Author : Kulvinder Singh 1
Date of Publication :22nd February 2018
Abstract: Today cloud computing is seen as the feature of IT industry. Use of IAAS, PAAS and SAAS is transforming capital expenses (CapEx) into operational expenses (OpEx) without sacrificing performance of communication and without compromising security and even streamlines workload with maximum profits. As organization look to build up modern IT architecture that scales rapidly and globally while supporting numerous digital channels and a variety of devices, the cloud is nothing less than critical. This paper, on one hand, exaggerates cloud feature like SSO with its underlying implementation details using SAML, improves communication security at TLS level and uses improved DH as “DH with an ASCII digit" to secure (handshake) public and private key shared on the network, on the other hand. These two additional security factors make cloud users more immune & secure and cloud security invincible for eavesdroppers/ attackers.
Reference :
-
- https://www.teneo.net/wp content/ uploads/ 2017/ 09/ riverbed -stages -cloud -adoption -designebook. Pdf
- Cloud Computing Market Maturity Study Results, CSA Cloud Security Alliance, 2012.
- Amazon elastic compute cloud (Amazon EC2),” http://aws. amazon.com/ec2/, 2012.
- Wailly, M. Lacoste, and H. Debar. Towards Multi-Layer Autonomic Isolation of Cloud Computing and Networking Resources. In Workshop on Crytography and Security in Clouds (CSC), 2011.
- Kulvinder Singh, Sarita Negi “Service Model Specific Security Requirements and Threats in Cloud Computing” International Journal of Advanced Research in Computer Science and Software Engineering Volume 5, Issue 7, July 2015.
- Mohammed A.Alzain,Ben Soh and Eric Pardede, “A survey on data security in cloud Computing,”Journal of software, May 2013.