114,097 research outputs found

    The Proposed Framework for Cloud Computing System Security and Privacy Services

    Get PDF
    Public cloud computing has emerged as a popular and efficient solution for organizations to store, process, and access their data and applications. However, with the increasing adoption of public cloud services, concerns regarding security have become a critical factor in decision-making processes. This study aims to investigate the security aspects of public cloud computing and identify potential vulnerabilities and threats that organizations may face. The aim of this study is to examine the challenges associated with cloud computing and its security concerns. Cloud computing is a technology that utilizes the internet to share data and resources. It is characterized by five key features: On-Demand self-service, Resource Pooling, Broad network access, Rapid elasticity, and Measured Service. However, despite these benefits, cloud computing has several open issues, including Security, Availability, Scalability, and Interoperability. Traditional security techniques are insufficient in fully securing cloud computing. Security and privacy issues often arise during cloud deployment and delivery models. As a result, researchers are interested in learning more about cloud computing security and its methods. Industries are creating architectural models with a high level of protection for their data center to solve current security challenges. This article examines the security of cloud deployment strategies and analyzes cloud security and privacy challenges. The cloud computing service models are also discussed, along with any security issues. The study emphasizes the significance of Audit as a key factor in offering a security solution that covers all relevant security characteristics as determined by the literature. The study's conclusions present a fresh challenge to cloud service providers and suggest a new security paradigm that explains customer security needs. Overall, this study offers a parameter-by-parameter assessment of available security solutions and makes recommendations for enhancements to address cloud security issues

    Big Data Services Security and Security challenges in cloud environment

    Get PDF
    This paper explores security issues of storage in the cloud and the methodologies that can be used to improve the security level. This study is concluded with a discussion of current problems and the future direction of cloud computing. Big data analysis can also be classified into memory level analysis, business intelligence (BI) level analysis, and massive level analysis. This research paper is based on cloud computing security and data storage issues that organizations face when they upload their data to the cloud in order to share it with their customers. Most of these issues are acknowledged in this paper, and there is also discussion of the various perspectives on cloud computing issues

    Security in cloud computing: State-of-the-art, key features, challenges, and opportunities

    Get PDF
    © 2019 IEEE. Cloud computing is used for storing, processing, and exchanging information within a community or organization on demand. It presents an excellent business model for organizations in order to exploit better IT services with a lower cost, and less investment. However, a range of security issues predetermines such approach to use. This study incorporates an exploratory method of research by collecting state of the art literature on security and privacy of cloud computing with showing the possible solutions presented in multiple research studies. We then discussed cloud computing architecture, cloud computing security, and highlighted the major challenges of cloud computing security. This is necessary to understand the details of the chosen solution to the widespread security issues associated with cloud computing. Another major contribution of this research is the development of a framework that can be used by enterprises to evaluate the level of threats and damages in their virtual environment. The framework is supported by previous theories that were reviewed in this study

    A Distributed Security Model for Cloud Computing

    Get PDF
    Security in Cloud Computing is an ongoing concern and so security mechanisms play an important role. While mechanisms for security in the Cloud exist, new vulnerabilities for Cloud is an ongoing issue. For this, we contend that a need for a new type of security mechanism and model is required. Therefore, we propose a conceptual, high-level view of a distributed security model for Cloud Computing. This paper is part of an ongoing longitudinal study in which the model is outlined and discusses how the proposed security model is distributed among Cloud servers. The distributed security model presents multiple sacrificial targets in an attack and consequently eliminates any single point of failure

    Analysing security risk of a cloud computing system to produce a model for secured business environment

