International Journal of Technology Enhancements and Emerging Engineering Research (ISSN 2347-4289)

IJTEEE >> Volume 1 - Issue 3, October 2013 Edition

International Journal of Technology Enhancements and Emerging Engineering Research  
International Journal of Technology Enhancements and Emerging Engineering Research

Website: http://www.ijteee.org

ISSN 2347-4289

Proposed Architecture For Implementing Privacy In Cloud Computing Using Grids And Virtual Private Network

[Full Text]



N. Mahesh Kumar, K. Senthilkumar



Keywords: Virtual Private Network (VPN), Community Cloud, Private and Public cloud.



ABSTRACT: Cloud computing technology use central server and provide applications as services to users. The organization can take advantage of reducing the cost of hardware and software ownership and maintenance. Many surveys proved cloud computing reduces total cost of ownership. But due to centralized server approach there is always risk to system security. All applications required by different set of users are stored in single CPU and there is a chance for attackers to hack important data. If organization implements separate central servers then it will again reduce the cost of hardware and software ownership. Our proposed system provides effective solution for this problem by placing grid in public cloud computing server. The grids are accessed only by authorized persons or organization with virtual private network. The applications and data's belonging to a set of users are placed inside the grids, the organizations or users from multiple locations are allowed to access the grids by using virtual network. If other user or any other resources in centralized public cloud server tries to access the grid environment, the system will deny the request. Our proposed system will secure private files and applications under public cloud environment using grid & virtual private network. Our proposed system is ideal to implement secured application in public cloud environment.



[1] Armbrust, M., et al., 2010, A View of Cloud Computing, ACM, 53(4), pp. 50-58.

[2] Papazoglou, M., Traverso, P., Dustdar, S., Leymann, F., 2007, Service-Oriented Computing: State of the Art and Research Challenges, IEEE Computer, 40(11), pp. 38-45.

[3] Durkee, D., 2010, Why Cloud Computing Will Never Be Free, IT Professional, 53(5), pp. 62-69.

[4] Joshi, B.D.J, Takabi, H., Ahn, G., Security and Privacy Challenges in Cloud Computing Environments, IEEE Security & Privacy, Nov/Dec, 2010.

[5] Bianco, P., Kotermanski, R., Merson, P., Evaluating a Service-Oriented Architecture, SEIís tech report no. ESC-TR-2007-015.

[6] Ali Babar, M., Chauhan, M. A., A Tale of Migration to Cloud Computing for Sharing Experiences and Observations, proceedings of the Software Engineering for Cloud Computing Workshop (SECLOUD), Collocated with ICSE 2011, Hawaii, USA.

[7] SSL VPN security white paper at http://www.cisco.com, Steven Song, http://www.cisco.com/web/about/security/intelligence/05_08_SSL-VPN-Security.html.

[8] Cisco SAFE VPN IPSec Virtual Private Networks in Depth, Jason Halpern, et al., http://www.cisco.com/en/US/netsol/ns340/ns394/ns171/ns128/networking_solutions_white_paper09186a00801dca2d.shtml#wp48088.

[9] Briscoe, G.; Marinos, A., "Digital ecosystems in the clouds: Towards community cloud computing", Digital Ecosystems and Technologies, 2009. DEST '09.

[10] International Engineering Consortium. Digital Subscriber Line 2001. Intl. Engineering Consortiu, 2001

[11] P Plaszczak, R Wellner, Grid computing, 2005, Elsevier/Morgan Kaufmann, San Francisco.

[12] Krutz, Ronald L., and Russell Dean Vines. "Cloud Computing Security Architecture." Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Indianapolis, IN: Wiley, 2010.