1,523 research outputs found

    Analysis of Cloud Storage Information Security and It’s Various Methods

    Get PDF
    Cloud computing is the latest paradigm in IT field promising trends. It provides the resources similar to accessibility of data, minimum cost and several other uses. But the major issue for cloud is the security of the information which is stored in the cloud. Various methods and specialized techniques are combined together for providing information security to data which is stored in cloud in this paper. The aim of this paper is to analyze various cryptographic techniques and to discuss about various security techniques over cloud and user authentication which is most helpful and useful in the information security over cloud. DOI: 10.17762/ijritcc2321-8169.15028

    Quality of service in cloud computing: Data model; resource allocation; and data availability and security

    Get PDF
    Philosophiae Doctor - PhDRecently, massive migration of enterprise applications to the cloud has been recorded in the Information Technology (IT) world. The number of cloud providers offering their services and the number of cloud customers interested in using such services is rapidly increasing. However, one of the challenges of cloud computing is Quality-of-Service management which denotes the level of performance, reliability, and availability offered by cloud service providers. Quality-of-Service is fundamental to cloud service providers who find the right tradeoff between Quality-of-Service levels and operational cost. In order to find out the optimal tradeoff, cloud service providers need to comply with service level agreements contracts which define an agreement between cloud service providers and cloud customers. Service level agreements are expressed in terms of quality of service (QoS) parameters such as availability, scalability performance and the service cost. On the other hand, if the cloud service provider violates the service level agreement contract, the cloud customer can file for damages and claims some penalties that can result in revenue losses, and probably detriment to the provider’s reputation. Thus, the goal of any cloud service provider is to meet the Service level agreements, while reducing the total cost of offering its services

    Trusted Energy-Efficient Cloud-based Services Brokerage Platform

    Get PDF
    The use of cloud computing can increase service efficiency and service level agreements for cloud users, by linking them to an appropriate cloud service provider, using the cloud services brokerage paradigm. Cloud service brokerage represents a promising new layer which is to be added to the cloud computing network, which manages the use, performance and delivery of cloud services, and negotiates relationships between cloud service providers and cloud service consumers. The work presented in this paper studies the research related to cloud service brokerage systems along with the weaknesses and vulnerabilities associated with each of these systems, with a particular focus on the multicloud-based services environment. In addition, the paper will conclude with a proposed multi-cloud framework that overcomes the weaknesses of other listed cloud brokers. The new framework aims to find the appropriate data centre in terms of energy efficiency, QoS and SLA. Moreover, it presents a security model aims to protect the proposed multicloud framework and highlights the key features that must be available in multi-cloud-based brokerage systems

    Fog computing security and privacy issues, open challenges, and blockchain solution: An overview

    Get PDF
    Due to the expansion growth of the IoT devices, Fog computing was proposed to enhance the low latency IoT applications and meet the distribution nature of these devices. However, Fog computing was criticized for several privacy and security vulnerabilities. This paper aims to identify and discuss the security challenges for Fog computing. It also discusses blockchain technology as a complementary mechanism associated with Fog computing to mitigate the impact of these issues. The findings of this paper reveal that blockchain can meet the privacy and security requirements of fog computing; however, there are several limitations of blockchain that should be further investigated in the context of Fog computing

    Investigating Cloud Access Security Broker In A Healthcare Service : Creating A Cloud Access Security Broker (CASB) Discussion Frame-work For Evaluating Security in Cloud Healthcare Services

    Get PDF
    Master's thesis in Cyber security (IKT523)Covid-19 accentuated the importance of accessible services, causing a major increase in the adoption of cloud services for enterprises. Cloud computing is a new paradigm that promises significant benefits for organizations in healthcare services. However, cloud computing also transforms enterprise architectures and introduces new problems of information security. Decision-makers in a large healthcare service provider need to justify decisions on cloud adoption, but such a task is convoluted given the different views on cloud computing and the potential impact of cyberthreats on critical infrastructures. As a consequence, cloud security controls need to be selected and implemented to complement cloud services. Our research focuses on the decision-making process for selecting a Cloud Access Security Broker (CASB) in a large public healthcare ICT provider in Norway. This thesis applies Action Design Research (ADR) to design a decision support tool for cloud security control selection in healthcare organizations. The result is a framework for evaluating cloud security controls that facilitates the decision-making process by considering multiple aspects of enterprise security architectures. Participants in the decision-making process can achieve a common understanding of cloud security control and a tailored assessment of how the cloud will impact information security in the organization. We present the design process and apply the framework to the CASB selection problem. As a practical implication, our findings suggest that selecting a cloud security control in a healthcare service provider is an ill-structured or “wicked” problem that requires a unique problem-solving approac

    Next Generation Cloud Computing: New Trends and Research Directions

    Get PDF
    The landscape of cloud computing has significantly changed over the last decade. Not only have more providers and service offerings crowded the space, but also cloud infrastructure that was traditionally limited to single provider data centers is now evolving. In this paper, we firstly discuss the changing cloud infrastructure and consider the use of infrastructure from multiple providers and the benefit of decentralising computing away from data centers. These trends have resulted in the need for a variety of new computing architectures that will be offered by future cloud infrastructure. These architectures are anticipated to impact areas, such as connecting people and devices, data-intensive computing, the service space and self-learning systems. Finally, we lay out a roadmap of challenges that will need to be addressed for realising the potential of next generation cloud systems.Comment: Accepted to Future Generation Computer Systems, 07 September 201

    Some Cyber Security Topics: Review Study

    Get PDF
    Cyber security is the practice of protecting systems, networks, and programs from digital attacks. These cyber-attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Cloud computing has emerged from the legacy data centres. Consequently, threats applicable in legacy system are equally applicable to cloud computing along with emerging new threats that plague only the cloud systems. Traditionally the data centres were hosted on-premises. Hence, control over the data was comparatively easier than handling a cloud system which is borderless and ubiquitous. Threats due to multi-tenancy, access from anywhere, control of cloud, etc. are some examples of why cloud security becomes important. Considering the significance of cloud security, this work is an attempt to understand the existing cloud service and deployment models, and the major threat factors to cloud security that may be critical in cloud environment

    A Socio-Technical Analysis of Challenges in Managing Multi-Clouds

    Get PDF
    Today’s cloud market consists of numerous providers competing and offering new services and features on an almost daily basis. From an organization\u27s perspective, it can therefore be beneficial to consider multiple providers in their cloud strategy to exploit possibilities for differentiation and specialization, ensure service availability, or realize cost savings. However, the resulting multi-cloud environment becomes highly complex and difficult to manage, which leads organizations to hold back from an implementation. Specifically, there is no common ground on what challenges organizations need to address when managing a multi-cloud environment. In this study, we derive a taxonomy of multi-cloud management challenges deductively through a structured literature review and inductively through an analysis of common multi-cloud broker and expert knowledge. Our taxonomy provides organizations with a holistic overview of challenges in managing multi-clouds and is intended to help initiate new interdisciplinary research in the scientific community
    • …
    corecore