A Proposed Model for Cloud Security Controlled by CS Using Reactive Programming
Abstract
Security in the Cloud In our suggested approach, the popular reactive programming paradigm has been used as a novel solution. In this research, we evaluate and minimise the execution time for the model proposed in cloud security, where security control is delegated to the CS(Cloud expert) of a certain company based on predetermined alternatives. The synchronisation of concurrent operations as well as the manipulation of real-time We faced some data challenges in our previous work using traditional programming. This study gives solutions for two programming approaches based on the optimal solutions of the given model. for cloud security, using traditional programming as the first way and reactive programming as the most appropriate answer in our circumstance. We employed identical procedures to take the measurements in this article, and we compare the results of the first and second programming methods. The paper's findings are provided in tables and graphs, demonstrating that reactive programming in the suggested cloud security paradigm produces better outcomes than conventional programming
Full Text:
PDFReferences
Hyseni, D.; Luma, A.; Selimi, B.; Cico, B. The Proposed Model to Increase Security of Sensitive
Data in Cloud Computing. Int. J. Adv. Comput. Sci. Appl. 2018, 9, pp203–210.
Mogk, R.; Salvaneschi, G.; Mezini, M. Reactive programming experience with rescaling. In
Proceedings of the Conference Companion of the 2nd International Conference on Art,Science, and
Engineering of Programming, Nice, France, 9–12 April 2018; pp. 105–112.
Ignatoff, D.; Cooper, G.H.; Krishnamurthi, S. Crossing state lines: Adapting object-oriented
frameworks to functional reactive languages. In International Symposium on Functional and Logic
Programming; Springer: Berlin/Heidelberg, Germany, 2006; pp. 259–276.
Cunha, G.T. Reactive vs. Synchronous Performance Test with Spring Boot 2.0. 2018. Available
online: dzone.com/articles/spring- boot-20-web flux-reactive-performance-test (accessed on 12
January 2022).
Programming Paradigms Available from [online]:
https://theailearner.com/2018/09/26/programming-paradigms
Staltz, A. The Introduction to Reactive Programming You’ve Been Missing. 2014. Available
online: https://gist.github.com/ staltz/868e7e9bc2a7b8c1f754 (accessed on 21 August 2017).
Doglio, F. Functional Reactive Programming. In Reactive Programming with Node; Apress:
Berkeley, CA, USA, 2016; pp. 25–45.
Liberty, J.; Betts, P.; Turalski, S. Programming Reactive Extensions and Linq; Apress Media, LLC:
New York, NY, USA, 2011.
Bonér, J.; Klang, V. Reactive Programming vs. Reactive Systems; Lightbend, Inc.: San
Francisco, CA, USA, 2016.
A Proposed Model for Cloud Security Controlled by CS UsingReactive Programming Bhavsar et al.
Salvaneschi, G.; Margara, A.; Tamburrelli, G. Reactive programming: A walkthrough. In
Proceedings of the 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering,
Florence, Italy, 16–24 May 2015; Volume 2, pp. 953–954.
Czaplicki, E.; Chong, S. Asynchronous functional reactive programming for GUIs. ACM
SIGPLAN Not. 2013, 48, 411–422. [CrossRef]
Hyseni, D.; Cico, B.; Shabani, I. The proposed model for security in the cloud is controlledby the
end-user. In Proceedings of the 2015 4th Mediterranean Conference on Embedded Computing
(MECO), Budva, Montenegro, 14–18 June 2015; pp. 81–84.
Hyseni, D.; Cico, B.; Luma, A.; Selimi, B.; Shemsedini, E. Different methods of distribution data
in the cloud—Controlled by IT security specialist. In Proceedings of the 2018 7th Mediterranean
Conference on Embedded Computing (MECO), Budva, Montenegro,10–14 June 2018; pp. 1–5.
Hyseni, D.; Selimi, B.; Luma, A.; Cico, B. The strategy of cryptography for the proposed model of
security in cloud computing. In Proceedings of the 2017 IEEE International Conference on Power,
Control, Signals and Instrumentation Engineering (ICPCSI), Chennai, India, 21–22 September
; pp. 24–28.
Hussain, M.E.; Hussain, R. Cloud Security as a Service Using Data Loss Prevention: Challenges
and Solution. In International Conference on Internet of Things and Connected Technologies;
Springer: Cham, Switzerland, 2021; pp. 98–106.
Mishra, S.; Sharma, S.K.; Alowaidi, M.A. Analysis of security issues of cloud-based web
applications. J. Ambient. Intell. Humanize. Comput. 2021, 12, 7051–7062. [CrossRef]
Juels, A.; Kaliski, B.S., Jr. Pors: Proofs of retrievability for large files. In Proceedings of the 2007
ACM Conference on Computer and Communications Security (CCS 2007), Alexandria, VA, USA,
November–31 October 2007; ACM Digital Library: New York, NY,USA, 2007; pp. 584–597.
