Open Access Open Access  Restricted Access Subscription or Fee Access

A Proposed Model for Cloud Security Controlled by CS Using Reactive Programming

Rakesh Bhavsar, Kripal Sanjay Zala, Shubham Nagar

Abstract


Security in the Cloud In our suggested approach, the popular reactive programming paradigm has been used as a novel solution. In this research, we evaluate and minimise the execution time for the model proposed in cloud security, where security control is delegated to the CS(Cloud expert) of a certain company based on predetermined alternatives. The synchronisation of concurrent operations as well as the manipulation of real-time We faced some data challenges in our previous work using traditional programming. This study gives solutions for two programming approaches based on the optimal solutions of the given model. for cloud security, using traditional programming as the first way and reactive programming as the most appropriate answer in our circumstance. We employed identical procedures to take the measurements in this article, and we compare the results of the first and second programming methods. The paper's findings are provided in tables and graphs, demonstrating that reactive programming in the suggested cloud security paradigm produces better outcomes than conventional programming


Full Text:

PDF

References


Hyseni, D.; Luma, A.; Selimi, B.; Cico, B. The Proposed Model to Increase Security of Sensitive

Data in Cloud Computing. Int. J. Adv. Comput. Sci. Appl. 2018, 9, pp203–210.

Mogk, R.; Salvaneschi, G.; Mezini, M. Reactive programming experience with rescaling. In

Proceedings of the Conference Companion of the 2nd International Conference on Art,Science, and

Engineering of Programming, Nice, France, 9–12 April 2018; pp. 105–112.

Ignatoff, D.; Cooper, G.H.; Krishnamurthi, S. Crossing state lines: Adapting object-oriented

frameworks to functional reactive languages. In International Symposium on Functional and Logic

Programming; Springer: Berlin/Heidelberg, Germany, 2006; pp. 259–276.

Cunha, G.T. Reactive vs. Synchronous Performance Test with Spring Boot 2.0. 2018. Available

online: dzone.com/articles/spring- boot-20-web flux-reactive-performance-test (accessed on 12

January 2022).

Programming Paradigms Available from [online]:

https://theailearner.com/2018/09/26/programming-paradigms

Staltz, A. The Introduction to Reactive Programming You’ve Been Missing. 2014. Available

online: https://gist.github.com/ staltz/868e7e9bc2a7b8c1f754 (accessed on 21 August 2017).

Doglio, F. Functional Reactive Programming. In Reactive Programming with Node; Apress:

Berkeley, CA, USA, 2016; pp. 25–45.

Liberty, J.; Betts, P.; Turalski, S. Programming Reactive Extensions and Linq; Apress Media, LLC:

New York, NY, USA, 2011.

Bonér, J.; Klang, V. Reactive Programming vs. Reactive Systems; Lightbend, Inc.: San

Francisco, CA, USA, 2016.

A Proposed Model for Cloud Security Controlled by CS UsingReactive Programming Bhavsar et al.

Salvaneschi, G.; Margara, A.; Tamburrelli, G. Reactive programming: A walkthrough. In

Proceedings of the 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering,

Florence, Italy, 16–24 May 2015; Volume 2, pp. 953–954.

Czaplicki, E.; Chong, S. Asynchronous functional reactive programming for GUIs. ACM

SIGPLAN Not. 2013, 48, 411–422. [CrossRef]

Hyseni, D.; Cico, B.; Shabani, I. The proposed model for security in the cloud is controlledby the

end-user. In Proceedings of the 2015 4th Mediterranean Conference on Embedded Computing

(MECO), Budva, Montenegro, 14–18 June 2015; pp. 81–84.

Hyseni, D.; Cico, B.; Luma, A.; Selimi, B.; Shemsedini, E. Different methods of distribution data

in the cloud—Controlled by IT security specialist. In Proceedings of the 2018 7th Mediterranean

Conference on Embedded Computing (MECO), Budva, Montenegro,10–14 June 2018; pp. 1–5.

Hyseni, D.; Selimi, B.; Luma, A.; Cico, B. The strategy of cryptography for the proposed model of

security in cloud computing. In Proceedings of the 2017 IEEE International Conference on Power,

Control, Signals and Instrumentation Engineering (ICPCSI), Chennai, India, 21–22 September

; pp. 24–28.

Hussain, M.E.; Hussain, R. Cloud Security as a Service Using Data Loss Prevention: Challenges

and Solution. In International Conference on Internet of Things and Connected Technologies;

Springer: Cham, Switzerland, 2021; pp. 98–106.

