6 research outputs found

    An Efficient Method to Enhance Health Care Big Data Security in Cloud Computing Using the Combination of Euclidean Neural Network And K-Medoids Based Twin Fish Cipher Cryptographic Algorithm

    Get PDF
    Big data is a phrase that refers to the large volumes of digital data that are being generated as a consequence of technology improvements in the health care industry, e-commerce, and research, among other fields. It is impossible to analyze Big Data using typical analytic tools since traditional data storage systems do not have the capacity to deal with such a large volume of data. Cloud computing has made it more easier for people to store and process data remotely in recent years. By distributing large data sets over a network of cloudlets, cloud computing can address the challenges of managing, storing, and analyzing this new breed of data It's possible for private data to be leaked when it is kept in the cloud, as users have no control over it. This paper proposes a framework for a secure data storage by using the K-medoids-based twin fish cipher cryptographic algorithm. We first normalize the data using the Filter splash Z normalization and then apply the Euclidean neural network to compute similarity, which ensures data correctness and reduces computational cost. As a result, the suggested encryption strategy is used to encrypt and decode the outsourced data, thereby protecting private information from being exposed. The whole experiment was conducted using health data from a large metropolis from the Kaggle database. Using the recommended encryption method, users will be able to maintain their privacy while saving time and money by storing their large amounts of data on the cloud

    Authentication in mobile cloud computing by combining the tow factor Authentication and one time password token

    Get PDF
    The Cloud has become a popular business transaction platform nowadays. Unfortunately, this powerful and pervasive network somehow is overshadowed by the growing security threat emerging from the various attacks Authentication is One of the major security issues in mobile cloud computing. Combinig the Two-factor Authentication (2FA) technology with One-time Password (OTP), has emerged as a popular protection system. The 2FA system employs two user specific factors for authentication. It can significantly enhance the network security. We used a dynamic one time password as a second factor. These otp codes provide strong security and resist MITM-seed tracing and shoulder surfing attacks

    Trustworthy Cloud Computing

    Get PDF
    Trustworthy cloud computing has been a central tenet of the European Union cloud strategy for nearly a decade. This chapter discusses the origins of trustworthy computing and specifically how the goals of trustworthy computing—security and privacy, reliability, and business integrity—are represented in computer science research. We call for further inter- and multi-disciplinary research on trustworthy cloud computing that reflect a more holistic view of trust

    Reducing Technology Costs for Small Real Estate Businesses Using Cloud and Mobility

    Get PDF
    Increased client accessibility strategies, awareness of technology cost, and factors of third-party data security capabilities are elements small real estate business (SREB) owners need to know before adopting cloud and mobility technology. The purpose of this multiple case study was to explore the strategies SREB owners use to implement cloud and mobility products to reduce their technology costs. The target population consisted of 3 SREB owners who had experience implementing cloud and mobility products in their businesses in the state of Texas. The conceptual framework of this research study was the technology acceptance model theory. Semistructured interviews were conducted and the data analyzed for emergent themes. Member checking was subsequently employed to ensure the trustworthiness of the findings. Three important themes emerged: client accessibility strategies, product affordability, and transferability of information technology security risks. The findings revealed SREB owners used informal strategies based on the customer-centric necessity to implement cloud and mobility technology costs. The SREB owners\u27 highest strategic priority was the ability to access their clients, followed by cost reduction and securing client information. The findings may contribute to social change by providing possible insights to survivability for SREB owners through cost reduction, reduced security risks, and the increased ability to deliver the dream of home ownership to their clients while contributing to the economy and enhancing the community standards of living

    Data Privacy and Trust in Cloud Computing

    Get PDF
    This open access book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on data privacy and trust in the cloud. Cloud technology has fueled rapid, dramatic technological change, enabling a level of connectivity that has never been seen before in human history. However, this brave new world comes with problems. Several high-profile cases over the last few years have demonstrated cloud computing's uneasy relationship with data security and trust. This volume explores the numerous technological, process and regulatory solutions presented in academic literature as mechanisms for building trust in the cloud, including GDPR in Europe. The massive acceleration of digital adoption resulting from the COVID-19 pandemic is introducing new and significant security and privacy threats and concerns. Against this backdrop, this book provides a timely reference and organising framework for considering how we will assure privacy and build trust in such a hyper-connected digitally dependent world. This book presents a framework for assurance and accountability in the cloud and reviews the literature on trust, data privacy and protection, and ethics in cloud computing
    corecore