117 research outputs found

    What is Hidden Within the Cloud?

    No full text
    Over the past few years cloud computing has become one of the most significant technological trends. The aim of this paper is to discuss the main characteristics of cloud computing, identify the challenges concerning the security and control of information within the cloud and finally to examine how secure information can be in it. Section one gives an overview of the technology by presenting its key aspects and architecture. The security issues about its adoption are explored briefly in section two followed by possible ways to prevent these threats on section three. Finally, in section four the research focuses on the future of cloud computing and closes with an evaluation of how secure the cloud is on section five

    What is Hidden Within the Cloud?

    Get PDF

    Cloud Based Security

    Get PDF
    As we all know that internet is progressing in the terms of social networking website and the site which highly interact with the user also the use spent more time on this kind of website. Also user share their personal information, some important data, photos among various people that may belong their group or community so the security for all this things is mandatory but most of the time the site doesnt give proper attention toward this security requirement by which the user information may leak by unauthorized person. so in this paper we are trying to secure the informa tion of users using different compression and encryption algorithm and the address of information from users. This data is stored at various places on internet which is scattered on worldwide . So when any authorized person is trying to access his data that person only get all the information about his data but still he will never know the location of that data. The system we developed in thi s paper allows the user to upload all his data in any format including the security feature like compression and encry ption. This all uploaded data and information can be access from anywhere in the world. So finally we can say that we developed the very secure system to store the important info rmation on website in a very effective & secured manner

    Multi Round Selective Encryption using AES over Storage Cloud

    Get PDF
    Cloud computing is the re-incarnation of the client-server architecture. It is highly promising technology because of its unlimited resource provisioning and data storage services which help us in managing the data as per requirements. Due to the use of internet and vital remote servers to maintain the data and applications, the cloud computing environment becomes open for the attackers to attack on the user data and communication services. This paper mainly focuses on the user authentication and data security over the Broker Cloud Computing Paradigm by purposing new cryptographic technique named as Multi Round Selective Encryption using AES. Along with this, we compared our approach with existing cryptographic techniques as AES, Blowfish and Selective encryption to find out its pros and cons. The Multi Round Selective Encryption with AES is the best suitable technique where the file size is large because it gives fast execution by maintaining the encryption complexity as compared to selective encryption technique in public and hybrid cloud

    Cloud Migration: A Case Study of Migrating an Enterprise IT System to IaaS

    Full text link
    This case study illustrates the potential benefits and risks associated with the migration of an IT system in the oil & gas industry from an in-house data center to Amazon EC2 from a broad variety of stakeholder perspectives across the enterprise, thus transcending the typical, yet narrow, financial and technical analysis offered by providers. Our results show that the system infrastructure in the case study would have cost 37% less over 5 years on EC2, and using cloud computing could have potentially eliminated 21% of the support calls for this system. These findings seem significant enough to call for a migration of the system to the cloud but our stakeholder impact analysis revealed that there are significant risks associated with this. Whilst the benefits of using the cloud are attractive, we argue that it is important that enterprise decision-makers consider the overall organizational implications of the changes brought about with cloud computing to avoid implementing local optimizations at the cost of organization-wide performance.Comment: Submitted to IEEE CLOUD 201
    • …
    corecore