    Get PDF
    These days, almost all the medium and big size of businesses is using the cloud computing system to run their business across the globe and around the clock. It becomes popular and of huge application due to its characteristics such as large scale computation and data storage, virtualization, high expansibility, high reliability and low price service. Cloud Computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer IT services over the Internet. This is an affordable and effective place for businesses to sell and promote their goods and services. However the security problems for the cloud computing system are very significant. It can ruin the rapid development of cloud computing. In Business, cloud Computing presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data and service availability, and demonstrate compliance. The data privacy and service availability in cloud computing are the key security problem. The internet also provides opportunities for fraudulent behaviour and unauthorized access to business and client data. Attacks on the computer system of a business can have immediate and ongoing effects, such as targeting customers for identity crimes or infecting website visitors with malicious software. Due to having combination of various types of models in the cloud computing, the single security method cannot solve its security problem. Various traditional and new technologies and strategies together need to consider for protecting a cloud computing system totally. The aim of this paper is to bring into the deep sight of the cloud computing systems working and then to analyse the cloud computing security problem and its strategy according to the cloud computing concepts and characters. In addition to that, we are identifying the higher vulnerabilities in this type of systems and the most important threats found in the literature study related to Cloud Computing and its environment as well as to identify and relate vulnerabilities and threats with the possible solutions

    Higher education cloud computing in South Africa:towards understanding trust and adoption issues

    Get PDF
    This paper sets out to study the views of key stakeholders on the issue of cloud information security within institutions of Higher Education. A specific focus is on understanding trust and the adoption of cloud computing in context of the unique operational requirements of South African universities. Contributions are made on both a methodological and theoretical level. Methodologically the study contributes by employing an Interpretivist approach and using Thematic Analysis in a topic area often studied quantitatively, thus affording researchers the opportunity to gain the necessary in-depth insight into how key stakeholders view cloud security and trust. A theoretical contribution is made in the form of a trust-centric conceptual framework that illustrates how the qualitative data relates to concepts innate to cloud computing trust and adoption. Both these contributions lend credence to the fact that there is a need to address cloud information security with a specific focus on the contextual elements that surround South African universities. The paper concludes with some considerations for implementing and investigating cloud computing services in Higher Education contexts in South Africa

    Analisis Uji Komparasi Customer Satisfaction Survey Dalam Penggunaan Google Cloud Platform (GCP) Menggunakan Metode Pieces Dan System Usability Scale

    Get PDF
    Cloud Computing technology makes a technology that is most often applied later in the future. Currently, cloud computing technology provides many types of services, including cost management services, data analysis, big data, storage, machine learning, big data, AI, IoT, and application development. Cloud computing technology has made a service and solution, both to increase reliability, reduce computing costs, to provide a great opportunity for the ICT industry to benefit more from cloud computing technology. Customer satisfaction is a level of feeling from someone after being able to compare the performance or results that are felt and obtained compared to their expectations or can be interpreted as a response to customer feedback in using cloud computing technology and an assessment of the good and bad of cloud computing technology which can be used as a reference or a benchmark for cloud computing developers to improve the performance of cloud computing technology that has been built. The level of customer satisfaction can be found using many model methods. In this study the level of satisfaction will be analyzed using the PIECES method and the System Usability Scale. In this study, researchers used two model methods and then carried out a comparative test of these methods. The PIECES variables are Performance, Information and data, Economics, Control and security, Efficiency and Service. The results of the study obtained an average value for each domain, namely the Performance domain with a value of 4.40 (Very Satisfied), Information and data with a value of 4.30 (Very Satisfied), Economics with a value of 4.33 (Very Satisfied), Control and security with a value of 4.28 (Very Satisfied), Efficiency with a value of 4.96 (Very Satisfied) and Service with a value of 4.00 (Satisfied). The recapitulation results for the average value for the entire domain level with a value of 4.37 (Very Satisfied). In the System Usability Scale method, a score of 82.08 is entered in the Acceptable category and grade A. With the comparative test results of the two methods, the satisfaction level of Google Cloud Platform customers is stated to be very satisfied and very good by the customers

