Internet of Things and Cloud Computing

| Peer-Reviewed |

Security Enhancement in Multi Clouds Using Serverless Computing Approach

Received: 18 January 2018    Accepted: 01 February 2018    Published: 14 March 2018
Views:       Downloads:

Share This Article

Abstract

Nowadays, in any application specific domain security plays a vital role in the service access environment. Because customers needs to make use of distinct services and resources in an attacks free surface. In cloud computing environment, the security services and portal systems have been highly progressed based on the user requirements. However, cloud offers plenty of resources through the service vendor globally; still the multi clouds problems are not resolved completely. So, it is very essential to protect the data and other resources from the intruders are a most primary factor. The proposed work will establish a security layer on the multiple cloud environments by introducing the concept of “Serverless Computing”. The serverless computing is a kind of cloud computing execution model through which the cloud service provider (CSP) can manage the allocation of system resources in a dynamic manner. This mechanism will follow the property of utility computing. This approach can be used to hide the operations on entire cloud server management end and capacity planning decisions and also uses no provisioned services. Any type of vulnerabilities is taken care of by the cloud service provider. In this process, attacks rate are compared with the traditional security architectures and each component is an entry point to the serverless application. With this approach, customers can control and monitor the workloads by using IDS / IPS technique.

DOI 10.11648/j.iotcc.20180601.12
Published in Internet of Things and Cloud Computing (Volume 6, Issue 1, March 2018)
Page(s) 12-16
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Cloud User, Cloud Service Provider, Virtual Machine, Virtual Machine Manager, Intrusion Detection System, Intrusion Prevention System, Cloud Let, Multiple Clouds

References
[1] M. King, M. Muehlemann, "Transforming the reliability, security and scalability of IT communications through the pervasive deployment of serverless software infrastructure", IEEE Journal on peer-to-peer computing, ISBN: 0-7695-1810-9, 2002.
[2] Nilton Bila, Paolo Dettori et.al, "Leveraging the Serverless Architecture for Securing Linux Containers", Published in: Distributed Computing Systems Workshops (ICDCSW), IEEE International Conference on Distributed computing systems, ISSN: 2332-5666, 2017.
[3] Youngioo Shin, Dongyoung Koo et.al, "SEED: Enabling Serverless and Efficient Encrypted Deduplication for Cloud Storage", IEEE international conference on Cloud Computing Technology and Science (CloudCom), ISSN: 2330-2186, 2016.
[4] Collins Mtita, Maryline Laurent et.al, "Serverless lightweight mutual authentication protocol for small mobile computing devices", International Conference on New Technologies, Mobility and Security (NTMS), ISSN: 2157-4960, 2015.
[5] Sheikh I. Ahamed, Farzana Rahman et.al, "S3PR: Secure Serverless Search Protocols for RFID", International Conference on Information Security and Assurance, ISBN: 978-0-7695-3126-7, 2008.
[6] Poornima, B.; Rajendran, T, “Improving Cloud Security by Enhanced HASBE Using Hybrid Encryption Scheme”, Computing and Communication Technologies (WCCCT), 2014 World Congress on march-14.
[7] Durrani, A, “Analysis and prevention of vulnerabilities in cloud applications”, Information Assurance and Cyber Security (CIACS), 2014 IEEE Conference on 2014.
[8] Chang Liu; “Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates Parallel and Distributed Systems”, IEEE Transactions on cloud computing - 2014.
[9] Hussain, M.; “Effective Third Party Auditing in Cloud Computing”, International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2014.
[10] Vikas Saxena, et.al, “Implementation of a secure genome sequence search platform on public cloud-leveraging open source solutions”, Journal of Cloud Computing: Advances, Systems and Applications 2014.
Author Information
  • Department of Computer Science and Engineering, Sri Chandra Sekharendra Saraswathi Viswa Maha Vidhyala (SCSVMV) University, Kanchipuram, India

  • Department of Computer Science and Engineering, Sri Chandra Sekharendra Saraswathi Viswa Maha Vidhyala (SCSVMV) University, Kanchipuram, India

