89,028 research outputs found

    A systematic literature review of cloud computing in eHealth

    Full text link
    Cloud computing in eHealth is an emerging area for only few years. There needs to identify the state of the art and pinpoint challenges and possible directions for researchers and applications developers. Based on this need, we have conducted a systematic review of cloud computing in eHealth. We searched ACM Digital Library, IEEE Xplore, Inspec, ISI Web of Science and Springer as well as relevant open-access journals for relevant articles. A total of 237 studies were first searched, of which 44 papers met the Include Criteria. The studies identified three types of studied areas about cloud computing in eHealth, namely (1) cloud-based eHealth framework design (n=13); (2) applications of cloud computing (n=17); and (3) security or privacy control mechanisms of healthcare data in the cloud (n=14). Most of the studies in the review were about designs and concept-proof. Only very few studies have evaluated their research in the real world, which may indicate that the application of cloud computing in eHealth is still very immature. However, our presented review could pinpoint that a hybrid cloud platform with mixed access control and security protection mechanisms will be a main research area for developing citizen centred home-based healthcare applications

    Emerging Trends in Safety Issues in Cloud - The Potentials of Threat Model

    Get PDF
    For tomorrow�s computing, Cloud computing has designed the unrealistic and infrastructural basis. The complete computing infrastructure is quickly affecting cloud based architecture. Via Internet, the resources and services of cloud computing are offered and also these services and resources are offered from data centers located globally. By providing resources that are virtual through the internet, cloud computing controls its consumers. With a continuous matter for Open Systems and internet, Security has always concerned. It really suffers whenever we are discussing about security on cloud. The lack of safety is the only hindrance in general implementation of cloud computing. The flexibility and benefits, if security is not robust and consistent, that cloud computing has to offer, will have slight rationality. There are many security problems that are enclosed in cloud computing such as security of data, and investigation of the utilization by the cloud computing merchants. For the consumers and service providers, the prosperous in cloud computing includes lots of security challenges. The objective of this paper is to recognize the most insecure threats of security in cloud computing which will further enables both end users and retailers to know about the key security threats that are linked with cloud computing. It also includes finding of advantages and problems in cloud computing with respect to availability of data, its cost and security of data

    AN EFFICIENT APPROACH TO IMPLEMENT FEDERATED CLOUDS

    Get PDF
    Cloud computing is one of the trending technologies that provide boundless virtualized resources to the internet users as an important services through the internet, while providing the privacy and security. By using these cloud services, internet users get many parallel computing resources at low cost. It predicted that till 2016, revenues from the online business management spent $4 billion for data storage. Cloud is an open source platform structure, so it is having more chances to malicious attacks. Privacy, confidentiality, and security of stored data are primary security challenges in cloud computing. In cloud computing, ‘virtualization' is one of the techniques dividing memory into different blocks. In most of the existing systems there is only single authority in the system to provide the encrypted keys. To fill the few security issues, this paper proposed a novel authenticated trust security model for secure virtualization system to encrypt the files. The proposed security model achieves the following functions: 1) allotting the VSM(VM Security Monitor) model for each virtual machine; 2) providing secret keys to encrypt and decrypt information by symmetric encryption.The contribution is a proposed architecture that provides a workable security that a cloud service provider can offer to its consumers. Detailed analysis and architecture design presented to elaborate security model

    AN AUTHENTICATED, SECURE VIRTUALIZATION MANAGEMENT SYSTEM IN CLOUD COMPUTING

    Get PDF
    Cloud computing is one of the trending technologies that provide boundless virtualized resources to the internet users as an important services through the internet while providing the privacy and security. Using these cloud services, internet users get many parallel computing resources at low cost. It predicted that till 2016, revenues from the online business management spent $4 billion for data storage. Cloud is an open-source platform structure, so it is having more chances to malicious attacks. Privacy, confidentiality, and security of stored data are primary security challenges in cloud computing. In cloud computing, virtualization†is one of the techniques dividing memory into different blocks. In most of the existing systems, there is only single authority in the system to provide the encrypted keys. To fill the few security issues, this paper proposed a novel authenticated trust security model for secure virtualization system to encrypt the files. The proposed security model achieves the following functions: (1) allotting the VM security monitor model for each virtual machine and (2) providing secret keys to encrypt and decrypt information by symmetric encryption.The contribution is a proposed architecture that provides a workable security that a cloud service provider can offer to its consumers. Detailed analysis and architecture design presented to elaborate security model.Â

    Security and Privacy of Data In Multi Cloud with Data Backup and Data Recovery Service

    Get PDF
    Cloud computing is important in IT industry. Cloud service has a widespread acceptance but the fear pertaining to security and privacy of these services still continue to be an open challenge. While talking about cloud security there are many aspects which one needs to consider such as trusted authentication, authorization, data security. There are different algorithms for data encryption like RSA, AES, DES, RC4, 3DES etc. These algorithms are broadly classified as being symmetric or asymmetric in nature. While creating a secure cloud there are faced too many challenges like data protection, loss of data etc. Many security services which are certain by the secure cloud system. In that system hybrid cryptographic approach used which gives benefits of both symmetric and asymmetric encryption. That system is for single cloud and it was implemented on cloud sim framework. In cloud computing, data generated in electronic form are large in amount. To maintain this data efficiently, there is a necessity of data recovery services. This paper is about the reviews on data security and data backup/recovery in multi cloud

    Securing Infrastructure-as-a-Service Public Clouds Using Security Onion

    Get PDF
    The shift to Cloud computing has brought with it its specific security challenges concerning the loss of control, trust and multi-tenancy especially in Infrastructure-as-a-Service (IaaS) Cloud model. This article focuses on the design and development of an intrusion detection system (IDS) that can handle security challenges in IaaS Cloud model using an open source IDS. We have implemented a proof-of-concept prototype on the most deployed hypervisor—VMware ESXi—and performed various real-world cyber-attacks, such as port scanning and denial of service (DoS) attacks to validate the practicality and effectiveness of our proposed IDS architecture. Based on our experimental results we found that our Security Onion-based IDS can provide the required protection in a reasonable and effective manner

    Cloud Data Security using Elliptical Curve Cryptography

    Get PDF
    Internet today is seeing a touchy development because of expanded use. In any case, it is helpless against eavesdropping which represents a risk to privacy and security of the client. The security of data traffic winds up plainly vital since the communications over open network happen frequently. It is along these lines basic that the data traffic over the system is encrypted. Since the wireless and wired IP networks are defenseless against eavesdropping, cryptographic plans are produced to secure the information transmitted in a network. To give the quality of service, the cloud computing security is the essential part of the cloud service providers. Nonetheless, cloud computing postures numerous new security challenges which have not been all around researched. This research work concentrating on issues identifying with the cloud data storage strategies and security in virtual condition. We propose a technique for giving data storage and security in cloud utilizing Elliptical Curve Cryptography ECC. Encourage, depicts the security services incorporates generation of key, encryption and decryption in virtual condition
    • …
    corecore