40,834 research outputs found

    A Study On Secure Data Storage In Public Clouds

    Get PDF
    This paper focuses on the study of various existing cloud storage mechanisms with their related security frameworks for realizing the efficient cloud storage in a secured environment. The key feature for the growing popularity of cloud computing relies on the efficient management of stored data in a highly secure way for remote accessing. Ensuring the integrity and availability of user’s data stored in the cloud has always been an important aspect for its quality of service. While storing data in cloud, lots of issues with respect to security are being cropping out as clients have no direct physical control over their outsourced data. In addition, their vulnerabilities to external threats are increasing as cloud provides storage and accessing services via world-wide domain networking. This study will help in identifying different performance measures for secure available of data in cloud storage mechanisms

    ASIDSDCCE - A Survey on to Improve Data Security and Data Confidentiality in Cloud Computing Environment

    Get PDF
    Cloud computing refers delivery of computing services such as servers, storage, databases, networking, software, analytics and so on. The several organizations providing these computing services are called cloud providers and typically charge for cloud computing services based on usage. The National Institute of Standards and Technology defines cloud computing by five essential characteristics, three service models, and four deployment models. The essential characteristics are on-demand self-service location-independent resource pooling, broad network access, rapid resource elasticity, and measured service. The main three service models are software as service, platform as a service, and infrastructure as a service. The aim of this survey is to improve the data security and data confidentiality through rectifying the problem in cloud computing environment

    Review and analysis of networking challenges in cloud computing

    Get PDF
    Cloud Computing offers virtualized computing, storage, and networking resources, over the Internet, to organizations and individual users in a completely dynamic way. These cloud resources are cheaper, easier to manage, and more elastic than sets of local, physical, ones. This encourages customers to outsource their applications and services to the cloud. The migration of both data and applications outside the administrative domain of customers into a shared environment imposes transversal, functional problems across distinct platforms and technologies. This article provides a contemporary discussion of the most relevant functional problems associated with the current evolution of Cloud Computing, mainly from the network perspective. The paper also gives a concise description of Cloud Computing concepts and technologies. It starts with a brief history about cloud computing, tracing its roots. Then, architectural models of cloud services are described, and the most relevant products for Cloud Computing are briefly discussed along with a comprehensive literature review. The paper highlights and analyzes the most pertinent and practical network issues of relevance to the provision of high-assurance cloud services through the Internet, including security. Finally, trends and future research directions are also presented

    Enhancing Data Security for Cloud Computing Applications through Distributed Blockchain-based SDN Architecture in IoT Networks

    Full text link
    Blockchain (BC) and Software Defined Networking (SDN) are some of the most prominent emerging technologies in recent research. These technologies provide security, integrity, as well as confidentiality in their respective applications. Cloud computing has also been a popular comprehensive technology for several years. Confidential information is often shared with the cloud infrastructure to give customers access to remote resources, such as computation and storage operations. However, cloud computing also presents substantial security threats, issues, and challenges. Therefore, to overcome these difficulties, we propose integrating Blockchain and SDN in the cloud computing platform. In this research, we introduce the architecture to better secure clouds. Moreover, we leverage a distributed Blockchain approach to convey security, confidentiality, privacy, integrity, adaptability, and scalability in the proposed architecture. BC provides a distributed or decentralized and efficient environment for users. Also, we present an SDN approach to improving the reliability, stability, and load balancing capabilities of the cloud infrastructure. Finally, we provide an experimental evaluation of the performance of our SDN and BC-based implementation using different parameters, also monitoring some attacks in the system and proving its efficacy.Comment: 12 Pages 16 Figures 3 Table

    A Comprehensive Survey on the Cooperation of Fog Computing Paradigm-Based IoT Applications: Layered Architecture, Real-Time Security Issues, and Solutions

    Get PDF
    The Internet of Things (IoT) can enable seamless communication between millions of billions of objects. As IoT applications continue to grow, they face several challenges, including high latency, limited processing and storage capacity, and network failures. To address these stated challenges, the fog computing paradigm has been introduced, purpose is to integrate the cloud computing paradigm with IoT to bring the cloud resources closer to the IoT devices. Thus, it extends the computing, storage, and networking facilities toward the edge of the network. However, data processing and storage occur at the IoT devices themselves in the fog-based IoT network, eliminating the need to transmit the data to the cloud. Further, it also provides a faster response as compared to the cloud. Unfortunately, the characteristics of fog-based IoT networks arise traditional real-time security challenges, which may increase severe concern to the end-users. However, this paper aims to focus on fog-based IoT communication, targeting real-time security challenges. In this paper, we examine the layered architecture of fog-based IoT networks along working of IoT applications operating within the context of the fog computing paradigm. Moreover, we highlight real-time security challenges and explore several existing solutions proposed to tackle these challenges. In the end, we investigate the research challenges that need to be addressed and explore potential future research directions that should be followed by the research community.©2023 The Authors. Published by IEEE. This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/fi=vertaisarvioitu|en=peerReviewed

