{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T19:40:42Z","timestamp":1654112442953},"reference-count":11,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,1,1]]},"abstract":"
The Cloud has become a significant topic in computing; however, the trend has established a new range of security issues that need to be addressed. In Cloud, the data and associated software are not under their control. In addition, with the growing demands for Cloud networks communication. With the increasing demand for computer communications the need for security is growing dramatically. The existing research related to security mechanisms focuses on security of the data transmission in the communication networks only. The authors developed specific Secure Data Transmission Mechanism (S SDTM) for cloud outsourced data is a set of technologies and solutions to enforce security policy and bandwidth compliance on all devices seeking to access network computing resources, in order to limit damage from emerging security threats and to allow network access only to compliant and trusted endpoint devices. IPSec is a suite of protocols that adds security to communications at the IP level. Protocols within the IPSec suite make extensive use of cryptographic algorithms. Since these algorithms are computationally sophisticated, some hardware accelerators are needed to support high throughput. In this paper, the authors compare between secure data transmission mechanism for cloud outsourced data with preemption control algorithm and TLS to improve the properties of the S SDTM and the Virtual Private Networks (VPN) built with both protocols.<\/p>","DOI":"10.4018\/ijcac.2014010104","type":"journal-article","created":{"date-parts":[[2014,7,25]],"date-time":"2014-07-25T15:54:25Z","timestamp":1406303665000},"page":"45-49","source":"Crossref","is-referenced-by-count":1,"title":["Performance Evaluation of Secure Data Transmission Mechanism (SDTM) for Cloud Outsourced Data and Transmission Layer Security (TLS)"],"prefix":"10.4018","volume":"4","author":[{"given":"Abdullah A.","family":"Alhaj","sequence":"first","affiliation":[{"name":"Faculty of Information Technology and Systems, The University of Jordan-Aqaba Branch, Aqaba, Jordan"}]}],"member":"2432","reference":[{"key":"ijcac.2014010104-0","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.2013010104"},{"key":"ijcac.2014010104-1","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.2011040105"},{"key":"ijcac.2014010104-2","doi-asserted-by":"crossref","unstructured":"Kent, S., & Atkinson, R. (1998). IP authentication header \u2013 RFC2402.","DOI":"10.17487\/rfc2402"},{"key":"ijcac.2014010104-3","doi-asserted-by":"crossref","unstructured":"Kent, S., & Atkinson, R. (1998). Security architecture for the internet protocol \u2013 RFC2401. IETF RFC. Retrieved from http:\/\/www.ietf.org\/rfc.html","DOI":"10.17487\/rfc2401"},{"key":"ijcac.2014010104-4","unstructured":"Networks, J. Inc. (n.d.). Juniper networks VPN, Decision guide. Retrieved from http:\/\/www.juniper.net\/products\/integrated"},{"key":"ijcac.2014010104-5","unstructured":"Open TLS. (n.d.). Retrieved from http:\/\/www.open TLS.org."},{"key":"ijcac.2014010104-6","author":"E.Rescorla","year":"2001","journal-title":"TLS and TLS designing and building secure systems"},{"key":"ijcac.2014010104-7","unstructured":"RFC. (1998). IP encapsulating security payload (ESP) \u2013RFC2406. IETF RFC. Retrieved from http:\/\/www.ietf.org\/rfc.html"},{"key":"ijcac.2014010104-8","unstructured":"RFC. (1998). Retrieved from http:\/\/www.ietf.org\/rfc.html"},{"key":"ijcac.2014010104-9","doi-asserted-by":"crossref","unstructured":"Shacham, A., Monsour, B., Pereira, R., Thomas, M. (1998). IP pay load compression protocol IPCOMP RFC Dec.","DOI":"10.17487\/rfc2393"},{"key":"ijcac.2014010104-10","first-page":"481","author":"W.Stallings","year":"2003","journal-title":"Cryptography and network security"}],"container-title":["International Journal of Cloud Applications and Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=111147","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T19:01:31Z","timestamp":1654110091000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijcac.2014010104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2014,1,1]]},"references-count":11,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"URL":"http:\/\/dx.doi.org\/10.4018\/ijcac.2014010104","relation":{},"ISSN":["2156-1834","2156-1826"],"issn-type":[{"value":"2156-1834","type":"print"},{"value":"2156-1826","type":"electronic"}],"subject":["General Medicine"],"published":{"date-parts":[[2014,1,1]]}}}