• DocumentCode
    625010
  • Title

    eCloudIDS Tier-1 iCloudIDM Layer-I (iCloudIDM-LI) Subsystem Design and Implementation through User-centric Identity Management Approach for Secure Cloud Computing Environment

  • Author

    Srinivasan, Madhan Kumar ; Sarukesi, K. ; Revathy, P.

  • Author_Institution
    Hindustan Univ., Chennai, India
  • Volume
    2
  • fYear
    2013
  • fDate
    3-6 June 2013
  • Firstpage
    206
  • Lastpage
    211
  • Abstract
    Cloud computing making ubiquitous influence in today´s ever growing and on-demand IT world. Cloud delivers the next-generation computing paradigm that showcases the possibilities of apt resource sharing, true elasticity, and maximum resource utilization as compared to any of its early competitors. In addition to its technicality, corporates are also fascinated with its attractive tag of `pay-as-you-use´ business model. After perceiving its advantages, many organizations fear in stepping into this modern computing technology, due to its severe security concerns. In today´s world, whole business computing relies on the security of customers and their data. Consequently, due to the public and multi-tenancy nature of the cloud, security concerns and its velocity are huge in volume. eCloudIDS is a next-generation security system designed with innovative hybrid two-tier expert engines, namely uX-Engine and sX-Engine, which is considered as a most suitable security solution for cloud computing environments; precisely for public cloud. This paper explores the design and implementation of eCloudIDS architecture´s Tier-1 iCloudIDM (formerly known as Behavioral Analyzer) Subsystem Layer-I (iCloudIDM-LI) through user-centric identity management approach.
  • Keywords
    cloud computing; resource allocation; security of data; ubiquitous computing; cloud computing environment security; eCloudIDS Tier-1 iCloudIDM layer-I subsystem design; eCloudIDS architecture tier-1 iCloudIDM; innovative hybrid two-tier expert engines; next-generation computing paradigm; next-generation security system; pay-as-you-use business model; resource sharing; resource utilization; sX-Engine; subsystem layer-I; uX-Engine; user-centric identity management approach; Business; Cloud computing; Computational modeling; Computer architecture; Engines; Libraries; Security; Acute Audit Repository; Cloud Computing; Cloud Security; Cloud VM/Instance Monitor; H-log-H; Special Permission Audit Repository; St; Standard Audit Repository; Warning Level Generator; eCloudIDS; eCloudIDS C3; iCloudIDM; iCloudIDM-LI; sX-Engine; uX-Engine;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Mobile Data Management (MDM), 2013 IEEE 14th International Conference on
  • Conference_Location
    Milan
  • Print_ISBN
    978-1-4673-6068-5
  • Type

    conf

  • DOI
    10.1109/MDM.2013.95
  • Filename
    6569091