Advancement in GSM Network to Access Cloud Services

Muhammad Tanveer Meeran, Asif Raza, Muizzud Din

Abstract


Cloud services are offering a large number of utilities to the mobile users. Mobile users can share, store, develop, compute and many other services on the cloud. Due to extensive utilization of cloud services by the mobile users, security concerns are also evolving with the same pace. Among different security problems, secure access to the cloud services (cloud data utilization, data storage) is also a difficult and challenging task. This paper highlights the security concerns, particularly addresses the issue of secure access to cloud infrastructure, Such as access the cloud services securely by the mobile users. As Elastic Cloud Computing is valid only for Amazon, MLaden model is theoretical based model and not implemented practically, Wayne model enhances the end user security but not proposed tool for practical implementation. Intention of this paper is to propose mechanism to securely access the cloud services using GSM band. Only defined frequency band of GSM will provide the access to the cloud services. Users will be restricted to use the particular frequency to access the cloud services.

Full Text:

PDF

References


Curran.K, Carlin.S and Adams. M. Security issues in cloud computing- published in August 2011, Elixir Network Engineering.

Malgey.S, and Chauhan.P. A Review on Security Issues and their Impact on Cloud Computing Environment, 2016

Mell.P and Grance.T, The NIST Definition of Cloud Computing, Version 15, October 7, 2009.

Soren Bleikertz et al, ―Security Audits of Multi-tier Virtual Infrastructures in Public Infrastructure Clouds‖, CCSW 2010, Chicago, USA.

Wenchaoet al, ―Towards a Data-centric View of Cloud Security‖, CloudDB 2010, Toronto, Canada.

Flavio Lombardi& Roberto Di Pietro, ―Transparent Security for Cloud‖, SAC‘10 March 22-26, 2010, Sierre, Switzerland.

Rongxing et al, ―Secure Provenance: The Essential Bread and Butter of Data Forensics in Cloud Computing‖, ASIACCS‘10, Beijing, China

Mladen A. Vouch, ―Cloud Computing Issues, Research and Implementations‖, Journal of Computing and Information Technology - CIT 16, 2008, 4, 235–246.

R. La‘Quata Sumter, ―Cloud Computing: Security Risk Classification‖, ACMSE 2010, Oxford, USA.

B. Schneier, Applied Cryptography Protocols, Algorithm and Source Code in C,Wiley India Edition, 2nd edition, 2007.

Behrouz A. Forouzan, Cryptography & Network Security, McGraw- Hill, Inc., New York, NY, 2007.

The Cryptography Guide: Triple DES". Cryptography World. Retrieved 2010-07-11.

Issa M.Khalil et al,security concern in cloud computing,2013 10th international conference on information technology:NewGenertaion.

Flavio Lombardi and Roberto Di Pietro, “Transparent Security for Cloud”, March 2010, Proceedings of the 2010 ACM Symposium on Applied Computing, pages 414-415.

A Review on Security Issues and their Impact on Cloud Computing Environment Sadhana Malgey1, Mr. Pranay Chauhan

A Survey on Cloud Security Issues and Techniques Garima Gupta1, P.R.Laxmi2 and Shubhanjali Sharma

Wenchaoet al, ―Towards a Data-centric View of Cloud Security‖, CloudDB 2010, Toronto, Canada.

Jinpeng et al, ―Managing Security of Virtual Machine Images in a Cloud Environment‖, CCSW, 2009, Chicago, USA.

Miranda &Siani, ―A Client-Based Privacy Manager for Cloud Computing‖, COMSWARE‘09, 2009, Dublin, Ireland.

R. Balasubramanian, Dr.M.Aramuthan (2012) Security Problems and Possible Security Approaches In Cloud Computing.

Dan Lin & Anna Squicciarini, ―Data Protection Models for Service Provisioning in the Cloud‖, SACMAT‘10, 2010, Pittsburgh, Pennsylvania, USA.

