{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T12:01:51Z","timestamp":1747224111548,"version":"3.40.5"},"reference-count":19,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,1,1]]},"abstract":"<p>The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. In Cloud, the data and associated software are not under their control. In addition, with the growing demands for Cloud networks communication, it becomes increasingly important to secure the data flow path. The existing research related to security mechanisms only focuses on securing the flow of information in the communication networks. There is a lack of work on improving the performance of networks to meet quality of service (QoS) constrains for various services. The security mechanisms work by encryption and decryption of the information, but do not consider the optimised use of the network resources. In this paper the authors propose a Secure Data Transmission Mechanism (SDTM) with Preemption Algorithm that combines between security and quality of service. Their developed SDTM enhanced with Malicious Packets Detection System (MPDS) which is a set of technologies and solutions. It enforces security policy and bandwidth compliance on all devices seeking to access Cloud network computing resources, in order to limit damage from emerging security threats and to allow network access only to compliant and trusted endpoint devices. This SDTM also provides support for quality of service. High-level simulations and the related results are provided to show the properties of the SDTM.<\/p>","DOI":"10.4018\/ijcac.2013010104","type":"journal-article","created":{"date-parts":[[2013,7,10]],"date-time":"2013-07-10T13:22:33Z","timestamp":1373462553000},"page":"34-43","source":"Crossref","is-referenced-by-count":14,"title":["A Secure Data Transmission Mechanism for Cloud Outsourced Data"],"prefix":"10.4018","volume":"3","author":[{"given":"Abdullah","family":"Alhaj","sequence":"first","affiliation":[{"name":"Faculty of Information Technology, University of Jordan\/Aqaba, Aqaba, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5748-4921","authenticated-orcid":true,"given":"Shadi","family":"Aljawarneh","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, Isra University, Amman, Jordan"}]},{"given":"Shadi","family":"Masadeh","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Al-Hussein Bin Talal University, Ma\u2019an, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6540-0334","authenticated-orcid":true,"given":"Evon","family":"Abu-Taieh","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, University of Jordan\/Aqaba, Aqaba, Jordan"}]}],"member":"2432","reference":[{"key":"ijcac.2013010104-0","doi-asserted-by":"crossref","unstructured":"Alhaj, A., Mellor, J., & Awan, I. (2009). Performance evaluation of secure call admission control for multiclass internet services. In Proceedings of the 23rd IEEE-AINA'09, Bradford, UK.","DOI":"10.1109\/WAINA.2009.80"},{"key":"ijcac.2013010104-1","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.2011040105"},{"journal-title":"Security engineering: A guide to building dependable distributed systems","year":"2001","author":"R.Anderson","key":"ijcac.2013010104-2"},{"key":"ijcac.2013010104-3","unstructured":"Baghaei, N., & Hunt, R. (2004). IEEE 802.11 wireless LAN security performance using multiple clients. In Proceedings of the 12th IEEE International Conference on Networks (ICON 2004)."},{"key":"ijcac.2013010104-4","doi-asserted-by":"crossref","unstructured":"Barnet, Y., Ford, P., Yavatkar, R., Baker, F., Zhang, L., Speer, M., et al. (2000). A framework for integrated services operation over diffserv networks. Retrieved from http:\/\/tools.ietf.org\/html\/rfc2998","DOI":"10.17487\/rfc2998"},{"key":"ijcac.2013010104-5","doi-asserted-by":"crossref","unstructured":"Chang, K., Kim, G. T., Samtani, S., Staikos, A., Muzzelo, L., & Palumbo, J. (2006). A study on the call admission and preemption control algorithms for secure wireless ad hoc networks using IPSec tunneling. In Proceedings of the MILCOM 2006.","DOI":"10.1109\/MILCOM.2006.302177"},{"key":"ijcac.2013010104-6","doi-asserted-by":"crossref","unstructured":"Dasarathy, B., Gadgil, S., Vaidyanathan, R., Parmeswaran, K., Coan, B. A., Conarty, M., & Bhanot, V. (2005). Network QoS assurance in a multi-layer adaptive resource management scheme for mission-critical application using CORBA middleware framework. In Proceedings of the 11th Real Time and Embedded Technology and Applications Symposium.","DOI":"10.1109\/RTAS.2005.34"},{"journal-title":"Network security","year":"1993","author":"M.Devargas","key":"ijcac.2013010104-7"},{"key":"ijcac.2013010104-8","unstructured":"Developed draft strawman DSCP mapping for GIG enterprise IP networks. (n.d.)."},{"journal-title":"Practical computer network security","year":"1995","author":"M.Hendry","key":"ijcac.2013010104-9"},{"key":"ijcac.2013010104-10","unstructured":"IPSec Developers Forum. W.i.I. (n.d.). Retrieved January 2, 2005, from http:\/\/www-ip-sec.com5PSecinfoh.tml"},{"key":"ijcac.2013010104-11","unstructured":"Lough, D. L., & Krizman, K. J. (2003). A short tutorial on wireless LANs and IEEE802.11."},{"journal-title":"An update on Moore's law","year":"1997","author":"G. E.Moore","key":"ijcac.2013010104-12"},{"key":"ijcac.2013010104-13","doi-asserted-by":"crossref","unstructured":"Raghuram, S. S., & Chakrabarti, C. (2000). A programmable processor for cryptography. In Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS 2000), Geneva, Switzerland (pp. 685\u2013688).","DOI":"10.1109\/ISCAS.2000.857574"},{"key":"ijcac.2013010104-14","unstructured":"Soltwisch, R., Hogrefe, D., Bericht, T., & Gottingen, G.-a.-u. (2004). Survey on network security - 2004."},{"key":"ijcac.2013010104-15","unstructured":"IEEE Std 802.11-1999 (1999). Part II: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications."},{"key":"ijcac.2013010104-16","unstructured":"Sucec, J., Samtani, S., & Bereschinsky, M. A. (2005, October 17-20). Resource friendly approach for estimating available bandwidth in secure IP networks. In Proceedings of the Military Communications Conference (MILCOM 2005)."},{"key":"ijcac.2013010104-17","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655016"},{"key":"ijcac.2013010104-18","unstructured":"Worthen, B. (2009). Inside the head of Obama's CIO. The Wall Street Journal Digits."}],"container-title":["International Journal of Cloud Applications and Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=78517","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T02:55:47Z","timestamp":1654138547000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcac.2013010104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,1,1]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcac.2013010104","relation":{},"ISSN":["2156-1834","2156-1826"],"issn-type":[{"type":"print","value":"2156-1834"},{"type":"electronic","value":"2156-1826"}],"subject":[],"published":{"date-parts":[[2013,1,1]]}}}