2 research outputs found

    Cost Effective Cloud Storage Interoperability Between Public Cloud Platforms

    Get PDF
    With recent advancement in technology, cloud storage became cheaper enabling organizations around the world to store more data on the cloud (texts, images, videos, databases etc.), whereas it’s for a backup, archiving or just storing data streams. New digital laws and regulation (eg. General Data Protection Regulation) require these organizations to change their way of processing or handling data, which results usually in a change of cloud providers or adoption of hybrid architecture or multi-cloud one. With the amount of data stored increasing year after year, it becomes difficult for these organizations to change cloud platforms or cloud provider and migrate their data without thinking about the technical complexity, the time and the huge cost it may incur. This article discusses the data migration and interoperability issues between cloud platforms; the proposed approach provides a simple cost-effective migration that would help organizations save time and money in this process based on a  hybrid ontology approach for the brokerage of data transfers.. Keywords-Cloud Computing; Storage; Security; data; migration; cost optimization

    Application-based authentication on an inter-VM traffic in a Cloud environment

    Get PDF
    Cloud Computing (CC) is an innovative computing model in which resources are provided as a service over the Internet, on an as-needed basis. It is a large-scale distributed computing paradigm that is driven by economies of scale, in which a pool of abstracted, virtualized, dynamically-scalable, managed computing power, storage, platforms, and services are delivered on demand to external customers over the Internet. Since cloud is often enabled by virtualization and share a common attribute, that is, the allocation of resources, applications, and even OSs, adequate safeguards and security measures are essential. In fact, Virtualization creates new targets for intrusion due to the complexity of access and difficulty in monitoring all interconnection points between systems, applications, and data sets. This raises many questions about the appropriate infrastructure, processes, and strategy for enacting detection and response to intrusion in a Cloud environment. Hence, without strict controls put in place within the Cloud, guests could violate and bypass security policies, intercept unauthorized client data, and initiate or become the target of security attacks. This article shines the light on the issues of security within Cloud Computing, especially inter-VM traffic visibility. In addition, the paper lays the proposition of an Application Based Security (ABS) approach in order to enforce an application-based authentication between VMs, through various security mechanisms, filtering, structures, and policies
    corecore