Mishra, S.; Sharma, S.K.; Alowaidi, M.A. Analysis of security issues of cloud-based web

applications. J. Ambient. Intell. Humanize. Comput. 2021, 12, 7051–7062. [CrossRef]

Juels, A.; Kaliski, B.S., Jr. Pors: Proofs of retrievability for large files. In Proceedings of the 2007

ACM Conference on Computer and Communications Security (CCS 2007), Alexandria, VA, USA,

November–31 October 2007; ACM Digital Library: New York, NY,USA, 2007; pp. 584–597.

Sen, J. Security and privacy issues in cloud computing. In Architectures and Protocols forSecure

Information Technology Infrastructures; IGI Global: Hershey, PA, USA, 2013; pp. 1–45.

Santos, N.; Gummadi, K.P.; Rodrigues, R. Towards Trusted Cloud Computing. In Proceedings of

the 2009 Conference on Hot Topics in Cloud Computing (HOT CLOUD), San Diego, CA, USA,

June 2009; USENIX: Berkeley, CA, USA, 2009.

Garfinkel, T.; Pfaff, B.; Chow, J.; Rosenblum, M.; Boneh, D. Terra: A virtual machine-based

platform for trusted computing. In Proceedings of the Nineteenth ACM Symposium on Operating

Systems Principles, Bolton Landing, NY, USA, 19–22 October 2003.

Ponemon Institute Research Report. Global Encryption Trends Study. 2021. Available

online:https://www.entrust.com/-/media/documentation/reports/2021-global-encryption-trendsexec-summary-re.pdf (accessed on 12 March 2022).

Krautheim, F.J. Private Virtual Infrastructure for Cloud Computing. In Proceedings of the 2009

Workshop on Hot Topics in Cloud Computing, HotCloud 2009, San Diego, CA, USA, 15 June

Kumar, S.; Karnani, G.; Gaur, M.S.; Mishra, A. Cloud security using hybrid cryptography

algorithms. In Proceedings of the 2021 2nd International Conference on Intelligent Engineering and

Management (ICIEM), London, UK, 28–30 April 2021; pp. 599–604.

Dhirani, L.L.; Newe, T.; Nizamani, S. Federated Hybrid Clouds Service Level Agreements and

Legal Issues. In Third International Congress on Information and Communication Technology;

Springer: Singapore, 2019; pp. 471–486.

Ouedraogo, M.; Mignon, S.; Cholez, H.; Furnell, S.; Dubois, E. Security transparency: The next

frontier for security research in the cloud. J. Cloud Comput. 2015, 4, 12. [CrossRef]

Arshad, J.; Townend, P.; Jie, X. Quantification of Security for Compute Intensive Workloads in

Clouds. In Proceedings of the 15th International Conference on Parallel and Distributed Systems,

Shenzhen, China, 8–11 December 2009.

De Chaves, S.A.; Uriarte, R.B.; Westphall, C.B. Towards an architecture for monitoring private

clouds. IEEE Commun. Mag. 2011, 49, 130–137. [CrossRef]

Sangui, S.; Ghosh, S.K. Cloud Security Using Honeypot Network and Blockchain: A Review. In

Machine Learning Techniques and Analytics for Cloud Security; Scrivener Publishing LLC:

Beverly, MA, USA, 2021.

International Journal of Embedded Systems and Emerging Technologies

Jaatun, M.G.; Zhao, G.; Vasilakos, A.V.; Nyre, Å.A.; Alapnes, S.; Tang, Y. The design of a

redundant array of independent net storage for improved confidentiality in cloud computing. J.

Cloud Comput. Adv. Syst. Appl. 2012, 1, 13. [CrossRef]

Dorairaj, S.D.; Kaliannan, T. An adaptive multilevel security framework for the data stored in a

cloud environment. Sci. World J. 2015, 2015, 601017. [CrossRef] [PubMed]

Wolters, P.T.J. The security of personal data under the GDPR: A harmonized duty or ashared

responsibility? Int. Data Privacy. Law 2017, 7, 165–178. [CrossRef]

Mosch, M.; Groß, S.; Schill, A. User-controlled resource management in federated clouds. J. Cloud

Comput. 2014, 3, 10. [CrossRef]

Nagarajan, G. Comparative Analysis of Public Cloud Security-Based Schemes and Cryptographic

Algorithms. Turk. J. Comput. Math. Educ. (TURCOMAT) 2021, 12, pp 2114–2127.

Awaysheh, F.M.; Aladwan, M.N.; Alazab, M.; Alawadi, S.; Cabaleiro, J.C.; Pena, T.F. Security by

design for big data frameworks over cloud computing. IEEE Trans. Eng. Manag. 2021. [CrossRef]

Bhavsar Rakesh; Prediction and Monitoring on secure edge-cloud integrated privacy-preserving

Heath Protecting system National level Research Journal GIT-JET Journal of Engineering and

Technology ISSN 2249-6157 (vol 13)


Refbacks

  • There are currently no refbacks.