12 research outputs found

    From cloud computing security towards homomorphic encryption: A comprehensive review

    Get PDF
    ā€œCloud computingā€ is a new technology that revolutionized the world of communications and information technologies. It collects a large number of possibilities, facilities, and developments, and uses the combining of various earlier inventions into something new and compelling. Despite all features of cloud computing, it faces big challenges in preserving data confidentiality and privacy. It has been subjected to numerous attacks and security breaches that have prompted people to hesitate to adopt it. This article provided comprehensive literature on the cloud computing concepts with a primary focus on the cloud computing security field, its top threats, and the protection against each one of them. Data security/privacy in the cloud environment is also discussed and homomorphic encryption (HE) was highlighted as a popular technique used to preserve the privacy of sensitive data in many applications of cloud computing. The article aimed to provide an adequate overview of both researchers and practitioners already working in the field of cloud computing security, and for those new in the field who are not yet fully equipped to understand the detailed and complex technical aspects of cloud computing

    A Review on Cloud Data Security Challenges and existing Countermeasures in Cloud Computing

    Get PDF
    Cloud computing (CC) is among the most rapidly evolving computer technologies. That is the required accessibility of network assets, mainly information storage with processing authority without the requirement for particular and direct user administration. CC is a collection of public and private data centers that provide a single platform for clients throughout the Internet. The growing volume of personal and sensitive information acquired through supervisory authorities demands the usage of the cloud not just for information storage and for data processing at cloud assets. Nevertheless, due to safety issues raised by recent data leaks, it is recommended that unprotected sensitive data not be sent to public clouds. This document provides a detailed appraisal of the research regarding data protection and privacy problems, data encrypting, and data obfuscation, including remedies for cloud data storage. The most up-to-date technologies and approaches for cloud data security are examined. This research also examines several current strategies for addressing cloud security concerns. The performance of each approach is then compared based on its characteristics, benefits, and shortcomings. Finally, go at a few active cloud storage data security study fields

    A Review of Machine Learning-based Security in Cloud Computing

    Full text link
    Cloud Computing (CC) is revolutionizing the way IT resources are delivered to users, allowing them to access and manage their systems with increased cost-effectiveness and simplified infrastructure. However, with the growth of CC comes a host of security risks, including threats to availability, integrity, and confidentiality. To address these challenges, Machine Learning (ML) is increasingly being used by Cloud Service Providers (CSPs) to reduce the need for human intervention in identifying and resolving security issues. With the ability to analyze vast amounts of data, and make high-accuracy predictions, ML can transform the way CSPs approach security. In this paper, we will explore some of the most recent research in the field of ML-based security in Cloud Computing. We will examine the features and effectiveness of a range of ML algorithms, highlighting their unique strengths and potential limitations. Our goal is to provide a comprehensive overview of the current state of ML in cloud security and to shed light on the exciting possibilities that this emerging field has to offer.Comment: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessibl

    Software in the Manufacturing Industry: A Review of Security Challenges and Implications

    Get PDF
    Software defines digital infrastructures in the manufacturing industry, connecting services and computation resources to machines and devices. These infrastructures aim at increased flexibility, scalability, and a wider application portfolio for automated manufacturing processes. At the same time, the complexity of securing software increases dramatically. Threats to confidentiality, integrity, and availability of software can result in critical losses for automated industrial production and impact manufacturing companies. In order to map existing and emerging security challenges, we present the results of a hermeneutic literature review structured along abstraction levels and vertical integration of software. Based on this structure, we derive implications for academia and practice focused on operators, developers, and security auditors of digital infrastructures. Thereby, we discuss courses of action mapped to software security black boxes, infrastructure heterogeneity, and the adaptation of security for operational usage

    Enforcing Data Geolocation Policies in Public Cloud using Trusted Computing

    Get PDF
    With the advancement in technology, Cloud computing always amazes the world with revolutionizing solutions that automate and simplify complex computational tasks. The advantages like no maintenance cost, accessibility, data backup, pay-per-use models, unlimited storage, and processing power encourage individuals and businesses to migrate their workload to the cloud. Despite the numerous advantages of cloud computing, the geolocation of data in the cloud environment is a massive concern, which relates to the performance and government legislation that will be applied to data. The unclarity of data geolocation can cause compliance concerns. In this work, we have presented a technique that will allow users to restrict the geolocation of their data in the cloud environment. We have used trusted computing mechanisms to attest the host and its geolocation remotely. With this model, the user will upload the data whose decryption key will be shared with a third-party attestation server only. The decryption key will be sealed to the TPM of the host after successful attestation guaranteeing the authorized geolocation and platform state

