80,571 research outputs found

    Survey of Enhancing Security of Cloud Using Fog Computing

    Get PDF
    Nowadays Fog Computing has become a vast research area in the domain of cloud computing. Due to its ability of extending the cloud services towards the edge of the network, reduced service latency and improved Quality of Services, which provides better user experience. However, the qualities of Fog Computing emerge new security and protection challenges. The Current security and protection estimations for cloud computing cannot be straightforwardly applied to the fog computing because of its portability and heterogeneity. So these issues in fog computing arises new research challenges and opportunities. This survey features about existing security concerns for fog computing and new proposed system to tackle some of the issues in fog computing related to security and privacy, thereby enhancing the cloud security

    Security and Privacy Concerns for Australian SMEs Cloud Adoption

    Get PDF
    Cloud Computing has become increasingly important for Small and Medium-sized Enterprises because of its cost-effective benefits. However, the adoption of Cloud Computing over the recent years raised challenging issues with regard to privacy and security. In this study, we explored and presented the findings of the influence of privacy and security on Cloud adoption by SMEs. Based on a survey of SMEs across Australia, we analysed the data using structural equation modelling. We found that Cloud privacy and Cloud security are major concerns for SMEs to adopt Cloud computing. The study findings are useful for IT practitioners and regulatory bodies to understand how SMEs consider privacy and security issues for Cloud adoption

    The Refugee Problem: An International Legal Tangle

    Get PDF
    Change is constant and computing paradigm is no exception. It has witnessed major shifts right from centralized client server systems to widely distributed systems. This time the locus of change in the computing paradigm is moving towards virtualization, paving way to cloud computing. Cloud computing aims at providing computing services to its users as an utility. It allows its authenticated users to access a wide range of highly scalable computing capabilities and services via the internet on a pay-per-usage basis. Organisations not only view these benefits as cost-saving strategies, but also aim at improving the competitive advantages using cloud computing. Hence, this has given rise to a new horizon in IT/IS outsourcing. With a collaboration of cloud computing and outsourcing emerged a new concept called cloudsourcing. Cloudsourcing can be termed as the next generation outsourcing and the next phase of cloud computing promising benefits from both the areas. Cloudsourcing is outsourcing traditional business via the cloud infrastructure. Though there is pompous popularity surrounding this new technology, there is much hesitation in adopting it due to the inherent security issues. This paper discusses in detail the security issues and possible solution to the same. As this is a new concept, not much work is identified to be done in providing a set of guidelines to adopt cloudsourcing that are very specific to information security. This work intends to fill this aperture by building a set of well-defined information security guidelines, which can be termed as a novel. For this purpose, design science research method proposed by Hevner et al is used so as to accomplish this goal. Initially, a literature study is done after which an exploratory study comprising of interviews is done to gather qualitative data. The results of the exploratory interview is tested for correctness and evaluated based on an evaluation study comprising a survey based questionnaire. The analysis of the evaluation study results provides the final results. In such an attempt, the identified countermeasures to risks are classified into three groups namely, organisational, technical and regulatory and compliance guidelines. Hence the end results constituting the set of information security guidelines are classified into the above mentioned groups. This work is assumed to contribute to our understanding of information security in cloudsourcing and in supporting IT decision makers, IT project managers and security executives of organisations for a smooth and secure transition towards cloudsourcing their business

    Cyber-Storms Come from Clouds: Security of Cloud Computing in the IoT Era

    Get PDF
    The Internet of Things (IoT) is rapidly changing our society to a world where every "thing" is connected to the Internet, making computing pervasive like never before. This tsunami of connectivity and data collection relies more and more on the Cloud, where data analytics and intelligence actually reside. Cloud computing has indeed revolutionized the way computational resources and services can be used and accessed, implementing the concept of utility computing whose advantages are undeniable for every business. However, despite the benefits in terms of flexibility, economic savings, and support of new services, its widespread adoption is hindered by the security issues arising with its usage. From a security perspective, the technological revolution introduced by IoT and Cloud computing can represent a disaster, as each object might become inherently remotely hackable and, as a consequence, controllable by malicious actors. While the literature mostly focuses on security of IoT and Cloud computing as separate entities, in this article we provide an up-to-date and well-structured survey of the security issues of Cloud computing in the IoT era. We give a clear picture of where security issues occur and what their potential impact is. As a result, we claim that it is not enough to secure IoT devices, as cyber-storms come from Clouds

