129,330 research outputs found

    A Survey on Data Security in Cloud Computing Using Blockchain: Challenges, Existing-State-Of-The-Art Methods, And Future Directions

    Get PDF
    Cloud computing is one of the ruling storage solutions. However, the cloud computing centralized storage method is not stable. Blockchain, on the other hand, is a decentralized cloud storage system that ensures data security. Cloud environments are vulnerable to several attacks which compromise the basic confidentiality, integrity, availability, and security of the network. This research focus on decentralized, safe data storage, high data availability, and effective use of storage resources. To properly respond to the situation of the blockchain method, we have conducted a comprehensive survey of the most recent and promising blockchain state-of-the-art methods, the P2P network for data dissemination, hash functions for data authentication, and IPFS (InterPlanetary File System) protocol for data integrity. Furthermore, we have discussed a detailed comparison of consensus algorithms of Blockchain concerning security. Also, we have discussed the future of blockchain and cloud computing. The major focus of this study is to secure the data in Cloud computing using blockchain and ease for researchers for further research work

    A threshold secure data sharing scheme for federated clouds

    Full text link
    Cloud computing allows users to view computing in a new direction, as it uses the existing technologies to provide better IT services at low-cost. To offer high QOS to customers according SLA, cloud services broker or cloud service provider uses individual cloud providers that work collaboratively to form a federation of clouds. It is required in applications like Real-time online interactive applications, weather research and forecasting etc., in which the data and applications are complex and distributed. In these applications secret data should be shared, so secure data sharing mechanism is required in Federated clouds to reduce the risk of data intrusion, the loss of service availability and to ensure data integrity. So In this paper we have proposed zero knowledge data sharing scheme where Trusted Cloud Authority (TCA) will control federated clouds for data sharing where the secret to be exchanged for computation is encrypted and retrieved by individual cloud at the end. Our scheme is based on the difficulty of solving the Discrete Logarithm problem (DLOG) in a finite abelian group of large prime order which is NP-Hard. So our proposed scheme provides data integrity in transit, data availability when one of host providers are not available during the computation.Comment: 8 pages, 3 Figures, International Journal of Research in Computer Science 2012. arXiv admin note: text overlap with arXiv:1003.3920 by other author

    Cloud Computing based Learning Management System (CC-LMS) implementation model in Malaysia Higher Education Institutions

    Get PDF
    In the education arena, cloud computing is more apparent in technology to ensure the availability and sharing of resources through virtualization. Despite its attractiveness and benefits, the Higher Education Institution (HEIs) are still hesitant to implement cloud computing services due to insufficient details on issues and priorities in implementing cloud computing services. Therefore, this study aims to explore the potential benefits and obstacles of cloud computing in Learning Management System (LMS) and determine the key success factors of cloud computing implementation for LMS (CC-LMS) operations in HEIs. By synthesizing literature from various industries, this study proposes a conceptual model of Critical Success Factors (CSFs) based cloud computing implementation for HEIs. This framework was extracted from the various aspects of the industry and integrated into the Technological, Organizational, and Environmental (TOE) framework. The research methodology consists of rigorous data collection and quantitative and qualitative data analysis that allows for more substantive conclusions to enable viable CC-LMS operation. The Delphi technique was adapted to assist in the data collection and judgment process. The two-round Delphi survey has been conducted with 18 (1st round) and 13 (2nd round) cloud computing technology and LMS experts from local HEIs and service vendors to assist in the judgment process. This analysis resulted in a consensus after the second round of Delphi survey with the suggestions on the high importance of several factors in implementing a cloud computing system for LMS in HEIs. As a result, on the benefit of this technology, most participants agreed that this technology enhances the technology infrastructure and maintenance, which is synchronized with the main obstacle of CC-LMS implementation, poor infrastructure performance. Finally, the study is expected to provide HEIs decision-makers with a better understanding and guidelines of cloud computing implementation characteristics with the relevant perception of current services

    Cloud Computing Adoption in the South African Public Sector

    Get PDF
    Scholars have touted a variety of benefits for adopting cloud computing solutions in the public sector. However, the  adoption of cloud computing has been low in the South African (SA) government context. This study investigates the factors influencing cloud computing adoption within the SA public sector. The study adopted a case study approach. The research was informed by the Technological Organisational Environmental (TOE) and the Diffusion of Innovation (DOI) theoretical frameworks to understand the trajectory of cloud computing adoption. Primary data was collected using a questionnaire and semi-structured interviews with respondents from government departments. Additionally, secondary data from government Information Technology (IT) policies and strategic documents was analysed. The results highlighted that the enablers that are critical for cloud adoption include cloud computing policy, skills, IT infrastructure and financial support. The barriers that are hindering cloud adoption are related to security risks, network connection, cloud computing policy, costs and budget availability, among others. The identified benefits that may be realised through cloud adoption include enhanced service improvement, cost savings, high system availability, green IT, centralised and shared services and accessibility. The study proposes several guiding principles for cloud computing adoption in the public sector

