A Mechanism for Securing Hybrid Cloud Outsourced Data: Securing Hybrid Cloud

A Mechanism for Securing Hybrid Cloud Outsourced Data: Securing Hybrid Cloud

Abdullah El-Haj (University of Jordan, Jordan) and Shadi Aljawarneh (Jordan University of Science and Technology, Jordan)
Copyright: © 2015 |Pages: 11
DOI: 10.4018/978-1-4666-8676-2.ch006
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

The existing research related to security mechanisms only focuses on securing the flow of information in the communication networks. There is a lack of work on improving the performance of networks to meet quality of service (QoS) constrains for various services. The security mechanisms work by encryption and decryption of the information, but do not consider the optimised use of the network resources. In this paper the authors propose a Secure Data Transmission Mechanism (SDTM) with Preemption Algorithm that combines between security and quality of service. Their developed SDTM enhanced with Malicious Packets Detection System (MPDS) which is a set of technologies and solutions. It enforces security policy and bandwidth compliance on all devices seeking to access Cloud network computing resources, in order to limit damage from emerging security threats and to allow network access only to compliant and trusted endpoint devices.
Chapter Preview
Top

2. System Architecture

The architecture of the developed SDTM is com-posed of generator computers, N cryptographic accelerators connected to the normal system bus of the gateway and distributed bandwidth negotiator as shown in Figure 1. We consider heterogeneous accelerators, i.e., accelerators implementing different cryptographic algo-rithms and allowing different processing speeds. CPU-memory communication is performed on a faster bus, as in most modern personal com-puters. The network card is also connected to the faster CPU bus. Only cryptography- related operations are offloaded to the accelerator(s). This means that all the IPSec header processing is done by the CPU.

Figure 1.

Secure data transmission mechanism based on distributed bandwidth negotiator

Complete Chapter List

Search this Book:
Reset