    COMPARATIVE STUDY OF CHAOTIC SYSTEM FOR ENCRYPTION

    Get PDF
    Chaotic systems leverage their inherent complexity and unpredictability to generate cryptographic keys, enhancing the security of encryption algorithms. This paper presents a comparative study of 13 chaotic keymaps. Several evaluation metrics, including keyspace size, dimensions, entropy, statistical properties, sensitivity to initial conditions, security level, practical implementation, and adaptability to cloud computing, are utilized to compare the keymaps. Keymaps such as Logistic, Lorenz, and Henon demonstrate robustness and high-security levels, offering large key space sizes and resistance to attacks. Their efficient implementation in a cloud computing environment further validates their suitability for real-world encryption scenarios. The context of the study focuses on the role of the key in encryption and provides a brief specification of each map to assess the effectiveness, security, and suitability of the popular chaotic keymaps for encryption applications. The study also discusses the security assessment of resistance to the popular cryptographic attacks: brute force, known plaintext, chosen plaintext, and side channel. The findings of this comparison reveal the Lorenz Map is the best for the cloud environment based on a specific scenario

    Factors Influencing the Adoption of Cloud-based Village Information System: A Technology-Organization-Environment Framework and AHP–TOPSIS Integrated Model

    Get PDF
    Cloud-based service is a key area for growth in Indonesia, but there are still very few villages that have adopted a village information system based on cloud computing. This study investigates the factors influencing OpenSID adoption in cloud computing. The research was informed by the Technological Organizational Environmental (TOE) and combined two multi-criteria decision analysis methods, namely, AHP and TOPSIS to analyze the acceptance of cloud computing-based village information systems, the driving factors for adoption, and the selection of forms of OpenSID. The research focuses on the analysis of four dimensions namely organization, trust, innovation, and vendor. The sub-dimensions of each dimension include the organization (the technological readiness of actors, top management support, and firm size), Trust (security and privacy factors), innovation (compatibility, complexity, trialability, and relative advantage factors), and Vendor (vendor reputation, perceived price, and external support factors). Primary data was collected using a questionnaire and semi-structured interviews with respondents from the village government apparatus in Indramayu.  The results of the study showed an open-source cloud-based village information system is the most suitable alternative solution for government at the village level in Indramayu, West Java Province.  The results highlighted that the enablers that are critical for cloud adoption include Technology readiness, trust, technological innovation, and vendor. The barriers that are hindering cloud adoption are infrastructure readiness, understanding the use of cloud computing technology, low technical skills and knowledge, data integration issues, and data security. This research is a reference for developing a village information system based on cloud computing

    Accelerating the Adoption of Cloud Technology by SMEs in Nigeria

    Get PDF
    The contentions for this study were to investigate the reason for the slow adoption of Cloud Computing by SME operators in Nigeria and to develop a suitable information model to guide the would-be users in making an informed decision regarding cloud adoption. A structured interview was conducted with a select number of SME operators and industry associates within the researcher’s domain, and a reasonable number of valid responses were obtained.  Technology Acceptance Model (TAM) was adapted as the research framework to qualitatively examine the conditions that affect the adoption of Cloud computing into microfinance business operations, within which a suitable model for improving the adoption of Cloud computing was recommended. The analysis of the study revealed that SMEs in Nigeria, with particular reference to microfinance subsector in Akwa Ibom State are yet to fully embrace Cloud technology.  It was discovered that most of the SMEs studied, has some level of reservation about cloud computing, arising from not having appropriate education and enlightenment about the cloud economic offerings and potentials. From the outcome of the research, the researcher identified that most people’s concerns are as a result of lack of knowledge about cloud computing and so the researcher concluded that appropriate enlightenment by industry stakeholders, cloud service providers, cloud enthusiasts and even the government on the risks and overwhelming economic incentives of cloud computing as well as the provision of a monitored free trial services will encourage the adoption of cloud technology by SMEs. Index Terms - Cloud Adoption, Cloud Computing, Cloud End-user, Cloud Service Providers, Data Security, Microfinance, Nigeria, SMEs, Vendors,
    • …
    corecore