Papers by Dana Al-Tehmazi

These days the common term used for distinguishing the services such as availability, data mobili... more These days the common term used for distinguishing the services such as availability, data mobility, cost effective, privacy and security is "Cloud Computing Technology". Cloud computing can solve technical issues, reduce organization cost, and make data available anytime, anywhere. Like many technologies, cloud computing is facing lot of challenges; one of these challenges is "Trust relationship". In this paper we will propose a model called "Cloud Computing Trust Relationship Model (CCTRM)". This model will enhance the security and privacy for cloud computing environment. CCTRM model will be used in telecommunication and nontelecommunication organizations, governments sectors, and private sectors to implement trust relationship between them and cloud computing service providers. This trust will allow the organization to obtain cloud computing services safely without the need to be worry about security and privacy on their cloud.

These days the common term used for distinguishing the services such as availability, data mobili... more These days the common term used for distinguishing the services such as availability, data mobility, cost effective, privacy and security is “Cloud Computing Technology”. Cloud computing can solve technical issues, reduce organization cost, and make data available anytime, anywhere. Like many technologies, cloud computing is facing lot of challenges; one of these challenges is “Trust relationship”. In this paper we will propose a model called “Cloud Computing Trust Relationship Model (CCTRM)”. This model will enhance the security and privacy for cloud computing environment. CCTRM model will be used in telecommunication and non telecommunication organizations, governments sectors, and private sectors to implement trust relationship between them and cloud computing service providers. This trust will allow the organization to obtain cloud computing services safely without
the need to be worry about security and privacy on their cloud.
This paper review the classical security services and requirement in an open environment and intr... more This paper review the classical security services and requirement in an open environment and introduce a Trust Based framework for cloud security. After reviewing deeply cloud computing and cloud challenges we suggest a QoS Framework for a trust based security service.
Cloud Computing is a new networking technology, which provides a pool of highly scalable and easi... more Cloud Computing is a new networking technology, which provides a pool of highly scalable and easily accessible virtualized resources, such as development platforms or services, hardware, software, and is capable of hosting end user applications. A major concern in the Cloud is security; some agree that the Cloud is a secure and trusted system, while others seem to think differently. This paper will survey few major security issues and challenges for Cloud Computing, and investigate the trust models in the Inter-Cloud environment area.
Cloud computing is a cumulative collection of technologies. It shares on-demand computing resourc... more Cloud computing is a cumulative collection of technologies. It shares on-demand computing resources that are positioned and disposed efficiently. In spite of several benefits, numerous challenges are there such as Data security, Performance, Data Locking, Access control, Bandwidth costs, Internet Dependency, Data confidentiality, Auditability, Application and Availability. SLA (Service Level Agreement) plays a vital role in cloud computing. Each service associates with a specific SLA. This is collaboration between service providers and consumer. Therefore, SLA has to define the level of security and their intricacy established on the services to make the consumer realize about the implementation of security policies. The proposed research paper tries to evaluate the challenges in enforcing security for cloud computing services and describe the necessity of a regularization of SLA.
Based framework for cloud security.
Uploads
Papers by Dana Al-Tehmazi
the need to be worry about security and privacy on their cloud.