    Cloud Computing Security, Privacy Improvements Using Virtualized High Trust Zone

    Get PDF
    The benefits of cloud computing are clearly well known which include rapid deployment, ease of customization, reduce cost and low risks. However, some high profile security breaches confuse organizations as they attempt to deploy cloud services in their businesses. Although, the cloud service providers pitch the security of their services. Enhancements in existing security measures and advanced solutions are needed to ensure high level security and privacy of data on cloud. This paper provides a holistic overview of cloud security issues by encompassing unique threats in cloud computing and presents findings of a survey of practitioners view on cloud security. A Virtualized High Trust Zone (VHTZ) is then presented as a solution, especially for infrastructure based cloud services to tackle the attacks and network monitoring in a virtualized infrastructure

    A Survey on Fog Computing Security Issues and Challenges

    Get PDF
    Fog computing is a paradigm that extends Cloud computing and services to the edge of the network which eliminates the limitations such as abeyance, curtailed mobility, absenteeism of location awareness, security short comings etc. This survey paper gives an overview of fog computing, its benefits, challenges, architectural components, security and privacy issues. Also discusses about the encryption algorithms, techniques, security requirements and the key challenges for fog computing

    Data Security and Access Control Mechanisms in Cloud: A Review

    Get PDF
    Cloud computing is a computing technology or information technology architecture used by organization or individuals. It launches data storage and interactive paradigm with some advantages like on-demand self-services, ubiquitous network access. Due to popularity of cloud services, security and privacy becomes major issue. This paper addresses study of privacy preservation issues and also provides an idea to how to overcome the issues. Also it provides a brief survey on various Robust Access Privilege Control mechanism used for providing privacy in cloud storage

    Multi-Authority Access Control Mechanisms in Cloud: A Review

    Get PDF
    Cloud computing is a computing technology or information technology architecture used by organization or individuals. It launches data storage and interactive paradigm with some advantages like on-demand self-services, ubiquitous network access. Due to popularity of cloud services, security and privacy becomes major issue. This paper addresses study of privacy preservation issues and also provides an idea to how to overcome the issues. Also it provides a brief survey on various Robust Access Privilege Control mechanism used for providing privacy in cloud storage

    A Novel Approach for Securing Cloud Data Using Cryptographic Approach

    Get PDF
    — Nowadays, many businesses are making use cloud computing facility either directly (e.g. Google or Amazon) or indirectly (e.g. Twitter) instead of traditional on-site alternatives. Costs reduction, universal access, availability of number of applications and flexibility is a number of reasons for popularity of cloud computing. As the cloud service providers cannot be trusted one, enough security is an important aspect to consider so that user can store sensitive information securely. The concept of Multi Clouds is introduces as cloud computing assures user to provide the data, the cloud computing environment failure may result in loss or unavailability of data. Multi clouds guarantee to provide service at any cost if there is any failure at any cloud due to any reason. The use of multi clouds as it can tackle the security and mainly availability issues much effectively than single cloud that affects cloud computing user. This paper presents survey of recent research related to single and multi cloud security and addresses possible solutions. This aims to promote the use of multi clouds to solve problem of data availability due to failure in individual cloud. To provide data confidentiality, data integrity as well as authenticity, security mechanisms such as data encryption, visual secret sharing scheme (VSS)and digital signature are used

    Exploring Data Security and Privacy Issues in Internet of Things Based on Five-Layer Architecture

    Get PDF
    Data Security and privacy is one of the serious issues in internet-based computing like cloud computing, mobile computing and Internet of Things (IoT). This security and privacy become manifolded in IoT because of diversified technologies and the interaction of Cyber Physical Systems (CPS) used in IoT. IoTs are being adapted in academics and in many organizations without fully protecting their assets and also without realizing that the traditional security solutions cannot be applied to IoT environment. This paper explores a comprehensive survey of IoT architectures, communication technologies and the security and privacy issues of them for a new researcher in IoT. This paper also suggests methods to thwart the security and privacy issues in the different layers of IoT architecture
    • …
    corecore