5,968 research outputs found
ENFORCING SECURITY ON CLOUD COMPUTING NETWORK: A THEORETICAL FRAME WORK
Cloud computing offers reduced capital expenditure, operational risks, complexity and maintenance, and increasedscalability as well as providing services at different abstraction levels, namely Software-as-a-Service (SaaS), Platform-as-a-Service(PaaS), and Infrastructure-as-a-Service (IaaS). The paper highlighted various threats in cloud computing networking,and also proffered solution by discussing extensively various security measures to be enforced on the system to achievesecurity to a large extent. This paper presents a security architecture that enables a user of cloud networking to definesecurity requirements and enforces them in the cloud networking infrastructure.Keywords: Cloud Computing, Infrastructure, Abstraction, Services, Security & Framework
Government Cloud Computing Strategies: Management of Information Risk and Impact on Concepts and Practices of Information Management
Research Problem
The objective of this research is to investigate the extent to which the government cloud computing
strategies of New Zealand, Australia, the United States, the United Kingdom, Canada and Ireland are
supported by defined processes for considering the information risks of shifting to cloud computing,
and assessing the impact of these approaches on concepts and practices of information
management.
Methodology
The study undertook a qualitative analysis of published policies, strategies and guidance documents
published by regulatory agencies within the target jurisdictions, investigating these documents for
evidence of a process to assess and manage information risks.
Results
The study provides an assessment of the adequacy of governmentsâ guidance frameworks in
preparing government organisations to properly assess the risks, opportunities, and necessary
controls for information in a cloud service.
Implications
The gaps in guidance demonstrated by the study identify opportunities for a more rigorous
assessments of the effectiveness of information management controls and privacy safeguards
implemented by government organisations, and points to characteristics which could be assessed
against in more specific case studies
Security Challenges from Abuse of Cloud Service Threat
Cloud computing is an ever-growing technology that leverages dynamic and versatile provision of computational resources and services. In spite of countless benefits that cloud service has to offer, there is always a security concern for new threats and risks. The paper provides a useful introduction to the rising security issues of Abuse of cloud service threat, which has no standard security measures to mitigate its risks and vulnerabilities. The threat can result an unbearable system gridlock and can make cloud services unavailable or even complete shutdown. The study has identified the potential challenges, as BotNet, BotCloud, Shared Technology Vulnerability and Malicious Insiders, from Abuse of cloud service threat. It has further described the attacking methods, impacts and the reasons due to the identified challenges. The study has evaluated the current available solutions and proposed mitigating security controls for the security risks and challenges from Abuse of cloud services threat
Genomic cloud computing:Legal and ethical points to consider
The biggest challenge in twenty-first century data-intensive genomic science, is developing vast computer infrastructure and advanced software tools to perform comprehensive analyses of genomic data sets for biomedical research and clinical practice. Researchers are increasingly turning to cloud computing both as a solution to integrate data from genomics, systems biology and biomedical data mining and as an approach to analyze data to solve biomedical problems. Although cloud computing provides several benefits such as lower costs and greater efficiency, it also raises legal and ethical issues. In this article, we discuss three key 'points to consider' (data control; data security, confidentiality and transfer; and accountability) based on a preliminary review of several publicly available cloud service providers' Terms of Service. These 'points to consider' should be borne in mind by genomic research organizations when negotiating legal arrangements to store genomic data on a large commercial cloud service provider's servers. Diligent genomic cloud computing means leveraging security standards and evaluation processes as a means to protect data and entails many of the same good practices that researchers should always consider in securing their local infrastructure.</p
eLoanDocs: Riding the Tide of Technology Without Wiping Out
This teaching case describes how eLoanDocs, a professional services business serving the mortgage loan industry, recognized the benefits of emerging technologies to reduce costs and improve process throughput to establish a competitive position in its in marketplace. The case documents how the company adapted to changes in the technological landscape over the past two decades and presents the reader with the decisions the company now faces with the evolution of âcloud computingâ. The case gives students a fundamental understanding of the concept of cloud computing and presents the advantages and risks of this IT infrastructure
Strategies of Mobile Agents on Malicious Clouds
Cloud computing is a service model enabling resources limited mobile devices to remotely execute tasks on the clouds. The Mobile Agent is a software program on behalf of the software installed in the mobile device to negotiate with other mobile agents in the clouds, which provides a diversity of automated negotiation based applications in Mobile Commences. However, the negotiation plans carried by mobile agents are easily be eavesdropped by the malicious cloud platforms, since the codes of mobile agents are read and executed on the cloud platform. Thus, the sellers can take cheat actions to increase their profits, which is to tailor the negotiation plans to seize buyersâ profits after eavesdropping on buyersâ negotiation plans. In this paper, we consider the buyers can take actions to resist the sellersâ cheatings, that is the buyers can tailor their plans with extremely low demands before migrate to the cloud platform. Above situations are modeled as a mathematical model, called the Eavesdropping and Resistance of Negotiation (ERN) Game. We develop a simulator to simulate an artificial market for analyzing the behaviors on ERN Game. The simulation results show buyersâ resistances deter sellers from cheating and cooperative strategies are adopted by buyers and sellers
- âŠ