Sen, J. Security and privacy issues in cloud computing. In Architectures and Protocols forSecure
Information Technology Infrastructures; IGI Global: Hershey, PA, USA, 2013; pp. 1–45.
Santos, N.; Gummadi, K.P.; Rodrigues, R. Towards Trusted Cloud Computing. In Proceedings of
the 2009 Conference on Hot Topics in Cloud Computing (HOT CLOUD), San Diego, CA, USA,
June 2009; USENIX: Berkeley, CA, USA, 2009.
Garfinkel, T.; Pfaff, B.; Chow, J.; Rosenblum, M.; Boneh, D. Terra: A virtual machine-based
platform for trusted computing. In Proceedings of the Nineteenth ACM Symposium on Operating
Systems Principles, Bolton Landing, NY, USA, 19–22 October 2003.
Ponemon Institute Research Report. Global Encryption Trends Study. 2021. Available
online:https://www.entrust.com/-/media/documentation/reports/2021-global-encryption-trendsexec-summary-re.pdf (accessed on 12 March 2022).
Krautheim, F.J. Private Virtual Infrastructure for Cloud Computing. In Proceedings of the 2009
Workshop on Hot Topics in Cloud Computing, HotCloud 2009, San Diego, CA, USA, 15 June
Kumar, S.; Karnani, G.; Gaur, M.S.; Mishra, A. Cloud security using hybrid cryptography
algorithms. In Proceedings of the 2021 2nd International Conference on Intelligent Engineering and
Management (ICIEM), London, UK, 28–30 April 2021; pp. 599–604.
Dhirani, L.L.; Newe, T.; Nizamani, S. Federated Hybrid Clouds Service Level Agreements and
Legal Issues. In Third International Congress on Information and Communication Technology;
Springer: Singapore, 2019; pp. 471–486.
Ouedraogo, M.; Mignon, S.; Cholez, H.; Furnell, S.; Dubois, E. Security transparency: The next
frontier for security research in the cloud. J. Cloud Comput. 2015, 4, 12. [CrossRef]
Arshad, J.; Townend, P.; Jie, X. Quantification of Security for Compute Intensive Workloads in
Clouds. In Proceedings of the 15th International Conference on Parallel and Distributed Systems,
Shenzhen, China, 8–11 December 2009.
De Chaves, S.A.; Uriarte, R.B.; Westphall, C.B. Towards an architecture for monitoring private
clouds. IEEE Commun. Mag. 2011, 49, 130–137. [CrossRef]
Sangui, S.; Ghosh, S.K. Cloud Security Using Honeypot Network and Blockchain: A Review. In
Machine Learning Techniques and Analytics for Cloud Security; Scrivener Publishing LLC:
Beverly, MA, USA, 2021.
International Journal of Embedded Systems and Emerging Technologies
Jaatun, M.G.; Zhao, G.; Vasilakos, A.V.; Nyre, Å.A.; Alapnes, S.; Tang, Y. The design of a
redundant array of independent net storage for improved confidentiality in cloud computing. J.
Cloud Comput. Adv. Syst. Appl. 2012, 1, 13. [CrossRef]
Dorairaj, S.D.; Kaliannan, T. An adaptive multilevel security framework for the data stored in a
cloud environment. Sci. World J. 2015, 2015, 601017. [CrossRef] [PubMed]
Wolters, P.T.J. The security of personal data under the GDPR: A harmonized duty or ashared
responsibility? Int. Data Privacy. Law 2017, 7, 165–178. [CrossRef]
Mosch, M.; Groß, S.; Schill, A. User-controlled resource management in federated clouds. J. Cloud
Comput. 2014, 3, 10. [CrossRef]
Nagarajan, G. Comparative Analysis of Public Cloud Security-Based Schemes and Cryptographic
Algorithms. Turk. J. Comput. Math. Educ. (TURCOMAT) 2021, 12, pp 2114–2127.
Awaysheh, F.M.; Aladwan, M.N.; Alazab, M.; Alawadi, S.; Cabaleiro, J.C.; Pena, T.F. Security by
design for big data frameworks over cloud computing. IEEE Trans. Eng. Manag. 2021. [CrossRef]
Bhavsar Rakesh; Prediction and Monitoring on secure edge-cloud integrated privacy-preserving
Heath Protecting system National level Research Journal GIT-JET Journal of Engineering and
Technology ISSN 2249-6157 (vol 13)
Refbacks
- There are currently no refbacks.