    Smart Detection of Cardiovascular Disease Using Gradient Descent Optimization

    Get PDF
    The Internet of Medical Things (IoMT) is the networking of health things or equipment that communicate data over the internet without the need for human involvement in the healthcare field. A large quantity of data is collected from numerous sensors in the health field, and it is all transferred and stored on the cloud. This data is growing bigger here all time, and it's becoming increasingly challenging to secure it on the cloud with real-time storage and computing. Data security problem can be addressed with the aid of machine algorithms and fog computing. For data security in IoMT gadgets correspondence in an intelligent fashion, an intelligent encryption algorithm (IEA) is proposed using blockchain technology in cloud based system framework (CBSF). It is applied on patient’s database to provide immutable security, tampering prevention and transaction transparency at the fog layer in IoMT.  The suggested expert system's results indicate that it is suitable for use in for the security. In the fog model, the blockchain technology approach also helps to address latency, centralization, and scalability difficulties

    D1.3 - SUPERCLOUD Architecture Implementation

    Get PDF
    In this document we describe the implementation of the SUPERCLOUD architecture. The architecture provides an abstraction layer on top of which SUPERCLOUD users can realize SUPERCLOUD services encompassing secure computation workloads, secure and privacy-preserving resilient data storage and secure networking resources spanning across different cloud service providers' computation, data storage and network resources. The components of the SUPERCLOUD architecture implementation are described. Integration between the different layers of the architecture (computing security, data protection, network security) and with the facilities for security self-management is also highlighted. Finally, we provide download and installation instructions for the released software components that can be downloaded from our common SUPERCLOUD code repository

    Data Communications and Network Technologies

    Get PDF
    This open access book is written according to the examination outline for Huawei HCIA-Routing Switching V2.5 certification, aiming to help readers master the basics of network communications and use Huawei network devices to set up enterprise LANs and WANs, wired networks, and wireless networks, ensure network security for enterprises, and grasp cutting-edge computer network technologies. The content of this book includes: network communication fundamentals, TCP/IP protocol, Huawei VRP operating system, IP addresses and subnetting, static and dynamic routing, Ethernet networking technology, ACL and AAA, network address translation, DHCP server, WLAN, IPv6, WAN PPP and PPPoE protocol, typical networking architecture and design cases of campus networks, SNMP protocol used by network management, operation and maintenance, network time protocol NTP, SND and NFV, programming, and automation. As the world’s leading provider of ICT (information and communication technology) infrastructure and smart terminals, Huawei’s products range from digital data communication, cyber security, wireless technology, data storage, cloud-computing, and smart computing to artificial intelligence

    The Intersection of Cloud Computing and Smart Cities: An Exploratory Review of Applications and Challenges in Deployment

    Get PDF
    This research addressed the intersection of cloud computing and smart cities. Cloud computing and smart cities are two areas that are seeing fast expansion and have the potential to transform the manner in which we work and live. Cloud computing facilitates the supply of on-demand computing resources, including storage, networking, and software, via the internet; and smart cities use technology to improve the quality of life for inhabitants and the efficiency of municipal services. According to the findings of the research, cloud computing has the potential to be used in diverse applications within smart cities. Some examples of these applications include smart transportation, smart lighting, smart buildings, smart waste management, smart healthcare, smart parking, and smart citizen services. This study also drew attention to a number of obstacles that need to be overcome before cloud computing may be properly implemented. Concerns around data security and privacy, network and connection, interoperability, dependency on internet access, cost and scalability, and the need for successful cooperation between municipal authorities, technology suppliers, and residents are examples of these problems. The findings of the research indicate that the potential for cloud computing to significantly improve the capabilities of smart cities should not be underestimated, despite the fact that there are considerable obstacles to be addressed. It will be vital for municipal authorities, technology providers, and residents to collaborate to overcome the problems and establish successful methods for adopting cloud computing in smart cities if this promise is going to be realized
    • …
    corecore