A Secure Data Transmission Mechanism for Cloud Outsourced Data

A Secure Data Transmission Mechanism for Cloud Outsourced Data

Abdullah Alhaj (Faculty of Information Technology, University of Jordan/Aqaba, Aqaba, Jordan), Shadi Aljawarneh (Faculty of Information Technology, Isra University, Amman, Jordan), Shadi Masadeh (Department of Computer Science, Al-Hussein Bin Talal University, Ma’an, Jordan) and Evon Abu-Taieh (Faculty of Information Technology, University of Jordan/Aqaba, Aqaba, Jordan)
Copyright: © 2013 |Pages: 10
DOI: 10.4018/ijcac.2013010104
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. In Cloud, the data and associated software are not under their control. In addition, with the growing demands for Cloud networks communication, it becomes increasingly important to secure the data flow path. The existing research related to security mechanisms only focuses on securing the flow of information in the communication networks. There is a lack of work on improving the performance of networks to meet quality of service (QoS) constrains for various services. The security mechanisms work by encryption and decryption of the information, but do not consider the optimised use of the network resources. In this paper the authors propose a Secure Data Transmission Mechanism (SDTM) with Preemption Algorithm that combines between security and quality of service. Their developed SDTM enhanced with Malicious Packets Detection System (MPDS) which is a set of technologies and solutions. It enforces security policy and bandwidth compliance on all devices seeking to access Cloud network computing resources, in order to limit damage from emerging security threats and to allow network access only to compliant and trusted endpoint devices. This SDTM also provides support for quality of service. High-level simulations and the related results are provided to show the properties of the SDTM.
Article Preview

2. System Architecture

The architecture of the developed SDTM is composed of generator computers, N cryptographic accelerators connected to the normal system bus of the gateway and distributed bandwidth negotiator as shown in Figure 1. We consider heterogeneous accelerators, i.e., accelerators implementing different cryptographic algorithms and allowing different processing speeds. CPU-memory communication is performed on a faster bus, as in most modern personal computers. The network card is also connected to the faster CPU bus. Only cryptography- related operations are offloaded to the accelerator(s). This means that all the IPSec header processing is done by the CPU.

Figure 1.

Secure Data Transmission Mechanism based on Distributed Bandwidth Negotiator

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing