74,714 research outputs found

    Data Security in Cloud Storage

    Get PDF
    Cloud Computing is a generic term for delivering hosted services over the Internet. It follows a pay-per-use approach. Cloud Computing offers numerous benefits for the enterprises, however, there are also many issues, as with any new paradigm or technology. One of the main issues relate to the security and confidentiality of customer data in terms of its location, relocation, availability and security. From the consumer’s perspective, cloud computing security concerns, especially data security, remain the primary inhibitor for adoption of cloud computing services. This reports outlines the Cloud technology overview, brief explains the delivery and deployment models for data storage security, analysis on data security and discusses the issues relating to data in the Cloud computing across all stages of data life cycle

    Development of Cloud Computing and Security Issues

    Get PDF
    In past three decades, the computing world is based on the Internet, featured by the rapid development and application of computer technology. The cloud computing model is one of the very important  shapes of a new era. This technology based on the distributed  computing, parallel computing, grid computing, Virtualization technologies, property- based remote attestation technologies, etc.  The cloud computing market and development are growing rapidly and bringing up numerous challenges and big  security issues of the today's world. Some  issues concern on the cloud computing is  the security and confidentiality of user data in terms of its location, relocation, availability and security. In this paper we will focus on the basic way of cloud computing development, growths and common security issues arising from the usage of cloud services. Keywords: Cloud computing, Security, Saas, Cloud Security, Internet

    Administration Security Issues in Cloud Computing

    Get PDF
    This paper discover the most administration security issues in Cloud Computing in term of trustworthy and gives the reader a big visualization of the concept of the Service Level Agreement in Cloud Computing and it’s some security issues. Finding a model that mostly guarantee that the data be saved secure within setting for factors which are data location, duration of keeping the data in cloud environment, trust between customer and provider, and procedure of formulating the SLA

    Cloud Security Issue and Challenges

    Get PDF
    In past three decades, the world of computation has changed from centralized (client-server not web-based) todistributed systems and now we are getting back to the virtual centralization (Cloud Computing). Location of data and processes makes the difference in the realm of computation. On one hand, an individual has full control on data and processes in his/her computer. On the other hand, we have the cloud computing wherein, the service and data maintenance is provided by some vendor which Leaves the client/customer unaware of where the processes are running or where the data is stored. So, logically speaking, the client has no control over it. The Cloud computing uses the internet as the communication Media. When we look at the security of data in the cloud Computing, the vendor has to provide some assurance in Service level agreements (SLA) to convince the customer on security issues. Organizations use cloud computing as a service infrastructure; critically like to examine the security and confidentiality issues for their business critical insensitive applications. Yet, guaranteeing the security of corporate data in the "cloud" is difficult, if not impossible, as they provide different services like Software as a service (SaaS), Platform as a service (PaaS), and Infrastructure as a service (IaaS). Each service has their own security issues. So the SLA describes different levels of security and their complexity to make the customer understand the security policies that are being implemented. There has to be a standardized way to prepare the SLA irrespective to the providers. This can help some of the enterprises to look forward in using the cloud services. In this paper, we put forward some security issues that have to be included in SLA. Keywords: Cloud Computing, Service Level Agreement (SLA), Software as a Service (SaaS), Cloud computing Security

    Cloud Computing and its Challenges

    Get PDF
    The term CLOUD means, In today’s world we cannot imagine our life without internet. The whole data is now shifting towards “cloud”. The term cloud (Common Location Independent Online Utility on Demand) computing explains how a “cloud” holds millions of data with safety and it provides data to users whenever it necessary. So the term cloud computing also explains the concept of virtualization. But with increasing its usage the threats with cloud computing also increasing, these issues like privacy, data handling, data stealing, etc. In this paper we are explaining the concept of identity based mRSA algorithm where our SEM server is never compromised and security issues are increased at great level. DOI: 10.17762/ijritcc2321-8169.150511

