Toward security as a service: A trusted cloud service architecture with policy customization

2021 ◽  
Vol 149 ◽  
pp. 76-88
Author(s):  
Chenlin Huang ◽  
Wei Chen ◽  
Lu Yuan ◽  
Yan Ding ◽  
Songlei Jian ◽  
...  
2018 ◽  
pp. 1624-1656
Author(s):  
G. M. Siddesh ◽  
K. G. Srinivasa ◽  
L. Tejaswini

Security in cloud is to be increased to strengthen the confidence and trust of cloud service consumers. In the upcoming years, the scientific research and education teams will have to investigate finding new ways to handle the issue of cloud security. This chapter discusses the major threats and their impact on clouds, security measures to handle the attacks in clouds, security as a service in research and education, and steps to enhance security feature in clouds.


Author(s):  
Mridul Paul ◽  
Ajanta Das

With the advancement of Cloud computing, the adoption of cloud service in various industries is fast increasing. This is evident in the healthcare domain where the adoption is on the rise recently. However, the research contribution in this domain has been limited to certain functions. While cloud can increase availability, reachability of services, it is critical to design the healthcare service before provisioning. Besides, it is important to formulate Service Level Agreements (SLAs) to ensure that consumers can get guaranteed service from the service provider. The objective of this paper is to design the cloud based smart services for patient diagnostics. This research specifically defines service architecture for patients, physicians and diagnostic centers. In order to measure the proposed services, metrics of each SLA parameter is described with its functional and non-functional requirements. This paper also explains a case study implementation of a basic patient service using Google App Engine.


Author(s):  
G. M. Siddesh ◽  
K. G. Srinivasa ◽  
L. Tejaswini

Security in cloud is to be increased to strengthen the confidence and trust of cloud service consumers. In the upcoming years, the scientific research and education teams will have to investigate finding new ways to handle the issue of cloud security. This chapter discusses the major threats and their impact on clouds, security measures to handle the attacks in clouds, security as a service in research and education, and steps to enhance security feature in clouds.


2021 ◽  
Vol 12 (9) ◽  
pp. 474-489
Author(s):  
O. A. Kachanova ◽  
◽  
D. K. Levonevskiy ◽  

To grow crops in greenhouse complexes, it is necessary to maintain the microclimatic conditions required for these crops and monitor them. Automation of these processes is an urgent task, and for its solution it is necessary to use both hardware and software. The paper proposes a cloud service architecture for managing robotic vertical farms, which allows for reliable two-way data transfer between the greenhouse modules and the operator and can be used for growing crops both in vertical hydroponic installations and in single-level greenhouses of greenhouses. The business processes are described that allow you to understand and evaluate the principles of organizing monitoring and management of cultivation. On the basis of the developed architecture, software has been implemented, which has been tested in the tasks of managing the greenhouse complex and obtaining data on the microclimate. Thanks to the use of wireless networks, the absence of restrictions on the type and location of modules, duplication of functionality and data replication, such a system can be considered flexible in use and scalable.


Author(s):  
Longji Tang ◽  
Jing Dong ◽  
Yajing Zhao ◽  
Liang-Jie Zhang

Cloud computing means a set of Information Technology services offered to the users over the web on a rented base. Cloud computing has several benefits like pliable, planning, scalability, combination, and rebate .Security is one in every of the most challenges that hinder the expansion of cloud computing. This study introduces a brief analysis of the issues and challenges of cloud computing security. “Cloud computing services will be varied and must be defined from the perspective of the users of the service. Security of information keep within the cloud is most imperative test publically cloud setting. Due the security issues, information are uncovered by Cloud Service Providers (CSP) and others clients of cloud. To verify the information from security lapse, we are using Security Algorithm , named MONcrypt SSA to protect the data in cloud depository . The proposed technique is depend on information jumbling strategies. The MONcrypt SSA depends on Security as a Service (SEaaS). In this we can utilize the JAVA to recreation of results is utilized for measure the security of propose and existing jumbling procedures. MONcrypt contrast and present jumbling procedure that is Base64Encoding .The anticipated strategy gives better and shrewd security in examination with present obscurity strategies. Not at all like present system, MONcrypt diminishes the size of information that will be transferred in distributed storage.


Author(s):  
Dipankar Dasgupta ◽  
Durdana Naseem

Many organizations are adopting cloud services to reduce their computing cost and increase the flexibility of their IT infrastructure. As cloud services are moving to the mainstream to meet major computing needs, the issues of ownership and chain of custody of customer data are becoming primary responsibilities of providers. Therefore, security requirements are essential for all service models (while the degree of defensive measures may vary) along with satisfying industry standard compliances. The authors develop an insurance framework called MEGHNAD for estimating the security coverage based on the type of cloud service and the level of security assurance required. This security coverage estimator may be useful to cloud providers (offering Security as a Service), cloud adopters, and cloud insurers who want to incorporate or market cloud security insurance. This framework allows the user/operator to choose a cloud service (such as Saas, Paas, IaaS) and other pertinent information in order to determine the appropriate level of security insurance coverage. This chapter describes an extension to the MEGHNAD (version 2.0) framework by incorporating security-related compliances. The compliance for each sector requires specific protection for online data such as transparency, respect for context, security, focused collection, accountability, access, and accuracy. The MEGHNAD tool can also generate a SLA document that can be used for monitoring by a certified Third-Party Assessment Organization (3PAO).


Sign in / Sign up

Export Citation Format

Share Document