Title :
The proposed model for security in the cloud, controlled by the end user
Author :
Hyseni, Dhurate ; Cico, Betim ; Shabani, Isak
Author_Institution :
CST Fac., South East Eur. Univ. (SEEU), Tetovo, Macedonia
Abstract :
Cloud environment offers a great possibility in computing, it is immensely helpful to all parties, enables quick access to data and space usage is based on the needs. In this context public data is exposed to other parties for different purposes but private data must be protected when used in different operations in order to have a secure environment. The aim of this work is to provide a logical view for a proposed model in cloud, where the main role in selecting the level of security falls to the end user. In the proposed model by end user we refer to IT administrator of a particular organization which is informed about all statistics our model offer. Therefore the end user is aware of the main parameters which are related to the cloud security. After selecting the level of security the entire communication continues on the same level, for each member of that organization.
Keywords :
cloud computing; data protection; information retrieval; security of data; statistical analysis; IT administrator; cloud computing; cloud security; context public data protection; end user; private data security; Cloud computing; Computational modeling; Data models; Encryption; Organizations; IaaS-Infrastructure as a Service; PaaS-Platform as a Service; SLA-Service Level Agreements; SaaS-Software as a Service; VMM-Virtual Machine Monitor; end user (IT administrator);
Conference_Titel :
Embedded Computing (MECO), 2015 4th Mediterranean Conference on
Conference_Location :
Budva
Print_ISBN :
978-1-4799-8999-7
DOI :
10.1109/MECO.2015.7181871