9,047 research outputs found
A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over the Internet. The major motivation behind the cloud setup is economic benefits, because it assures the reduction in expenditure for operational and infrastructural purposes. To transform it into a reality there are some impediments and hurdles which are required to be tackled, most profound of which are security, privacy and reliability issues. As the user data is revealed to the cloud, it departs the protection-sphere of the data owner. However, this brings partly new security and privacy concerns. This work focuses on these issues related to various cloud services and deployment models by spotlighting their major challenges. While the classical cryptography is an ancient discipline, modern cryptography, which has been mostly developed in the last few decades, is the subject of study which needs to be implemented so as to ensure strong security and privacy mechanisms in today’s real-world scenarios. The technological solutions, short and long term research goals of the cloud security will be described and addressed using various classical cryptographic mechanisms as well as modern ones. This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view
Investigating IoT Middleware Platforms for Smart Application Development
With the growing number of Internet of Things (IoT) devices, the data
generated through these devices is also increasing. By 2030, it is been
predicted that the number of IoT devices will exceed the number of human beings
on earth. This gives rise to the requirement of middleware platform that can
manage IoT devices, intelligently store and process gigantic data generated for
building smart applications such as Smart Cities, Smart Healthcare, Smart
Industry, and others. At present, market is overwhelming with the number of IoT
middleware platforms with specific features. This raises one of the most
serious and least discussed challenge for application developer to choose
suitable platform for their application development. Across the literature,
very little attempt is done in classifying or comparing IoT middleware
platforms for the applications. This paper categorizes IoT platforms into four
categories namely-publicly traded, open source, developer friendly and
end-to-end connectivity. Some of the popular middleware platforms in each
category are investigated based on general IoT architecture. Comparison of IoT
middleware platforms in each category, based on basic, sensing, communication
and application development features is presented. This study can be useful for
IoT application developers to select the most appropriate platform according to
their application requirement
An extensive research survey on data integrity and deduplication towards privacy in cloud storage
Owing to the highly distributed nature of the cloud storage system, it is one of the challenging tasks to incorporate a higher degree of security towards the vulnerable data. Apart from various security concerns, data privacy is still one of the unsolved problems in this regards. The prime reason is that existing approaches of data privacy doesn't offer data integrity and secure data deduplication process at the same time, which is highly essential to ensure a higher degree of resistance against all form of dynamic threats over cloud and internet systems. Therefore, data integrity, as well as data deduplication is such associated phenomena which influence data privacy. Therefore, this manuscript discusses the explicit research contribution toward data integrity, data privacy, and data deduplication. The manuscript also contributes towards highlighting the potential open research issues followed by a discussion of the possible future direction of work towards addressing the existing problems
- …