Security Management Protocols in Cloud Computation

Cloud computing premise is very similar in that it provides a virtual computing environment that’s dynamically allocated to meet user needs. From a technical perspective, cloud computing includes service oriented architecture (SOA) and virtual applications of both hardware and software. In this new world of computing, some have conjectured that security is the biggest concern facing cloud computing. Here, we examine some security issues and the associated regulatory and legal concerns that have arisen as cloud computing emerges as a primary distributed computing platform. We would study the protocols and management rules already implemented for security in cloud network, and with the use of this study further create new protocols that would enhance the security and eases the management of security. We as author, are trying to compare the two major protocol suites that the cloud architecture uses in order to provide management of security in the clouds. The extension of the paper would yield a better protocol architecture for the cloud platform in order to enhance the security management issues that are under consideration.

Keywords: Security, Cloud Computing, SOA, CIA, Privacy, Access Management.

Craig Anderson, Jean-Loup Baer’s “A Multi-level Hierarchical Cache Coherence Protocol For Multiprocessor”, Proc. IEEE 1063-7133/93 1993, University of Washington, Seattle WA, 98195, pp.142-148.

T. Mather, S. Kumarasuwamy and S. Latif, “Cloud Security and Privacy”, O’Rielly, ISBN: 978-0-4596- 802769, 2009.

Eve Maler, Scott Cantor, Jahan Moreh, Sigaba,Rob Philpott, “Metadata for the OASIS Security Assertion Markup Language (SAML) V2.0”, 2005.

Jianchun Jiang, Weiping Wen, “Information security Issues in cloud computing environment”, Net info. Security,doi:10.3969/j.issn.1671- 1122.2010.

Gartner. “Seven cloud-computing security risks”, July 02, 2008.

Greg Boss, Padma Malladi, Dennis Quan, Linda Legregni, Harold Hall, HiPODS,

Amini, M., Sadat Safavi, N., Khavidak, D., Mojtaba, S., & Abdollahzadegan, A. (2013). Types of cloud computing (public and private) that transform the organization more effectively.

Subashini, Subashini, and Veeraruna Kavitha. "A survey on security issues in service delivery models of cloud computing." Journal of network and computer applications 34.1 (2011): 1-11.

Karadsheh, Louay. "Applying security policies and service level agreement to IaaS service model to enhance security and transition." computers & security 31.3 (2012): 315-326.

Ramgovind, Sumant, Mariki M. Eloff, and Elme Smith. "The management of security in cloud computing." Information Security for South Africa (ISSA), 2010. IEEE, 2010.

Almulla, Sameera Abdulrahman, and Chan Yeob Yeun. "Cloud computing security management." Engineering Systems Management and Its Applications (ICESMA), 2010 Second International Conference on. IEEE, 2010.