DocumentCode :
625010
Title :
eCloudIDS Tier-1 iCloudIDM Layer-I (iCloudIDM-LI) Subsystem Design and Implementation through User-centric Identity Management Approach for Secure Cloud Computing Environment
Author :
Srinivasan, Madhan Kumar ; Sarukesi, K. ; Revathy, P.
Author_Institution :
Hindustan Univ., Chennai, India
Volume :
2
fYear :
2013
fDate :
3-6 June 2013
Firstpage :
206
Lastpage :
211
Abstract :
Cloud computing making ubiquitous influence in today´s ever growing and on-demand IT world. Cloud delivers the next-generation computing paradigm that showcases the possibilities of apt resource sharing, true elasticity, and maximum resource utilization as compared to any of its early competitors. In addition to its technicality, corporates are also fascinated with its attractive tag of `pay-as-you-use´ business model. After perceiving its advantages, many organizations fear in stepping into this modern computing technology, due to its severe security concerns. In today´s world, whole business computing relies on the security of customers and their data. Consequently, due to the public and multi-tenancy nature of the cloud, security concerns and its velocity are huge in volume. eCloudIDS is a next-generation security system designed with innovative hybrid two-tier expert engines, namely uX-Engine and sX-Engine, which is considered as a most suitable security solution for cloud computing environments; precisely for public cloud. This paper explores the design and implementation of eCloudIDS architecture´s Tier-1 iCloudIDM (formerly known as Behavioral Analyzer) Subsystem Layer-I (iCloudIDM-LI) through user-centric identity management approach.
Keywords :
cloud computing; resource allocation; security of data; ubiquitous computing; cloud computing environment security; eCloudIDS Tier-1 iCloudIDM layer-I subsystem design; eCloudIDS architecture tier-1 iCloudIDM; innovative hybrid two-tier expert engines; next-generation computing paradigm; next-generation security system; pay-as-you-use business model; resource sharing; resource utilization; sX-Engine; subsystem layer-I; uX-Engine; user-centric identity management approach; Business; Cloud computing; Computational modeling; Computer architecture; Engines; Libraries; Security; Acute Audit Repository; Cloud Computing; Cloud Security; Cloud VM/Instance Monitor; H-log-H; Special Permission Audit Repository; St; Standard Audit Repository; Warning Level Generator; eCloudIDS; eCloudIDS C3; iCloudIDM; iCloudIDM-LI; sX-Engine; uX-Engine;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Mobile Data Management (MDM), 2013 IEEE 14th International Conference on
Conference_Location :
Milan
Print_ISBN :
978-1-4673-6068-5
Type :
conf
DOI :
10.1109/MDM.2013.95
Filename :
6569091
Link To Document :
بازگشت