Cite This Article
  • APA Style

    R. Poorvadevi, S. Ramamoorthy. (2018). Security Enhancement in Multi Clouds Using Serverless Computing Approach. Internet of Things and Cloud Computing, 6(1), 12-16. https://doi.org/10.11648/j.iotcc.20180601.12

    Copy | Download

    ACS Style

    R. Poorvadevi; S. Ramamoorthy. Security Enhancement in Multi Clouds Using Serverless Computing Approach. Internet Things Cloud Comput. 2018, 6(1), 12-16. doi: 10.11648/j.iotcc.20180601.12

    Copy | Download

    AMA Style

    R. Poorvadevi, S. Ramamoorthy. Security Enhancement in Multi Clouds Using Serverless Computing Approach. Internet Things Cloud Comput. 2018;6(1):12-16. doi: 10.11648/j.iotcc.20180601.12

    Copy | Download

  • @article{10.11648/j.iotcc.20180601.12,
      author = {R. Poorvadevi and S. Ramamoorthy},
      title = {Security Enhancement in Multi Clouds Using Serverless Computing Approach},
      journal = {Internet of Things and Cloud Computing},
      volume = {6},
      number = {1},
      pages = {12-16},
      doi = {10.11648/j.iotcc.20180601.12},
      url = {https://doi.org/10.11648/j.iotcc.20180601.12},
      eprint = {https://download.sciencepg.com/pdf/10.11648.j.iotcc.20180601.12},
      abstract = {Nowadays, in any application specific domain security plays a vital role in the service access environment. Because customers needs to make use of distinct services and resources in an attacks free surface. In cloud computing environment, the security services and portal systems have been highly progressed based on the user requirements. However, cloud offers plenty of resources through the service vendor globally; still the multi clouds problems are not resolved completely. So, it is very essential to protect the data and other resources from the intruders are a most primary factor. The proposed work will establish a security layer on the multiple cloud environments by introducing the concept of “Serverless Computing”. The serverless computing is a kind of cloud computing execution model through which the cloud service provider (CSP) can manage the allocation of system resources in a dynamic manner. This mechanism will follow the property of utility computing. This approach can be used to hide the operations on entire cloud server management end and capacity planning decisions and also uses no provisioned services. Any type of vulnerabilities is taken care of by the cloud service provider. In this process, attacks rate are compared with the traditional security architectures and each component is an entry point to the serverless application. With this approach, customers can control and monitor the workloads by using IDS / IPS technique.},
     year = {2018}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Security Enhancement in Multi Clouds Using Serverless Computing Approach
    AU  - R. Poorvadevi
    AU  - S. Ramamoorthy
    Y1  - 2018/03/14
    PY  - 2018
    N1  - https://doi.org/10.11648/j.iotcc.20180601.12
    DO  - 10.11648/j.iotcc.20180601.12
    T2  - Internet of Things and Cloud Computing
    JF  - Internet of Things and Cloud Computing
    JO  - Internet of Things and Cloud Computing
    SP  - 12
    EP  - 16
    PB  - Science Publishing Group
    SN  - 2376-7731
    UR  - https://doi.org/10.11648/j.iotcc.20180601.12
    AB  - Nowadays, in any application specific domain security plays a vital role in the service access environment. Because customers needs to make use of distinct services and resources in an attacks free surface. In cloud computing environment, the security services and portal systems have been highly progressed based on the user requirements. However, cloud offers plenty of resources through the service vendor globally; still the multi clouds problems are not resolved completely. So, it is very essential to protect the data and other resources from the intruders are a most primary factor. The proposed work will establish a security layer on the multiple cloud environments by introducing the concept of “Serverless Computing”. The serverless computing is a kind of cloud computing execution model through which the cloud service provider (CSP) can manage the allocation of system resources in a dynamic manner. This mechanism will follow the property of utility computing. This approach can be used to hide the operations on entire cloud server management end and capacity planning decisions and also uses no provisioned services. Any type of vulnerabilities is taken care of by the cloud service provider. In this process, attacks rate are compared with the traditional security architectures and each component is an entry point to the serverless application. With this approach, customers can control and monitor the workloads by using IDS / IPS technique.
    VL  - 6
    IS  - 1
    ER  - 

    Copy | Download

  • Sections