Journal of Computer Networks
ISSN (Print): 2372-4749 ISSN (Online): 2372-4757 Website: http://www.sciepub.com/journal/jcn Editor-in-chief: Sergii Kavun, Naima kaabouch
Open Access
Journal Browser
Go
Journal of Computer Networks. 2019, 6(1), 1-7
DOI: 10.12691/jcn-6-1-1
Open AccessArticle

An Intelligent Client-Trusted and Dependable Security Framework to Ease Smartphone Portability on Community Cloud-Computing

Rume Elizabeth YORO1 and Arnold Adimabua OJUGO2,

1Department of Computer Science, Delta State Polytechnic Ogwashi-Uku, Delta State, Nigeria

2Department of Maths/Computer Sci., Federal University of Petroleum Resources, Effurun

Pub. Date: November 21, 2019

Cite this paper:
Rume Elizabeth YORO and Arnold Adimabua OJUGO. An Intelligent Client-Trusted and Dependable Security Framework to Ease Smartphone Portability on Community Cloud-Computing. Journal of Computer Networks. 2019; 6(1):1-7. doi: 10.12691/jcn-6-1-1

Abstract

Cloud computing is a relatively new technology that is in wide use because of the benefits it offers but is still confronted with security issues. The residence of the client’s sensitive or proprietary data in the cloud service provider’s server and premises expose the data to the possibility of manipulation, modification, inspection, deletion or theft. This possibility creates fears in the mind of the data owner and reduces the user’s trust level in cloud computing. We propose a client trusted security framework to increase users trust level in cloud computing to make it more dependable. The proposed framework includes a user focused software process model for cloud computing security. Formal analysis of the proposed framework shows that it is capable of increasing the trust level of cloud computing by about 67 % when implemented by cloud service providers.

Keywords:
cloud computing users trust framework model

Creative CommonsThis work is licensed under a Creative Commons Attribution 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

References:

[1]  Buyya, R., Yeo, C. S., Venugopal, S., Broberg, J., Brandic, I. (2009). Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility, Future Generation Computer Systems 25 (2009) 599_616, Elsevier.
 
[2]  Knorr, E. (2008). What cloud computing really means. Available at: http://www.infoworld.com.d.cloud-computing/what-cloud-computing- really-means-031.
 
[3]  ISACA White Paper. (2009). Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives, IL, USA, pp 1-10.
 
[4]  Van-Antwerp, A. L., Scoboria, K., Santos, J. R. (2011). Security Guidance for Critical Areas of Focus in Cloud Computing V3.0, Cloud Security Alliance. In: https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf. Accessed: 15th July 2-16.
 
[5]  Rahaman, S. M., Farhatullah, M. (2012). A framework for preserving privacy in cloud computing with user service dependent identity Identifying and Utilizing Dependencies Across Cloud Security Services, In Proceedings of the International Conference on Advances in Computing, Communications and Informatics, pp 133-136, ACM, NY, USA.
 
[6]  Bhadoria RS. Security Architecture for Cloud Computing. In: Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications 2018 (pp. 729-755). IGI Global.
 
[7]  Allenotor, D., Oyemade, D.A and Ojugo, A.A., (2015). A Financial Option Model for Pricing Cloud Compute Resources Based on Cloud Trace Characterization. African Journal of Computing and ICT, Vol. 8, No. 2, Issue 2, Pp 83-92.
 
[8]  Ojugo, A.A., Eboka, A.O., (2014). A social engineering detection model for the mobile smartphone clients, African J. of Computing and ICT, 7(3): pp. 91-100.
 
[9]  Cadregari C., Cutaia, A. (2011). Every Silver Cloud Has a Dark Lining, ISACA JOURNAL Volume 3, pp 1-5.
 
[10]  Creeger, M. (2009). CTO roundtable: Cloud computing. Communications of the ACM 52(8): 50-56.
 
[11]  Khajeh-Hosseini, A., Sommerville, I., Sriram, I., (2010b). Research Challenges for Enterprise Cloud Computing. Submitted to the 1st ACM Symposium on Cloud Computing, SOCC 2010.
 
[12]  Fellowes, W. (2008). Partly Cloudy, Blue-Sky Thinking About Cloud Computing. Whitepaper. 451 Group.
 
[13]  Sullivan, T. (2009). "The ways cloud computing will disrupt IT," http://www.cio.com.au/article/296892/nick_carr_ways_cloud_computing_ will_disrupt_it.
 
[14]  Khajeh-Hosseini, A., Greenwood, D., James, J. W., Sommerville, I. (2010a). The Cloud Adoption Toolkit: Supporting Cloud Adoption Decisions in the Enterprise, Cornell University Library, arXiv:1008.1900  [cs.DC] In: https://arxiv.org/ftp/arxiv/papers/1008/1008.1900.pdf. Accessed: 15th July 2016.
 
[15]  Ojugo, A.A., Otakore, D.O., (2018). Redesigning academic website for better visibility and footprint: a case of Federal University of Petroleum Resources Effurun website, Network & Communication Technologies, 3(1): pp. 33-44.
 
[16]  Babu, G. N. K. S., Srivatsa, S. K. (2014). Security And Privacy Issues in Cloud Computing, International Journal of Engineering, Business and Enterprise Applications (IJEBEA), pp 145-149.
 
[17]  Jensen, M., Schwenk, J., Gruschka, N. and Iacono, L. (2009). On Technical Issues in Cloud Computing. In IEEE International Coference.
 