    AnĆ”lise de Desempenho da MigraĆ§Ć£o de InstĆ¢ncias em Openstack

    Get PDF
    Os sistemas de computaĆ§Ć£o em nuvem, atualmente estĆ£o presentes na maioria dos serviƧos disponibilizados pelas empresas de tecnologias de informaĆ§Ć£o. Isto deve-se ao fĆ”cil acesso aos serviƧos de computaĆ§Ć£o em nuvem bem como a facilidade dos dispositivos em aceder a estes serviƧos. Outro aspeto muito importante tanto para os utilizadores como para os provedores de serviƧos em nuvem Ć© a migraĆ§Ć£o de mĆ”quinas virtuais. A migraĆ§Ć£o de mĆ”quinas virtuais permite equilibrar a carga de trabalho dos servidores e permite que os utilizadores continuem a utilizar os serviƧos da nuvem sem interrupƧƵes por terem os seus servidores virtuais transferidos para outros servidores fĆ­sicos. O foco deste trabalho consiste em analisar o desempenho da migraĆ§Ć£o de instĆ¢ncias em OpenStack, o qual Ć© explorado na perspetiva de uma Infraestrutura como ServiƧo (Infraestrutura como ServiƧo (IaaS)), um modelo de serviƧo de auto atendimento que permite gerir infraestruturas de um centro de processamento de dados. O IaaS representa essencialmente hardware que permite o armazenamento e criaĆ§Ć£o de servidores virtuais, conhecidos como instĆ¢ncias ou mĆ”quinas virtuais. O sistema foi desenvolvido na plataforma OpenStack. O OpenStack foi instalado manualmente com recursos ao ficheiro de nuvem do OpenStack. A infraestrutura do sistema Ć© composta por dois servidores de computaĆ§Ć£o, com suporte do hypervisor Kernel-Based Virtual Machine (KVM) que permite a criaĆ§Ć£o das mĆ”quinas virtuais, um servidor de armazenamento que permite a criaĆ§Ć£o de volumes para a inicializaĆ§Ć£o e armazenamento das mĆ”quinas virtuais e do sistema operativo, um servidor Controller Node que armazena os serviƧos adicionais e de rede, que permite a criaĆ§Ć£o de uma topologia de rede para o funcionamento adequado das mĆ”quinas virtuais. Recorrendo ao sistema implementado, o qual Ć© baseado na sĆ©rie Newton do OpenStack foi realizado um estudo de desempenho da migraĆ§Ć£o passiva e da migraĆ§Ć£o ativa de instĆ¢ncias em OpenStack.Cloud computing systems are currently present in most of the services provided by information technology companies.This is due to the easy access to cloud computing services as well as the easiness of devices to access these services. Another important aspect for both users and cloud service providers is the migration of virtual machines. Migrating virtual machines allows the balance of server workloads and allows users to continue to use cloud services seamlessly by having their virtual servers transferred to other physical servers. The focus of this work is to analyze the performance of the migration of instances in OpenStack, which is explored from the perspective of an Infrastructure as a Service (IaaS), a self-service model that allows the management of infrastructures in a data center. A IaaS essentially represents hardware that allows the storage and creation of virtual servers, known as instances or virtual machines. Cloud computing has gained virtualized computing power from storage provided through an infrastructure as a service, with high performance computing capability, provided by many providers, and used by many users. The system was developed on the OpenStack platform. OpenStack has been manually installed using the OpenStack cloud file. The system infrastructure consists of two computing servers, with hypervisor KVM support that allows the creation of virtual machines, a storage server that allows the creation of volumes for the initialization and storage of virtual machines and the system operative, a Controller Node server that stores the additional and network services, which allows the creation of a network typology for the proper functioning of the virtual machines. A performance study of passive migration and the active migration of instances in OpenStack was carried out using the implemented system, which is based on the Newton series of OpenStack
    corecore