Federal Communications Commission (FCC), "Facilitating Opportunities for Flexible, Efficient, and Reliable Spectrum Use Employing Cognitive Radio Tech-nologies," ET Docket No. 03-108, Mar. 2005.

Cognitive Radio Technology, [Online] Available: http: //www. of corn. org.uk/ research/technology / overview / emer_tech / cograd / cograd_main.pdf

W.Stallings, “Cryptography and Network Security”, 5th Edition, Prentice Hall, 2011.

Fabrice Gens, Jean-Pierre Remenieras and Stephane. Diridollou .” Estimation of the Correlation Amplitude of RF Signals in Small Cutaneous Vessels”.IEEE transactions on ultrasonics, ferroelectrics, and frequency control, vol. 47, no. 6, november 2000



Refbacks

  • There are currently no refbacks.


Chief Editor

Prof. Dr. Ejaz Ahmed 
Dean
College of Computer Science & Information Systems

Editor

Prof Dr. S. M. Aqil Burney

Associate Editors

Prof. Dr. Tariq Rahim Soomro
Dr. Muhammad Mansoor Aalam

Publication Coordinator
Konpal Darakshan

Editorial Advisory Board (Internal)

Dr. Syed Irfan Hyder
Dr. Mohammad Irshad Khan
Dr. Shahid Amjad
Dr. Abdul Rauf Farooqui
Dr. Syed Iftikhar Ali
Dr. Tajuddin Islamuddin
Dr. Muhammad Danish Khan
Dr. Imran Majid
Dr. Fatima Riaz
Dr. Adeel Ansari
Dr. Zeeshan Shahid
Ms. Seema Ansari

Editorial Advisory Board (International)

Prof. Dr. Mazliham Mohd Su'ud, President, Universiti Kuala Lumpur, Malaysia
Prof. Dr. Ghassan Al-Qaimari, President, Emirates College of Technology, Abu Dhabi, UAE
Prof. Dr. Patrice Boursier, Universite de La Rochelle, La Rochelle, France
Prof. Dr. Mudassir Uddin, Professor, University of Karachi, Pakistan
Dr. Nadeem Doudpota, Associate Professor, Al-Baha University, KSA
Dr. Haithem Abdelrazaq Almefleh, Associate Professor, Yarmouk University, Yarmouk, Jordan
Dr. S. Asim Ali, Assistant Professor, University of Karachi, Pakistan

Member Editorial Review Board (International – Academia)

Dr. Asadaullah Shah, Professor, International Islamic University, MalaysiaDr. Hasan Wahba, President American College of Dubai, United Arab Emirates (UAE)
Dr. Tahseen Jilani, Assistant Professor, University of Manchester, UKDr. Atif Memon, Associate Professor, The University of Maryland, USA
Dr. Syed Waliullah Shah, University Sains, MalaysiaDr. Inayatullah Shah, International Islamic University, (Kuantam), Malaysia
Dr. Salahttin Kuru, Kemeburgaz University, TurkeyDr. Soon Min, INTI International University, Malaysia
Dr. Shahrulniza Musa, Professor, Malaysian France Institute, Universiti Kuala Lumpur, Bandar Baru Bangi, MalaysiaDr. R. Praveen Sam, Professor, Department of Computer Science and Engineering, G. Pulla Reddy Engineering College, KURNOOL, India
Dr. Manzoor Ahmed Hashmani, Associate Professor, University Technology Petronas, MalaysiaDr. Alveera Mehdi, Professor, Aligarh Muslim University, Aligarh, India

Dr. Sajjad Waheed, Professor, Department of Information and Communication Technology, Mawlana Bhashani Science and Technology University, Tangail 1902, Bangladesh

