{"title":"Users' Security Requirements Architectural Framework (USRAF) for Emerging Markets in Cloud Computing","authors":"V. R. Thakare, K. J. Singh","doi":"10.1109/CCEM.2015.20","DOIUrl":null,"url":null,"abstract":"Security is a most challenging parameter in Internet resources where users can share their data with each other. In cloud computing, while sharing the data, security and privacy are the major challenges. Moreover, networking issues are the hot topics for researchers. To maintain the security, users as well as a service provider have to keep some security parameters in mind, like security goals, (confidentiality, Integrity and availability), policies, resource constraints. To achieve security goals by following security policies, this framework is proposed. In (USRAF) Users' Security Requirements Architectural Framework the workflow of users security approach is elaborated.","PeriodicalId":339923,"journal":{"name":"2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCEM.2015.20","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Security is a most challenging parameter in Internet resources where users can share their data with each other. In cloud computing, while sharing the data, security and privacy are the major challenges. Moreover, networking issues are the hot topics for researchers. To maintain the security, users as well as a service provider have to keep some security parameters in mind, like security goals, (confidentiality, Integrity and availability), policies, resource constraints. To achieve security goals by following security policies, this framework is proposed. In (USRAF) Users' Security Requirements Architectural Framework the workflow of users security approach is elaborated.