{"title":"A secured and cost-effective method for processing queries using cloud resources optimally at hybrid cloud","authors":"Uttam Ganguly, C. Ray","doi":"10.1109/ICCECE.2016.8009566","DOIUrl":null,"url":null,"abstract":"Cloud computing is a promising computing paradigm which recently has drawn extensive attention from both academia and industry. Data privacy is an important issue for cloud computing as third party maintenance of data leads to security threat. Moreover, the cloud customers paid bill as per their usage to cloud service providers in a cloud environment. In this context, processing queries in cloud environment in a secured and cost-effective way is utmost important from both the viewpoints of cloud service providers as well as cloud customers. In this paper, first, an approach has been developed for maintaining data privacy of private sensitive data in hybrid cloud computing. This mechanism ensures that the private and sensitive data of an enterprise in a cloud environment is to be stored and maintained within the enterprise itself for globally distributed enterprises. Next, an authentication monitor is introduced in this work to maintain authenticity. Finally, a delay-based cost model has been developed in this paper for processing queries in a secured and optimized way by using cloud resources optimally in hybrid cloud environment. The analytical result of the delay-based cost model is also illustrated at the end of the paper.","PeriodicalId":414303,"journal":{"name":"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Computer, Electrical & Communication Engineering (ICCECE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCECE.2016.8009566","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Cloud computing is a promising computing paradigm which recently has drawn extensive attention from both academia and industry. Data privacy is an important issue for cloud computing as third party maintenance of data leads to security threat. Moreover, the cloud customers paid bill as per their usage to cloud service providers in a cloud environment. In this context, processing queries in cloud environment in a secured and cost-effective way is utmost important from both the viewpoints of cloud service providers as well as cloud customers. In this paper, first, an approach has been developed for maintaining data privacy of private sensitive data in hybrid cloud computing. This mechanism ensures that the private and sensitive data of an enterprise in a cloud environment is to be stored and maintained within the enterprise itself for globally distributed enterprises. Next, an authentication monitor is introduced in this work to maintain authenticity. Finally, a delay-based cost model has been developed in this paper for processing queries in a secured and optimized way by using cloud resources optimally in hybrid cloud environment. The analytical result of the delay-based cost model is also illustrated at the end of the paper.