An Algorithm for Securing Hybrid Cloud Outsourced Data in the Banking Sector

An Algorithm for Securing Hybrid Cloud Outsourced Data in the Banking Sector

Abdullah Alhaj (The University of Jordan, Jordan) and Shadi A. Aljawarneh (Jordan University of Science and Technology, Jordan)
Copyright: © 2017 |Pages: 15
DOI: 10.4018/978-1-5225-0864-9.ch010
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

The Cloud has become a significant topic in the banking computing; however, the trend has established a new range of security issues that need to be addressed. In Cloud, the banking data and associated software are not under their control. In addition, with the growing demands for Cloud networks communication, it becomes increasingly important to secure the data flow path. The existing research related to security mechanisms only focuses on securing the flow of information in the communication banking networks. There is a lack of work on improving the performance of networks to meet quality of service (QoS) constrains for various services. The security mechanisms work by encryption and decryption of the information, but do not consider the optimised use of the network resources. In this chapter the authors propose a Secure Data Transmission Mechanism (SDTM) with Preemption Algorithm that combines between security and quality of service for the banking sector. Their developed SDTM enhanced with Malicious Packets Detection System (MPDS) which is a set of technologies and solutions.
Chapter Preview
Top

System Architecture

The architecture of the developed SDTM is com-posed of generator computers, N cryptographic accelerators connected to the normal system bus of the gateway and distributed bandwidth negotiator as shown in Figure 1. We consider heterogeneous accelerators, i.e., accelerators implementing different cryptographic algorithms and allowing different processing speeds. CPU-memory communication is performed on a faster bus, as in most modern personal computers. The network card is also connected to the faster CPU bus. Only cryptography-related operations are offloaded to the accelerator(s). This means that all the IPSec header processing is done by the CPU.

Figure 1.

Secure data transmission mechanism based on distributed bandwidth negotiator

Complete Chapter List

Search this Book:
Reset