Attribute-Based Management of Secure Kubernetes Cloud Bursting

Authors

  • Shaik Uzair B.E Student, Department of CSE, ISL Engineering College, Hyderabad, INDIA Author
  • Mohd Abdul Rahman B.E Student, Department of CSE, ISL Engineering College, Hyderabad, INDIA Author
  • Abdul Azeez B.E Student, Department of CSE, ISL Engineering College, Hyderabad, INDIA Author
  • Dr.Syed Asadullah Hussaini Assistant Professor, Department of CSE, ISL Engineering College Hyderabad, INDIA. Author

DOI:

https://doi.org/10.62647/IJITCE2025V13I2sPP369-373

Keywords:

Role based access control, policy enforcement, Security policies, environmental attribute

Abstract

In modern cloud computing, the need for flexible and scalable orchestration of services, combined with robust security measures, is paramount. In this paper, we propose an innovative approach for managing secure cloud bursting in Kubernetes, combining Attribute-Based Encryption (ABE) with Kuberneteslabeling. Our model addresses the challenges of complexity, cost, and data protection compliance by leveraging both Kubernetes and ABE. We introduce an attribute-based bursting component that uses Kubernetes labels for orchestration, and an encryption component that employs ABE for data protection. This unified management model ensures data confidentiality while enabling efficient cloud bursting. Our approach combines the strengths of label-based orchestration with fine-grained encryption, providing a technologically advanced yet user-friendly solution for secure cloud bursting. We present a proof-of-concept implementation that demonstrates the feasibility and effectiveness of our model. Our approach offers a unified solution that complies with security and privacy laws while meeting the needs of contemporary cloud-based systems.

Downloads

Download data is not yet available.

Downloads

Published

13-06-2025

How to Cite

Attribute-Based Management of Secure Kubernetes Cloud Bursting. (2025). International Journal of Information Technology and Computer Engineering, 13(2s), 369-373. https://doi.org/10.62647/IJITCE2025V13I2sPP369-373