• DocumentCode
    584754
  • Title

    Security of cloud computing system using object oriented technique

  • Author

    Shukla, Satyavati ; Kumar Singh, Rakesh

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Kamala Nehru Inst. of Technol., Sultanpur, India
  • fYear
    2012
  • fDate
    26-28 July 2012
  • Firstpage
    1
  • Lastpage
    9
  • Abstract
    Cloud computing is a new emerging technology. It has been coming forth as an alternative computing environment where web-based services allow for different kinds of users to obtain a large variety of resources, such as software and hardware. Cloud Computing provides a way to share large amount of distributed resources belonging to different organizations through the internet, So it is prone to several types of security risks. Therefore a systematic methodology and process are indispensable to analyze security requirements. The Security policies should be developed for cloud computing systems at multiple levels to threats, risk and vulnerability. Here we discuss about a high order object oriented techniques and methods for construction of robust security policy to build cloud system more reliable and trustworthy.
  • Keywords
    Web services; cloud computing; distributed processing; object-oriented programming; security of data; Internet; Web based services; alternative computing environment; cloud computing system security; distributed resources; object oriented technique; robust security policy; security requirements; Image storage; Virtual machine monitors; Cloud Computing; Misuse cases; Security Policy; Security Requirements; Swimlane diagram; Use cases;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on
  • Conference_Location
    Coimbatore
  • Type

    conf

  • DOI
    10.1109/ICCCNT.2012.6395865
  • Filename
    6395865