Dr. Kushairy Bin Abdul Kadir, Associate Professor, British Malaysian Institute, Universiti Kuala Lumpur, Gombak, Malaysia
Dr. Mohammad Hameed Ahmed AlTaei, Assistant Professor, Applied Sciences College, Sohar, OmanDr. Eiad Yafi, Associate Professor, Malaysian Institute of Information Technology Universiti, Malaysia
Dr. Muhammad Azam Sheikh, Assistant Professor, Chalmers University, SwedenDr. Safeeullah Soomro, Postdoc Dean College of Computer Studies, AMA Int. University, Bahrian
Dr. Aymen Adil Belghith, Assistant Professor, University of Sfax, Sfax,TunisiaDr. Radwan Alsadiq Alqirmazi, Assistant Professor, University of Sfax, Sfax,Tunisia
Dr. Mohammad Arif Amin, Assistant Professor, Higher College of Technology, Abu Dhabi Men’s College, Abu Dhabi, United Arab Emirates (UAE)Dr. Ismat Aldmour, Assistant Professor, Al-Baha University, Kingdom of Saudi Arabia (KSA)
Dr. AbdulRahman Ahmed Mohammed Al-Sewari, Senior Lecturer, Universiti Malaysia Pahang, Pahang, MalaysiaDr. Mohammed A. Afifi, Director, Associate of Science in Computer Science, Al Dar University College, Dubai, United Arab Emirates (UAE)
Dr. Youssef Ahmed Masmoudi, Assistant Professor, Saudi Electronic University, Jeddah male Campus, Kingdom of Saudi Arabia (KSA)Dr. Zulfiqar Memon, Assistant Professor, Ajman University of Science & Technology, Ajman, United Arab Emirates (UAE)
Dr. Abdul Basit Samsuddin Banga, Assistant Professor, Saudi Electronic University, Jeddah male Campus, Kingdom of S. Arabia (KSA)Dr. Mohamad Ismail Sulaiman, Senior Lecturer, British Malaysian Institute, Universiti Kuala Lumpur, Gombak, Malaysia
Dr. Syed Faiz Ahmed, Senior Lecturer, British Malaysian Institute, Universiti Kuala Lumpur, Gombak, Malaysia

Dr. Jawad Ali Shah, Senior Lecturer, British Malaysian Institute, Universiti Kuala Lumpur, Gombak, Malaysia

Dr. Sarfraz Nawaz Brohi, Lecturer, Taylor’s Unversity, Lakeside Campus, Malaysia

Dr. Fahad Sikander, Assistant Professor, Saudi Electronic University, Kingdom of Saudi Arabia (KSA)


Member Editorial Review Board (International – Non Academia)

Dr. Abdul Razaque Memon, Director Solution Marketing at Huawei Technology, AustraliaDr. Syed Abbas, Project Director, NetSys Technical Services, Business Bay, Duabi, United Arab Emirates (UAE)
Dr. Muntasser Khater, Educational Senior Consultant, CAN DU e-Business, Dubai, United Arab Emirates (UAE) 

Member Editorial Review Board (National – Academia)

Dr. Madad Ali Shah, Professor and Vice Chancellor, BBS University of Technology & Skill Development, KhairpurDr. B. S. Chaudhry, Professor, Mehran University of Engineering & Technology (MUET), Jamshoro
Dr. Mir Ghulam Hyder Talpur, Professor, University of Sindh, JamshoroDr. Imdad Ismaili, Professor, University of Sindh, Jamshoro
Dr. Syed Asif Ali, Professor, Sindh Maderessah Tul Islam University, KarachiDr. Mukhtiar Ali Unar, Professor, Mehran University of Engineering & Technology (MUET), Jamshoro
Dr. Syed Amir Iqbal, Associate Professor, NED University, KarachiDr. Syed Haider Shah, Associate Professor, Univeristy of Balochistan, Quetta
Dr. Talal Shrafat Rehmani, NUST, KarachiLt. Cdr. Dr. Asif Mansoor, NUST, Karachi
Dr. Faisal Maqbool Zahid, Associate Professor, University of Faisalabad 

Member Editorial Review Board (National – Non Academia)

Dr. Amir Khan, Ministry of Defense, Govt. of Pakistan, KarachiDr. Bahrawar Jan, Pakistan Bureau of Statistics, Islamabad