    Distributed Processing in Cloud Computing

    Get PDF
    Proceedings of the First PhD Symposium on Sustainable Ultrascale Computing Systems (NESUS PhD 2016) Timisoara, Romania. February 8-11, 2016.Cloud computing offers a wide range of resources and services through the Internet that can been used for various purposes. The rapid growth of cloud computing has exempted many companies and institutions from the burden of maintaining expensive hardware and software infrastructure. With characteristics like high scalability, availability and fault tolerance, cloud computing meet the new era needs for massive data processing at an affordable cost. In our doctoral research we intend to study, analyze, evaluate and make proposals in order to further improve the performance of cloud computing.European Cooperation in Science and Technology. COS

    An approach to failure prediction in a cloud based environment

    Get PDF
    yesFailure in a cloud system is defined as an even that occurs when the delivered service deviates from the correct intended behavior. As the cloud computing systems continue to grow in scale and complexity, there is an urgent need for cloud service providers (CSP) to guarantee a reliable on-demand resource to their customers in the presence of faults thereby fulfilling their service level agreement (SLA). Component failures in cloud systems are very familiar phenomena. However, large cloud service providers’ data centers should be designed to provide a certain level of availability to the business system. Infrastructure-as-a-service (Iaas) cloud delivery model presents computational resources (CPU and memory), storage resources and networking capacity that ensures high availability in the presence of such failures. The data in-production-faults recorded within a 2 years period has been studied and analyzed from the National Energy Research Scientific computing center (NERSC). Using the real-time data collected from the Computer Failure Data Repository (CFDR), this paper presents the performance of two machine learning (ML) algorithms, Linear Regression (LR) Model and Support Vector Machine (SVM) with a Linear Gaussian kernel for predicting hardware failures in a real-time cloud environment to improve system availability. The performance of the two algorithms have been rigorously evaluated using K-folds cross-validation technique. Furthermore, steps and procedure for future studies has been presented. This research will aid computer hardware companies and cloud service providers (CSP) in designing a reliable fault-tolerant system by providing a better device selection, thereby improving system availability and minimizing unscheduled system downtime

    Cloud Computing Security Framework - Privacy Security

    Get PDF
    Cloud computing is an emerging style of IT delivery that intends to make the Internet the ultimate home of all computing resources- storage, computations, and accessibility. It has an important aspect for the companies and organization to build and deploy their infrastructure and application. It changed the IT roadmap essential from service seeking infrastructure to infrastructure seeking services. It holds the promise of helping organizations because of its performance, high availability, least cost and many others. But the promise of the cloud cannot be fulfilled until IT professionals have more confidence in the security and safety of the cloud. Data Storage service in the cloud computing is easy as compare to the other data storage services. At the same time, cloud security in the cloud environment is challenging task. Security issues such as service availability, massive traffic handling, application security and authentication, ranging from missing system configuration, lack of proper updates, or unwise user actions from remote data storage. It can expose user’s private data and information to unwanted access. It consider to be biggest problem in a cloud computing. The focus of this research consist on the secure cloud framework and to define a methodology for cloud that will protect user’s data and highly important information from malicious insider as well as outsider attacks by using Kerberos, and LDAP identification

    A Framework for Effective Placement of Virtual Machine Replicas for Highly Available Performance-sensitive Cloud-based Applications

    Get PDF
    REACTION 2012. 1st International workshop on Real-time and distributed computing in emerging applications. December 4th, 2012, San Juan, Puerto Rico.Applications are increasingly being deployed in the Cloud due to benefits stemming from economy of scale, scalability, flexibility and utility-based pricing model. Although most cloud-based applications have hitherto been enterprisestyle, there is a new trend towards hosting performancesensitive applications in the cloud that demand both high availability and good response times. In the current stateof- the-art in cloud computing research, there does not exist solutions that provide both high availability and acceptable response times to these applications in a way that also optimizes resource consumption in data centers, which is a key consideration for cloud providers. This paper addresses this dual challenge by presenting a design of a fault-tolerant framework for virtualized data centers that makes two important contributions. First, it describes an architecture of a fault-tolerance framework that can be used to automatically deploy replicas of virtual machines in data centers in a way that optimizes resources while assures availability and responsiveness. Second, it describes a specific formulation of a replica deployment combinatorial optimization problem that can be plugged into our strategizable deployment framework.This work was supported in part by the National Science Foundation NSF SHF/CNS Award CNS 0915976 and NSF CAREER CNS 0845789. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation

    Exposing Issues and Challenges in Performance of Cloud Computing Services.

    Get PDF
    In current era of high performance computing, cloud computing is considered as new paradigm of ubiquitous computing. Peoples are changing their views and accordingly demand of consumer services for real world applications is getting diversified. Most of all global IT leader companies have started to consume cloud services in one or another way by putting their demands. The cloud is rapidly maturing towards its goal to satisfy federated need of consumer’s need for real-world applications. It is tried to reflect survey of current research related to open issues associated with clouds service performance with consideration of maintenance of performance and quality management and also simulates service level agreement based testing on the large scale commercial testing environment. One of the key aspect of the existing approach is it cloud environment need to achieve more flexibility to satisfy diversified users need and providers service delivery model. A collaborative system shall apply the concept of the cloud service performance testing to reduce the mitigations in cloud data and loss of the service availability and data integrity aspects
    • …
    corecore