryption. To validate CCAF, this paper has considered ethical-hacking experiments involved with penetration testing with 10,000 Trojans and viruses. The CCAF multi-layered security is going to block 9,919 viruses and Trojans, which can be destroyed in seconds, and it quarantines or isolates the remaining viruses and Trojans. Although there is a decrease in percentage of blocking for continuous injection of viruses and Trojans, 97.43 percent of them can be quarantined can be shown by the experiment. Our CCAF multi-layered security gives an average of 20 percent better performance compared to the single-layered approach, which could only block 7,438 viruses and Trojans. When CCAF is combined with BPMN simulation it can be more effective in order to evaluate security process and penetrating testing results.  Cite this Article Safeeda, Savitha C.K., Prajna M.R. et al. Data Security using Cloud Computing Adaption Framework. Journal of Computer Technology & Applications. 2016; 7(3): 25–32p

Keywords


Cloud computing adoption framework (CCAF), Business Process Modelling Notation (BPMN), Penetration test, multi-layered security protection

Full Text:

PDF

Refbacks

  • There are currently no refbacks.