98,442 research outputs found

    Security and privacy aspects of cloud computing : a smart campus case study

    Get PDF
    The trend of cloud computing is accelerating along with emerging technologies such as utility computing, grid computing, and distributed computing. Cloud computing is showing remarkable potential to provide flexible, cost- effective, and powerful resources across the internet, and is a driving force in today’s most prominent computing technologies. The cloud offers the means to remotely access and store data while virtual machines access data over a network resource. Furthermore, cloud computing plays a leading role in the fourth industrial revolution. Everyone uses the cloud daily life when accessing Dropbox, various Google services, and Microsoft Office 365. While there are many advantages in such an environment, security issues such as data privacy, data security, access control, cyber-attacks, and data availability, along with performance and reliability issues, exist. Efficient security and privacy measures should be implemented by cloud service providers to ensure the privacy, confidentiality, integrity, and availability of data services. However, cloud service providers have not been providing enough secure and reliable services to end users. Blockchain is a technology that is improving cloud computing. This revolutionary technology offers persuasive data integrity properties and is used to tackle security problems. This research presents a detailed analysis of privacy and security challenges in the cloud. We demonstrate the importance of security challenges in a case study in the context of smart campus security, which will encourage researchers to examine security issues in cloud computing in the future. © 2022, Tech Science Press. All rights reserved. **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Ikram Haq” is provided in this record*

    Towards performance evaluation of cloud service providers for cloud data security

    Get PDF
    © 2016, Elsevier Ltd. All rights reserved. Today's data is sensitive that requires privacy and security both from the cloud service providers (CSP) as well as from users in its all the form of data states: data at rest, while transferring data, enquiring data, and processing the data. Cloud computing has been applied in the health sector, national security services, banking and other business and companies that store confidential data into the cloud as we have seen in recent years. Therefore, information and data security is a crucial issue that needs to be addressed thoroughly in the cloud computing business. This research deals with the performance analysis of recent cloud data security models. This paper proposes cloud data security models based on Business Process Modeling Notations (BPMN) and simulation results can reveal performances issues related to data security as part of any organizations initiative on Business process management (BPM)

    Research Issues in Cloud Computing

    Get PDF
    Cloud computing moved away from personal computers and the individual enterprise application server to services provided by the cloud of computers The emergence of cloud computing has made a tremendous impact on the Information Technology IT industry over the past few years Currently IT industry needs Cloud computing services to provide best opportunities to real world Cloud computing is in initial stages with many issues still to be addressed The objective of this paper is to explore the different issues of cloud computing and identify important research opportunities in this increasingly important area We present different design challenges categorized under security challenges Data Challenges Performance challenges and other Design Challenge

    Exploring security issues in cloud computing

    Get PDF
    Cloud computing has promised to transform the ways in which we use and interact with information technology (IT). The claims of significant benefits for businesses by using cloud systems are being overshadowed with the increased concerns about security, particularly privacy. This paper explores the unresolved concerns that businesses and users are still facing in terms of ensuring their data remains secure within a cloud environment. Through illustrating these issues with recent security breaches, the evidence clearly suggests they are hindering cloud adoption. Unless more focus is placed on security then cloud platforms are unable achieve cost saving benefits, improved efficiency or performance for a business. This paper argues that rather than cloud computing reaching its potential there are still remaining issues that must be addressed

    Securing Fog Federation from Behavior of Rogue Nodes

    Get PDF
    As the technological revolution advanced information security evolved with an increased need for confidential data protection on the internet. Individuals and organizations typically prefer outsourcing their confidential data to the cloud for processing and storage. As promising as the cloud computing paradigm is, it creates challenges; everything from data security to time latency issues with data computation and delivery to end-users. In response to these challenges CISCO introduced the fog computing paradigm in 2012. The intent was to overcome issues such as time latency and communication overhead and to bring computing and storage resources close to the ground and the end-users. Fog computing was, however, considered an extension of cloud computing and as such, inherited the same security and privacy challenges encountered by traditional cloud computing. These challenges accelerated the research community\u27s efforts to find practical solutions. In this dissertation, we present three approaches for individual and organizational data security and protection while that data is in storage in fog nodes or in the cloud. We also consider the protection of these data while in transit between fog nodes and the cloud, and against rogue fog nodes, man-in-the-middle attacks, and curious cloud service providers. The techniques described successfully satisfy each of the main security objectives of confidentiality, integrity, and availability. Further we study the impact of rogue fog nodes on end-user devices. These approaches include a new concept, the Fog-Federation (FF): its purpose to minimize communication overhead and time latency between the Fog Nodes (FNs) and the Cloud Service Provider (CSP) during the time the system is unavailable as a rogue Fog Node (FN) is being ousted. Further, we considered the minimization of data in danger of breach by rogue fog nodes. We demonstrate the efficiency and feasibility of each approach by implementing simulations and analyzing security and performance

    Dynamic Key Based Algorithm for Security in Cloud Computing Using Soft Computing and Dynamic Fuzzy Approach

    Get PDF
    596-600As cloud computing is escalating by number of services, there are lots of issues regarding vulnerability and integrity in the data centers from where these cloud services are disseminated. This research manuscript presents and implements a unique and effectual approach for security of data centers using dynamic approach for encryption during communication and accessing the cloud services. The results in the projected novel approach are effective in terms of cost, complexity and overall performance. The projected novel approach is using nature inspired approach river formation dynamics for the enhancement of results and performance. In this manuscript, different aspects of cloud environment and the implementation of efficient security is integrated. Using cloud based simulators, the effective implementation can be done on different aspects and algorithms of cloud computing

    Database Security Issues and Challenges in Cloud Computing

    Get PDF
    The majority of enterprises have recently enthusiastically embraced cloud computing, and at the same time, the database has moved to the cloud. This cloud database paradigm can lower data administration expenses and free up new business to concentrate on the product that is being delivered. Furthermore, issues with scalability, flexibility, performance, availability, and affordability can be resolved with cloud computing. Security, however, has been noted as posing a serious risk to cloud databases and has been essential in fostering public acceptance of cloud computing. Several security factors should be taken into account before implementing any cloud database management system. These features comprise, but are not restricted to, data privacy, data isolation, data availability, data integrity, confidentiality, and defense against insider threats. In this paper, we discuss the most recent research that took into account the security risks and problems associated with adopting cloud databases. In order to better comprehend these problems and how they affect cloud databases, we also provide a conceptual model. Additionally, we look into these problems to the extent that they are relevant and provide two instances of vendors and security features that were used for cloud-based databases. Finally, we provide an overview of the security risks associated with open cloud databases and suggest possible future paths

    Provision of Data Accountability and Security in cloud

    Get PDF
    Cloud computing is best emerging paradigm in computer industry. This technology hides the details of services from user. Moreover, users may not know the machines which actually process and host their data and also that data is outsourced to other entities which cause issues related to accountability. So there is need of approach which allows users to keep track of their data in the cloud. To solve security related issues we propose a Cloud Data Security and Accountability (CDMA) framework which is based on Information Accountability. This framework allows user to keep track of data in the cloud. It is an extension of existing Cloud Information Accountability (CIA) with improved performance. Its main feature is lightweight Accountability with high security. DOI: 10.17762/ijritcc2321-8169.150519
    corecore