5,968 research outputs found

    ENFORCING SECURITY ON CLOUD COMPUTING NETWORK: A THEORETICAL FRAME WORK

    Get PDF
    Cloud computing offers reduced capital expenditure, operational risks, complexity and maintenance, and increasedscalability as well as providing services at different abstraction levels, namely Software-as-a-Service (SaaS), Platform-as-a-Service(PaaS), and Infrastructure-as-a-Service (IaaS). The paper highlighted various threats in cloud computing networking,and also proffered solution by discussing extensively various security measures to be enforced on the system to achievesecurity to a large extent. This paper presents a security architecture that enables a user of cloud networking to definesecurity requirements and enforces them in the cloud networking infrastructure.Keywords: Cloud Computing, Infrastructure, Abstraction, Services, Security & Framework

    Community Trust Stores for Peer-to-Peer e-Commerce Applications

    Get PDF

    Government Cloud Computing Strategies: Management of Information Risk and Impact on Concepts and Practices of Information Management

    No full text
    Research Problem The objective of this research is to investigate the extent to which the government cloud computing strategies of New Zealand, Australia, the United States, the United Kingdom, Canada and Ireland are supported by defined processes for considering the information risks of shifting to cloud computing, and assessing the impact of these approaches on concepts and practices of information management. Methodology The study undertook a qualitative analysis of published policies, strategies and guidance documents published by regulatory agencies within the target jurisdictions, investigating these documents for evidence of a process to assess and manage information risks. Results The study provides an assessment of the adequacy of governments’ guidance frameworks in preparing government organisations to properly assess the risks, opportunities, and necessary controls for information in a cloud service. Implications The gaps in guidance demonstrated by the study identify opportunities for a more rigorous assessments of the effectiveness of information management controls and privacy safeguards implemented by government organisations, and points to characteristics which could be assessed against in more specific case studies

    Compliance in the Ether: Cloud Computing, Data Security and Business Regulation

    Get PDF

    Security Challenges from Abuse of Cloud Service Threat

    Get PDF
    Cloud computing is an ever-growing technology that leverages dynamic and versatile provision of computational resources and services. In spite of countless benefits that cloud service has to offer, there is always a security concern for new threats and risks. The paper provides a useful introduction to the rising security issues of Abuse of cloud service threat, which has no standard security measures to mitigate its risks and vulnerabilities. The threat can result an unbearable system gridlock and can make cloud services unavailable or even complete shutdown. The study has identified the potential challenges, as BotNet, BotCloud, Shared Technology Vulnerability and Malicious Insiders, from Abuse of cloud service threat. It has further described the attacking methods, impacts and the reasons due to the identified challenges. The study has evaluated the current available solutions and proposed mitigating security controls for the security risks and challenges from Abuse of cloud services threat

    Genomic cloud computing:Legal and ethical points to consider

    Get PDF
    The biggest challenge in twenty-first century data-intensive genomic science, is developing vast computer infrastructure and advanced software tools to perform comprehensive analyses of genomic data sets for biomedical research and clinical practice. Researchers are increasingly turning to cloud computing both as a solution to integrate data from genomics, systems biology and biomedical data mining and as an approach to analyze data to solve biomedical problems. Although cloud computing provides several benefits such as lower costs and greater efficiency, it also raises legal and ethical issues. In this article, we discuss three key 'points to consider' (data control; data security, confidentiality and transfer; and accountability) based on a preliminary review of several publicly available cloud service providers' Terms of Service. These 'points to consider' should be borne in mind by genomic research organizations when negotiating legal arrangements to store genomic data on a large commercial cloud service provider's servers. Diligent genomic cloud computing means leveraging security standards and evaluation processes as a means to protect data and entails many of the same good practices that researchers should always consider in securing their local infrastructure.</p

    eLoanDocs: Riding the Tide of Technology Without Wiping Out

    Get PDF
    This teaching case describes how eLoanDocs, a professional services business serving the mortgage loan industry, recognized the benefits of emerging technologies to reduce costs and improve process throughput to establish a competitive position in its in marketplace. The case documents how the company adapted to changes in the technological landscape over the past two decades and presents the reader with the decisions the company now faces with the evolution of “cloud computing”. The case gives students a fundamental understanding of the concept of cloud computing and presents the advantages and risks of this IT infrastructure

    Strategies of Mobile Agents on Malicious Clouds

    Get PDF
    Cloud computing is a service model enabling resources limited mobile devices to remotely execute tasks on the clouds. The Mobile Agent is a software program on behalf of the software installed in the mobile device to negotiate with other mobile agents in the clouds, which provides a diversity of automated negotiation based applications in Mobile Commences. However, the negotiation plans carried by mobile agents are easily be eavesdropped by the malicious cloud platforms, since the codes of mobile agents are read and executed on the cloud platform. Thus, the sellers can take cheat actions to increase their profits, which is to tailor the negotiation plans to seize buyers’ profits after eavesdropping on buyers’ negotiation plans. In this paper, we consider the buyers can take actions to resist the sellers’ cheatings, that is the buyers can tailor their plans with extremely low demands before migrate to the cloud platform. Above situations are modeled as a mathematical model, called the Eavesdropping and Resistance of Negotiation (ERN) Game. We develop a simulator to simulate an artificial market for analyzing the behaviors on ERN Game. The simulation results show buyers’ resistances deter sellers from cheating and cooperative strategies are adopted by buyers and sellers
    • 

    corecore