93 research outputs found

    Multitenancy - Security Risks and Countermeasures

    Get PDF
    Security within the cloud is of paramount importance as the interest and indeed utilization of cloud computing increase. Multitenancy in particular introduces unique security risks to cloud computing as a result of more than one tenant utilizing the same physical computer hardware and sharing the same software and data. The purpose of this paper is to explore the specific risks in cloud computing due to Multitenancy and the measures that can be taken to mitigate those risks.Security within the cloud is of paramount importance as the interest and indeed utilization of cloud computing increase. Multitenancy in particular introduces unique security risks to cloud computing as a result of more than one tenant utilizing the same physical computer hardware and sharing the same software and data. The purpose of this paper is to explore the specific risks in cloud computing due to Multitenancy and the measures that can be taken to mitigate those risks

    Securing multi-tenancy systems through multi DB instances and multiple databases on different physical servers

    Get PDF
    Use of the same application by multiple users through internet as a service is supported by cloud computing system. Both the user and attacker stay in the same machine as both of them are users of the same application creating an in-secure environment. Service must ensure secrecy both at the application and data layer level. Data isolation and Application isolation are two basic aspects that must be ensured to cater for security as desired by the clients that accesses the service. In this paper a more secured mechanism has been presented that help ensuring data isolation and security when Multi-tenancy of the users to the same service has been implemented

    AN ANALYSIS OF CLOUD COMPUTING MULTITENANCY SECURITY CHALLENGES.

    Full text link

    Contributing factors of cloud computing adoption: a technology-organisation-environment framework approach

    Get PDF
    Cloud computing as an emerging high technology has been recognised by organisations and individuals for a wide range of potential applications. Since the concept's first appearance in 2007, the authors found a dominant amount of studies in the non-technological domains, including attempts to define and categorise cloud computing and the challenges and issues of the technology's adoption. Nonetheless, few researches are dedicated to determine the drivers of adopting cloud computing thus the literature is limited on this topic. As more adopters are becoming familiar with the technology and implementing cloud computing in their daily work, understanding what drives their adoption decision is essential to create opportunities for future cloud technologies to be tailored and aligned with the consumer's needs thus promotes exploitations of the technology's promising applications. This research takes a quantitative approach by developing and validating a theory-based conceptual model. Among the theories that are commonly applied in Information Systems research, the authors found Technology-Organisation-Environment framework can encapsulate the adoption's factors into one big picture. The authors conducted a secondary data analysis on the recent large-scale survey of IBM to investigate the drivers and barriers of cloud computing adoption. Structural Equation Modelling and Partial Least Square statistical methodologies provide rigid scientific procedures to validate the conceptual model. This study contributes a statistically validated conceptual model of the drivers and barriers of cloud computing adoption

    An Efficient Cloud Scheduling Algorithm for the Conservation of Energy through Broadcasting

    Get PDF
    Method of broadcasting is the well known operation that is used for providing support to different computing protocols in cloud computing. Attaining energy efficiency is one of the prominent challenges, that is quite significant in the scheduling process that is used in cloud computing as, there are fixed limits that have to be met by the system. In this research paper, we are particularly focusing on the cloud server maintenance and scheduling process and to do so, we are using the interactive broadcasting energy efficient computing technique along with the cloud computing server. Additionally, the remote host machines used for cloud services are dissipating more power and with that they are consuming more and more energy. The effect of the power consumption is one of the main factors for determining the cost of the computing resources. With the idea of using the avoidance technology for assigning the data center resources that dynamically depend on the application demands and supports the cloud computing with the optimization of the servers in use

    Modelling and Simulation Challenges in Internet of Things

    Get PDF
    With the rise of Internet of Things (IoT) technology, it is anticipated that large-scale sensor-based systems will permeate society, calling for novel methodologies to design, test, and operate these systems. IoT relies on networked, interconnected physical devices that often feature computational capabilities. The sheer number of these interconnected devices plays a key role in the IoT revolution. For example, Gartner research predicts that IoT will connect up to 50 to 100 billion devices by 2020. It is estimated that IoT will generate ~1.7 trillion US dollars by this time, with an approximate growth rate of 20% year over year

    Exploring security issues in cloud computing

    Get PDF
    Cloud computing has promised to transform the ways in which we use and interact with information technology (IT). The claims of significant benefits for businesses by using cloud systems are being overshadowed with the increased concerns about security, particularly privacy. This paper explores the unresolved concerns that businesses and users are still facing in terms of ensuring their data remains secure within a cloud environment. Through illustrating these issues with recent security breaches, the evidence clearly suggests they are hindering cloud adoption. Unless more focus is placed on security then cloud platforms are unable achieve cost saving benefits, improved efficiency or performance for a business. This paper argues that rather than cloud computing reaching its potential there are still remaining issues that must be addressed
    • …
    corecore