117 research outputs found
Recommended from our members
Certifying Services in Cloud: The Case for a Hybrid, Incremental and Multi-layer Approach
The use of clouds raises significant security concerns for the services they provide. Addressing these concerns requires novel models of cloud service certification based on multiple forms of evidence including testing and monitoring data, and trusted computing proofs. CUMULUS is a novel infrastructure for realising such certification models
What is Hidden Within the Cloud?
Over the past few years cloud computing has become one of the most significant technological trends. The aim of this paper is to discuss the main characteristics of cloud computing, identify the challenges concerning the security and control of information within the cloud and finally to examine how secure information can be in it. Section one gives an overview of the technology by presenting its key aspects and architecture. The security issues about its adoption are explored briefly in section two followed by possible ways to prevent these threats on section three. Finally, in section four the research focuses on the future of cloud computing and closes with an evaluation of how secure the cloud is on section five
Cloud Based Security
As we all know that internet is progressing in the terms of social networking website and the site which highly interact with the user also the use spent more time on this kind of website. Also user share their personal information, some important data, photos among various people that may belong their group or community so the security for all this things is mandatory but most of the time the site doesnt give proper attention toward this security requirement by which the user information may leak by unauthorized person. so in this paper we are trying to secure the informa tion of users using different compression and encryption algorithm and the address of information from users. This data is stored at various places on internet which is scattered on worldwide . So when any authorized person is trying to access his data that person only get all the information about his data but still he will never know the location of that data. The system we developed in thi s paper allows the user to upload all his data in any format including the security feature like compression and encry ption. This all uploaded data and information can be access from anywhere in the world. So finally we can say that we developed the very secure system to store the important info rmation on website in a very effective & secured manner
Multi Round Selective Encryption using AES over Storage Cloud
Cloud computing is the re-incarnation of the client-server architecture. It is highly promising technology because of its unlimited resource provisioning and data storage services which help us in managing the data as per requirements. Due to the use of internet and vital remote servers to maintain the data and applications, the cloud computing environment becomes open for the attackers to attack on the user data and communication services. This paper mainly focuses on the user authentication and data security over the Broker Cloud Computing Paradigm by purposing new cryptographic technique named as Multi Round Selective Encryption using AES. Along with this, we compared our approach with existing cryptographic techniques as AES, Blowfish and Selective encryption to find out its pros and cons. The Multi Round Selective Encryption with AES is the best suitable technique where the file size is large because it gives fast execution by maintaining the encryption complexity as compared to selective encryption technique in public and hybrid cloud
Cloud Migration: A Case Study of Migrating an Enterprise IT System to IaaS
This case study illustrates the potential benefits and risks associated with
the migration of an IT system in the oil & gas industry from an in-house data
center to Amazon EC2 from a broad variety of stakeholder perspectives across
the enterprise, thus transcending the typical, yet narrow, financial and
technical analysis offered by providers. Our results show that the system
infrastructure in the case study would have cost 37% less over 5 years on EC2,
and using cloud computing could have potentially eliminated 21% of the support
calls for this system. These findings seem significant enough to call for a
migration of the system to the cloud but our stakeholder impact analysis
revealed that there are significant risks associated with this. Whilst the
benefits of using the cloud are attractive, we argue that it is important that
enterprise decision-makers consider the overall organizational implications of
the changes brought about with cloud computing to avoid implementing local
optimizations at the cost of organization-wide performance.Comment: Submitted to IEEE CLOUD 201
- …