9,047 research outputs found

    A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over the Internet. The major motivation behind the cloud setup is economic benefits, because it assures the reduction in expenditure for operational and infrastructural purposes. To transform it into a reality there are some impediments and hurdles which are required to be tackled, most profound of which are security, privacy and reliability issues. As the user data is revealed to the cloud, it departs the protection-sphere of the data owner. However, this brings partly new security and privacy concerns. This work focuses on these issues related to various cloud services and deployment models by spotlighting their major challenges. While the classical cryptography is an ancient discipline, modern cryptography, which has been mostly developed in the last few decades, is the subject of study which needs to be implemented so as to ensure strong security and privacy mechanisms in today’s real-world scenarios. The technological solutions, short and long term research goals of the cloud security will be described and addressed using various classical cryptographic mechanisms as well as modern ones. This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view

    Investigating IoT Middleware Platforms for Smart Application Development

    Full text link
    With the growing number of Internet of Things (IoT) devices, the data generated through these devices is also increasing. By 2030, it is been predicted that the number of IoT devices will exceed the number of human beings on earth. This gives rise to the requirement of middleware platform that can manage IoT devices, intelligently store and process gigantic data generated for building smart applications such as Smart Cities, Smart Healthcare, Smart Industry, and others. At present, market is overwhelming with the number of IoT middleware platforms with specific features. This raises one of the most serious and least discussed challenge for application developer to choose suitable platform for their application development. Across the literature, very little attempt is done in classifying or comparing IoT middleware platforms for the applications. This paper categorizes IoT platforms into four categories namely-publicly traded, open source, developer friendly and end-to-end connectivity. Some of the popular middleware platforms in each category are investigated based on general IoT architecture. Comparison of IoT middleware platforms in each category, based on basic, sensing, communication and application development features is presented. This study can be useful for IoT application developers to select the most appropriate platform according to their application requirement

    An extensive research survey on data integrity and deduplication towards privacy in cloud storage

    Get PDF
    Owing to the highly distributed nature of the cloud storage system, it is one of the challenging tasks to incorporate a higher degree of security towards the vulnerable data. Apart from various security concerns, data privacy is still one of the unsolved problems in this regards. The prime reason is that existing approaches of data privacy doesn't offer data integrity and secure data deduplication process at the same time, which is highly essential to ensure a higher degree of resistance against all form of dynamic threats over cloud and internet systems. Therefore, data integrity, as well as data deduplication is such associated phenomena which influence data privacy. Therefore, this manuscript discusses the explicit research contribution toward data integrity, data privacy, and data deduplication. The manuscript also contributes towards highlighting the potential open research issues followed by a discussion of the possible future direction of work towards addressing the existing problems
    • …
    corecore