121 research outputs found
Data Security and Privacy in the Cloud
Relying on the cloud for storing data and performing computations has become a popular solution in today\u2019s society, which demands large data collections and/or analysis over them to be readily available, for example, to make knowledge-based decisions. While bringing undeniable benefits to both data owners and end users accessing the outsourced data, moving to the cloud raises a number of issues, ranging from choosing the most suitable cloud provider for outsourcing to effectively protecting data and computation results. In this paper, we discuss the main issues related to data protection arising when data and/or computations over them are moved to the cloud. We also illustrate possible solutions and approaches for addressing such issues
ENHANCING SECURITY AND PRIVACY IN THE CLOUD COMPUTING
ABSTRACT Cloud computing is current buzzword in the market. Security to this Service is an important issue. PKI (Public key Infrastructure), as a Service and its focus is to evaluate the possibility to deploy a Public Key Infrastructure as a Cloud service. This is interesting since more and more organizations are moving their services and infrastructure to the cloud to benefit from the possibilities and advantages of cloud services and avoid problems with having own infrastructures. It is also interesting since the cloud could utilize the distributed architecture of PKI and in this way increase the reliability and availability and decrease the response times for validation of certificates
Recommended from our members
A survey on security issues and solutions at different layers of Cloud computing
Cloud computing offers scalable on-demand services to consumers with greater flexibility and lesser infrastructure investment. Since Cloud services are delivered using classical network protocols and formats over the Internet, implicit vulnerabilities existing in these protocols as well as threats introduced by newer architectures raise many security and privacy concerns. In this paper, we survey the factors affecting Cloud computing adoption, vulnerabilities and attacks, and identify relevant solution directives to strengthen security and privacy in the Cloud environment
Information Security and Privacy in the Cloud of Healthcare Sector, and The Use of Miter Att&ck Framework to Keep the Healthcare Secure
With healthcare moving to the cloud, it is necessary to be concerned about the rising cyber-threats. The healthcare industry is one of the most targeted industries by cyber-criminals. This can be attributed to the weak security measures employed and the vast amounts of valuable data that the healthcare industry holds. To ensure that the healthcare industry is secure, this paper proposes the use of the MITRE ATT&CK framework. The MITRE ATT&CK framework presents the best possible way of staying ahead of the threat landscape by helping cyber-security experts understand adversaries\u27 thought processes. By understanding how attackers think and the techniques that they use to gain unauthorized access to IT systems, the healthcare industry can use this information to improve its security architecture. To collect data needed for the study, the qualitative research design will be utilized. Data will be gathered from multiple sources, and the information synthesized to understand how the healthcare industry can improve its security through the application of the MITRE ATT&CK framework
Recommended from our members
Trust Model for Optimized Cloud Services
Cloud computing with its inherent advantages draws attention for business critical applications, but concurrently expects high level of trust in cloud service providers. Reputation-based trust is emerging as a good choice to model trust of cloud service providers based on available evidence. Many existing reputation based systems either ignore or give less importance to uncertainty linked with the evidence. In this paper, we propose an uncertainty model and define our approach to compute opinion for cloud service providers. Using subjective logic operators along with the computed opinion values, we propose mechanisms to calculate the reputation of cloud service providers. We evaluate and compare our proposed model with existing reputation models
The Interplay of IT Governance Mechanisms, Value and Performance: The Case of Cloud Computing Investment
Background: Digital acceleration coupled with unprecedented work disruption (e.g., a Pandemic) have amplified the need for mature IT governance practices to generate planned value from organizations\u27 digital investments. Although the pairwise relationship between mature governance practices, value derived from IT investments, and organizational performance have been examined previously, all three have rarely been simultaneously investigated. Therefore, this paper examines the role of value in the relationship between IT governance mechanisms and organizational performance.
Method: A research model that comprehensively conceptualizes the governance mechanism construct is developed and validated. The model is examined using data collected from 250 United States organizations that have invested in cloud computing for over a year.
Results: The results reveal that the value generated from an IT investment is germane to understanding the relationship between governance mechanisms and organizational performance. Specifically, the result explains that governance mechanisms help improve organizational performance through cost reduction in IT services, create agility through flexibility in technology service, strengthen IT security and privacy, and effectively redirect IT resources. The results show the more critical role of the relational mechanism and practices related to IT security and privacy in the cloud computing context.
Conclusion: The study contributes to IS literature by providing a more unified conceptualization of governance mechanisms and theoretically establishing the importance of governance in effectively governing cloud computing. By providing a guideline to help organizations achieve more value from cloud computing, the study provides implications for practice. The findings empirically show the relational mechanism has the most critical role in creating value from cloud computing. The governance practices help bridge the gap between business and IT, gradual transformative change in the roles and responsibilities, control cloud expenses, security and privacy risks. The findings show that competency is more likely to be achieved from cloud computing investment
Modern Methods in the Development of Education Using Cloud Computing Applications
The world is a big scientific and technological revolution, have had an impact on all aspects of life, he became Education demanding to search for new methods of teaching and models to meet the many challenges at the global level, including the increased demand for education with a reduction in the number of educational institutions, and increase the quantum informational in all branches of knowledge , appeared E-Learning to help the learner to learn at the place where he wants while preferences without the obligation to come to the classroom at specific times, Became the methodology and ways of educational and search for information and easily obtained and the acquisition of new knowledge through cloud computing applications
- …