    Attribute-Based Encryption Scheme for Secured data Storage in Cloud Computing

    Get PDF
    This a storage security model in Cloud Computing and making a considerable measure of convincing purposes behind organizations to convey cloud-based storage. For another business, start-up costs are fundamentally decreased in light of the fact that there is no compelling reason to contribute capital in advance for an inner to help the business. By a long shot, the main inquiry customers considering a move to cloud storage ask is regardless of whether their data will be secure. Stored data offsite doesn't change data security necessities; they are the same as those confronting data put away on location. Security ought to be based on business prerequisites for particular applications and data sets, regardless of where the data is stored. We trust that data storage security in Cloud Computing, a zone brimming with challenges and of fundamental significance, is still in its earliest stages now, and numerous examination issues are yet to be distinguished. In this paper, we examined the issue of data security in cloud data storage, to guarantee the rightness of customers' data in cloud data storage. We proposed a Hierarchical Attribute-Based Secure Outsourcing for moldable Access in Cloud computing which likewise guarantees data storage security and survivability accordingly giving put stock in condition to the customers. To battle against unapproved data spillage, delicate data must be encoded before outsourcing in order to give end-to-end data confidentiality affirmation in the cloud and past. It upgrades the security in the proposed model successfully.

    Concurrency Lock Issues in Relational Cloud Computing

    Get PDF
    The widespread popularity of Cloud computing as a preferred platform for the deployment of web applications has resulted in an enormous number of applications moving to the cloud, and the huge success of cloud service providers. Due to the increasing number of web applications being hosted in the cloud, and the growing scale of data which these applications store, process, and serve – scalable data management systems form a critical part of cloud infrastructures. There are issues related to the database security while database is on cloud. The major challenging issues are multi-tenancy, scalability and the privacy. This paper focuses on the problems faced in the data security of Relational Cloud. The problems faced by various types of tenants and the type of access into the database makes a rework on the security of data, by analyzing proper locking strategies on the records accessed from the database. Data security in cloud computing addresses the type of access mode by the users (for analytical or transaction purpose) and the frequency of data access from the physical location (in shared or no-shared disk mode). Accordingly, the various data locking strategies are studied and appropriate locking mechanism will be implemented for real-time applications as in e-commerce. Keywords: Relational Cloud, Multi-tenant, two-phase locking, concurrency control, data management

    The Secured Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing

    Get PDF
    This paper is an endeavor to give an upgraded data storage security model in Cloud Computing and making a put stock in condition in cloud computing. There are a considerable measure of convincing purposes behind organizations to convey cloud-based storage. For another business, start-up costs are fundamentally decreased in light of the fact that there is no compelling reason to contribute capital in advance for an inner to help the business. By a long shot, the main inquiry customers considering a move to cloud storage ask is regardless of whether their data will be secure. Stored data offsite doesn't change ata security necessities; they are the same as those confronting data put away on location. Security ought to be based on business prerequisites for particular applications and data sets, regardless of where the data is stored. We trust that data storage security in Cloud Computing, a zone brimming with challenges and of fundamental significance, is still in its earliest stages now, and numerous examination issues are yet to be distinguished. In this paper, we examined the issue of data security in cloud data storage, to guarantee the rightness of customers' data in cloud data storage. We proposed a Hierarchical Attribute-Based Secure Outsourcing for moldable Access in Cloud computing which likewise guarantees data storage security and survivability accordingly giving put stock in condition to the customers. To battle against unapproved data spillage, delicate data must be encoded before outsourcing in order to give end-to-end data confidentiality affirmation in the cloud and past. It upgrades the security in the proposed model successfully

    Fog computing security: a review of current applications and security solutions

    Get PDF
    Fog computing is a new paradigm that extends the Cloud platform model by providing computing resources on the edges of a network. It can be described as a cloud-like platform having similar data, computation, storage and application services, but is fundamentally different in that it is decentralized. In addition, Fog systems are capable of processing large amounts of data locally, operate on-premise, are fully portable, and can be installed on heterogeneous hardware. These features make the Fog platform highly suitable for time and location-sensitive applications. For example, Internet of Things (IoT) devices are required to quickly process a large amount of data. This wide range of functionality driven applications intensifies many security issues regarding data, virtualization, segregation, network, malware and monitoring. This paper surveys existing literature on Fog computing applications to identify common security gaps. Similar technologies like Edge computing, Cloudlets and Micro-data centres have also been included to provide a holistic review process. The majority of Fog applications are motivated by the desire for functionality and end-user requirements, while the security aspects are often ignored or considered as an afterthought. This paper also determines the impact of those security issues and possible solutions, providing future security-relevant directions to those responsible for designing, developing, and maintaining Fog systems
    • …
    corecore