Governance of IS Security in a Cloud Computing Ecosystem: A Longitudinal Approach

Author(s):  
Wafa Bouaynaya
Web Services ◽  
2019 ◽  
pp. 1393-1410
Author(s):  
Alaa Hussein Al-Hamami ◽  
Rafal A. Al-Khashab

Cloud computing provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructure. These features make cloud computing more attractive to users and intruders. It needs more and complex security measures to protect user privacy and data centers. The main concern in this chapter is security, privacy and trust. This chapter will give a discussion and a suggestion for using cloud computing to preserve security and privacy. The malicious hacker and other threats are considering the major cause of leaking security of the personal cloud due to centralized location and remote accesses to the cloud. According to attacks, a centralized location can be easier target rather than several goals and remote access is insecure technologies which offer a boundary of options for attackers to infiltrate enterprises. The biggest concern is attackers that will use the remote connection as a jumping point to get deeper into an organization.


Author(s):  
Pavithra G, Et. al.

Cloud computing is a set of information stored in a cloud, it can be accessed by the user whenever there is a need to access. Cloud computing is a combination of large interconnected computers. Importance of clod computing are storage and processing power to run application. Information can be access from anywhere .Data management is also one importance of the cloud computing. It improves performance. And also a lower infrastructure cost. Lower bandwidth does not support. Another important disadvantage is security thread. Cloud computing requires a constant internet connection. By using watermarking and re-encryption technique we can overcome the problem of security thread in the cloud. In this article we briefly discuss about the above mentioned technique for implementing to overcome the security thread in the cloud computing.


This era is of business and marketing, those who have no proper equipments, they can also proceed in this field. This is just because of cloud computing. Many organizations are still in ambivalence whether to adopt cloud computing or not. The biggest barrier before them is security of their sensitive data. This research paper is an attempt to encourage such organizations or individuals who are still thinking to adopt this fruitful as well as cheap and best service. In this paper we have proposed an integrity testing algorithm which tests whole documents at character level before uploading to cloud storage and after downloading from cloud storage. The idea of the algorithm resembles to the idea of ‘error detection and correction’. For more clearance of the idea refer future scope.


Author(s):  
Keiko Hashizume ◽  
Nobukazu Yoshioka ◽  
Eduardo B. Fernandez

Cloud computing is a new computing model that allows providers to deliver services on demand by means of virtualization. One of the main concerns in cloud computing is security. In particular, the authors describe some attacks in the form of misuse patterns, where a misuse pattern describes how an attack is performed from the point of view of the attacker. Specially, they describe three misuse patterns: Resource Usage Monitoring Inference, Malicious Virtual Machine Creation, and Malicious Virtual Machine Migration Process.


2016 ◽  
pp. 2402-2418
Author(s):  
Alaa Hussein Al-Hamami ◽  
Rafal A Al-Khashab

Cloud computing provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructure. These features make cloud computing more attractive to users and intruders. It needs more and complex security measures to protect user privacy and data centers. The main concern in this chapter is security, privacy and trust. This chapter will give a discussion and a suggestion for using cloud computing to preserve security and privacy. The malicious hacker and other threats are considering the major cause of leaking security of the personal cloud due to centralized location and remote accesses to the cloud. According to attacks, a centralized location can be easier target rather than several goals and remote access is insecure technologies which offer a boundary of options for attackers to infiltrate enterprises. The biggest concern is attackers that will use the remote connection as a jumping point to get deeper into an organization.


2018 ◽  
Vol 7 (3.3) ◽  
pp. 683
Author(s):  
J Angelin Jebamalar ◽  
Dr A. Sasi Kumar

Internet of Things (IoT) is a technology of interest, becoming so invasive which generate huge amount of data and hence it is significant to integrate with Cloud computing, a delivery model provisioned with virtual resources and storage capacity. This IoT and Cloud computing integration referred as 'Cloud of Things' bears key issues and the one is Security which hampers growth of it. This paper highlights those key issues and smart applications of Cloud of Things.  


Author(s):  
Alaa Hussein Al-Hamami ◽  
Rafal A Al-Khashab

Cloud computing provides the full scalability, reliability, high performance and relatively low cost feasible solution as compared to dedicated infrastructure. These features make cloud computing more attractive to users and intruders. It needs more and complex security measures to protect user privacy and data centers. The main concern in this chapter is security, privacy and trust. This chapter will give a discussion and a suggestion for using cloud computing to preserve security and privacy. The malicious hacker and other threats are considering the major cause of leaking security of the personal cloud due to centralized location and remote accesses to the cloud. According to attacks, a centralized location can be easier target rather than several goals and remote access is insecure technologies which offer a boundary of options for attackers to infiltrate enterprises. The biggest concern is attackers that will use the remote connection as a jumping point to get deeper into an organization.


2013 ◽  
Vol 17 (4) ◽  
pp. 159-170 ◽  
Author(s):  
Mathew Nicho ◽  
Mahmoud Hendy

Even though cloud computing, as a model, is not new, organizations are increasingly implementing it because of its large-scale computation and data storage, flexible scalability, relative reliability, and cost economy of services. However, despite its rapid adoption in some sectors and domains, it is evident from research and statistics, that security-related threats are the most noticeable barrier to its widespread adoption. To investigate the reasons behind these threats, the authors used available literature to identify and aggregate information about IS security threats in cloud computing. Based on this information, the authors explored the dimensions of the nature of threat by interviewing a cloud computing practitioner in an organization that uses both the private and public cloud deployment models. From these findings, the authors found that IS security threats in cloud computing must be defined at different levels; namely, at the business and technical level, as well as from a generic and cloud-specific threat perspective. Based on their findings, the authors developed the Cloud Computing Threat Matrix (CCTM) which provides a two-dimensional definition of threat that enables cloud users to fully comprehend the concerns so that they can make relevant decisions while availing cloud computing services.


Author(s):  
Gautam Shroff
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document