[18]  Chandra DG, Bhadoria RS. (2012). Role of G-Cloud in citizen centric governance. In2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, (pp. 44-48).
 
[19]  Bhadoria RS, Bansal R, Alexander H. (2011). Analysis of frequent item set mining on variant datasets. Internal Journal of Computer Technology Application, 2(5):1328-33.
 
[20]  Campbell, S., Jeronimo, M. (2006). Applied Virtualization Technology, Hillsboro, OR: Intel Press.
 
[21]  Rongyu, H., Shaojie, W., Jiang, L. (2013). A User-Specific Trusted Virtual Environment for Cloud Computing, Information Technology Journal, 12(10), Asian Network for Scientific Information.
 
[22]  Barham, P., Dragovic, B., Fraser, K. (2003). “Xen and the Art of Virtualization,” ACM SIGOPS Operating Systems Review, vol. 37, no. 5, pp. 164-177.
 
[23]  Smith, S. (2005). Trusted Computing Platforms: Design and Applications, New York: Springer.
 
[24]  Ojugo, A.A., Eboka, A., (2018). Assessing user satisfaction and experience on academic websites: a case of selected Nigerian Universities websites, Int. J. Tech & Comp. Sci., 10(7): pp 53-61.
 
[25]  Scarlata, V., Rozas, C., Wiseman, M. (2008). "TPM Virtualization: Building a General Framework," Trusted Computing, N. Pohlmann and H. Reimer, eds., pp. 43-56, Wiesbaden, Germany: Vieweg Teubner.
 
[26]  Krautheim, F. J. (2009). Private Virtual Infrastructure for Cloud Computing, https://www.usenix.org/legacy/event/hotcloud09/tech/full_papers/krautheim.pdf. Accessed: 30th July 2016.
 
[27]  Jrad, F., Tab, J., Streit, A. (2013). A broker-based framework for multi-cloud workflows, In Proceedings of the 2013 international workshop on Multi-cloud applications and federated clouds, pp 61-68, ACM, NY, USA.
 
[28]  Anisetti, M., Ardagna, C. A., Gaudenzi, F., Damiani (2016). A Certification Framework for Cloud-based Services, In Proceedings of the 31st Annual ACM Symposium on Applied Computing, pp 330-447, ACM, NY, USA.
 
[29]  Alqahtani, H. S., Mostefaoui, G. K., Maamar, Z. (2014). A Context-Based Security Framework for Cloud Services, In Proceedings of the 3rd International Conference on Context-Aware Systems and Applications, pp 130-137, ACM, NY, USA.
 
[30]  Islam, S., Weippl. E. R., Krombholz, K. (2014). A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy Perspectives. In Proceedings of the 16th International Conference on Information Integration and Web-based Applications & Services. 185-189, ACM, NY, USA.
 
[31]  Sharma, A., Banati, H. (2016). A Framework for Implementing Trust in Cloud. In Proceedings of the International Conference on Internet of things and Cloud Computing, Article No. 6, ACM, New York, USA.
 
[32]  Trabelsi, S., Cerbo, F. D., Gomez, L., Bezzi, M. (2015). A privacy preserving framework for mobile and cloud: a symmetric architecture design, In Proceedings of the Second ACM International Conference on Mobile Software Engineering and Systems, pp 160-161, ACM, NY, USA.
 
[33]  Ojugo, A.A., Yoro, R.E., Eboka, A.O., Yerokun, M.O., Iyawa, I.J.B., (2012). Implementation issues of VoIP to enhance rural telephony in Nigeria, Journal of Emerging Trends in Computing & Information Systems, 4(2): pp. 113-120.
 
[34]  Ojugo, A.A., Abere, R., Orhionkpaiyo, B.C., Yoro., R.E., Eboka, A., (2013). Technical issues for IP-based telephony in Nigeria, Int. J. Wireless Comm. & Mobile Computing., 1(2): 58-67.
 
[35]  Ojugo, A.A., Yoro, R.E., Oyemade, D.A., Eboka, A.O., Ugboh, E., Aghware, F.O., (2013). Robust cellular network rural telephony in Southern Nigeria, American J. of Network Communications, 2(5): 125-132.
 
[36]  Poh, G. S., Nazir, M. A. N. M., Goi, B., Tan, S., Phan, R. C. (2013). An authentication framework for peer-to-peer cloud, In Proceedings of the 6th International Conference on Security of Information and Networks, pp 94-101, ACM, NY, USA.
 
[37]  Youssef, A. E., Alageel, M. (2012). A Framework for Secure Cloud Computing, International Journal of Computer Science Issues, Vol. 9, Issue 4, No 3, pp 487-900.
 
[38]  Okonta, E.O., Wemembu, U., Ojugo, A.A., Ajana, D., (2014). Deploying Java platform to design a framework of protective shield for anti-reversing engineering, West African J. of Industrial and Academic Research, 10(1): pp. 50-65.
 
[39]  Ojugo, A.A., Aghware, F.O., Yoro, R.E., Yerokun, M.O., Eboka, A.O., Anujeonye, C.N and Efozia, F.N., (2015). Dependable community-cloud framework for smart mobile-phones, American Journal of Networks and Communications, Vol. 4, No. 4, Pp 95-103.
 
[40]  Oyemade, D.A., Akpojaro, J., Ojugo, A.A., Ureigho, R., Imouokhome, F., Omoregbee, E., (2016). Three tier learning model for universities in Nigeria, J. of Technologies in Society, 12(2): pp. 9-20.