90,654 research outputs found

    Cloud Computing Data Security: A Review

    Get PDF
    Cloud computing has great potential of providing robust computational power to the society at reduced cost. With the advent of the World Wide Web and the emergence of e-commerce applications and social networks, organizations across the world generate a large amount of data daily. This data would be more useful to cooperating organizations if they were able to share their data. Two major obstacles to this process of data sharing are providing a common storage space and secure access to the shared data. All types of users who require the secure transmission or storage of data in any kind of media or network. We are in great need of encrypting the data. A method to build a trusted computing environment for Cloud Computing system by providing Secure cross platform in to Cloud Computing system. In this method some important security services including authentication, encryption and decryption are provided in Cloud Computing system. In this paper, we propose Data Storage Security by using Trusted Platform Module to achieve storage correctness incorporating Cloud’s dynamic nature while maintaining low computation and communication cost and ensures the security of static data

    Calm before the storm: the challenges of cloud computing in digital forensics

    Get PDF
    Cloud computing is a rapidly evolving information technology (IT) phenomenon. Rather than procure, deploy and manage a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. This development has significant implications for digital forensic investigators, equipment vendors, law enforcement, as well as corporate compliance and audit departments (among others). Much of digital forensic practice assumes careful control and management of IT assets (particularly data storage) during the conduct of an investigation. This paper summarises the key aspects of cloud computing and analyses how established digital forensic procedures will be invalidated in this new environment. Several new research challenges addressing this changing context are also identified and discussed

    Cloud risk communication on social media: The case of Premera Blue Cross

    Get PDF
    Abstract Cloud computing has been growing at a fast pace. This growth has been fueled by this technology's inherent benefits such as cost reduction and convenience. However, the increasing amount and variety of data processed on the cloud have raised the number of security breaches. Although cloud providers were responsible for data security in the past, the new threats require that both cloud providers and users coordinate efforts to minimize losses and ensure data recovery. Our study aims to explore how cloud providers and users can leverage social media to mitigate data security breaches through effective risk communication. We analyzed public data collected from Twitter regarding the security breach faced by the Premera Blue Cross web application between January and April 2015. Preliminary results indicate that Premera Blue Cross (cloud provider) acted as an information source for Twitterers seeking relevant and accurate information during this security breach. Future steps for this study are discussed

    Cross-disciplinary lessons for the future internet

    Get PDF
    There are many societal concerns that emerge as a consequence of Future Internet (FI) research and development. A survey identified six key social and economic issues deemed most relevant to European FI projects. During a SESERV-organized workshop, experts in Future Internet technology engaged with social scientists (including economists), policy experts and other stakeholders in analyzing the socio-economic barriers and challenges that affect the Future Internet, and conversely, how the Future Internet will affect society, government, and business. The workshop aimed to bridge the gap between those who study and those who build the Internet. This chapter describes the socio-economic barriers seen by the community itself related to the Future Internet and suggests their resolution, as well as investigating how relevant the EU Digital Agenda is to Future Internet technologists

    Models of everywhere revisited: a technological perspective

    Get PDF
    The concept ‘models of everywhere’ was first introduced in the mid 2000s as a means of reasoning about the environmental science of a place, changing the nature of the underlying modelling process, from one in which general model structures are used to one in which modelling becomes a learning process about specific places, in particular capturing the idiosyncrasies of that place. At one level, this is a straightforward concept, but at another it is a rich multi-dimensional conceptual framework involving the following key dimensions: models of everywhere, models of everything and models at all times, being constantly re-evaluated against the most current evidence. This is a compelling approach with the potential to deal with epistemic uncertainties and nonlinearities. However, the approach has, as yet, not been fully utilised or explored. This paper examines the concept of models of everywhere in the light of recent advances in technology. The paper argues that, when first proposed, technology was a limiting factor but now, with advances in areas such as Internet of Things, cloud computing and data analytics, many of the barriers have been alleviated. Consequently, it is timely to look again at the concept of models of everywhere in practical conditions as part of a trans-disciplinary effort to tackle the remaining research questions. The paper concludes by identifying the key elements of a research agenda that should underpin such experimentation and deployment
    • 

    corecore