398 research outputs found

    Infrastructure as a service: exploring network access control challenges

    Get PDF
    Cloud Computing Infrastructure as a Service (IaaS) is a great model for outsourcing IT infrastructure. It is built to offer fascinating features to support business development, such as elasticity, multi-tenancy, configurability and dynamicity. However, IaaS faces security challenges on account of its flexible nature. For this article, we studied the IaaS characteristics and investigated their related security challenges. We then elaborated these security challenges by exploring the security threats on live virtual machine migration as it is one of the main IaaS operations. We found that proper access control techniques and models are a critical element in enhancing IaaS and mitigating the identified security threats. Therefore, we investigated and contrasted the implemented and the proposed firewall architectures in IaaS as a firewall is a basic security appliance that enforces access control. We also explored and contrasted the proposed access control models in the IaaS. It was found that the traditional firewalls and access control models were not sufficient for IaaS. Therefore, there is a need to develop a proper access control model and enforcement techniques to mitigate IaaS security threats. Based on the security research trend and the results obtained in this articles exploration, we endorse an IaaS access control system built on a computational intelligent approach

    A Proposed Model of Digital Forensic on Cloud Computing Security Infrastructure

    Get PDF
    Over the past decades, practitioners and researchers have made remarkable achievements in digital forensic. The abilities to conquer major technical obstacles are bestowing practitioners greater access to digital evidence. Sophisticated forensic techniques and tools are being developed to assist forensic acquisition and extraction of volatile data, inspection of remote repositories system and analysis of network traffic. Computer forensic is a comprehensive work that based on several attributes that are : objectivity, relevance and legitimacy to compose a system model that projected to be an electronic evidence forensic system. Latest studies show that the rapid growing of cloud computing facilities usage that has enable various improvements as part of the innovation process at organisations. Information systems are in frequently exposed to various types of threats which able to trigger different types of bad consequences as more and more information stored, problems arise especially about security information technology risk aspects. Keywords—computer forensic, cloud computing, electronic evidence forensic system, security, information technology risk, information syste

    SECURITY CHALLENGES IN CLOUD COMPUTING

    Get PDF

    Peer to peer (P2P) and cloud computing on infrastructure as a service (IaaS) performance analysis

    Get PDF
    The resources of information technology and the availability of services on non-cloud network systems are limited. This constitutes problems for companies, especially in the efficient management of information technology. The high investment in infrastructure procurement is an obstacle in building centralized systems, including the adoption of cloud computing through Infrastructure as a Service (IaaS), as an elective solution. This research aims to analyze the performance of cloud servers on IaaS services using the parameters of cloud service availability, resource utilization, and throughput transfer which were implemented in companies engaged in the toll road concession sector. Furthermore, the results are expected to be a reference in supporting company decisions/policies related to cloud system adoption. The methodology involved the Network Development Life Cycle (NDLC), a system constituted by 6 (six) stages of management, namely user, proxy server, database, web service, monitoring service, and Remote Desktop Protocol (RDP). The results of cloud service availability indicate that the cloud system provides service availability (system interface, broad network access, and resource pooling). Furthermore, cloud systems have a significant performance on resource utilization (CPU) and throughput transfer parameters, while non-cloud systems only excel in response time and resource utilization (Memory) parameters. The overall result analysis based on this research scenario showed that the cloud system provides services according to user needs and has a better speed in data transmission, but has shortcomings in response time
    • …
    corecore