Control, Security, and Risk in the Cloud

2021 ◽  
pp. 27-46
Author(s):  
W Kuan Hon ◽  
Christopher Millard ◽  
Jatinder Singh

This chapter discusses the risks in cloud computing. Concerns are often raised about decreased customer control and increased provider control of data in clouds, particularly regarding data security (confidentiality, integrity, and availability), fuelled perhaps by the relative lack of information available to customers regarding details of providers' components, suppliers, and mechanics. Colocation risks may also exist. One concern is the leakage of data to others sharing the infrastructure. Another consideration is that if hardware thought to contain a third party's target data is seized by authorities, data of other tenants sharing that hardware may be exposed also. Ultimately, cloud services differ in the degree of control and flexibility afforded to customers (and accordingly in their responsibility for security), and the extent to which providers or sub-providers can access user data. Much depends on a service's type and design. Prospective cloud users may manage their cloud risks not just through technological or contractual means, but also through insurance.

2021 ◽  
Vol 11 (2) ◽  
pp. 193-199
Author(s):  
Anuj Kumar Yadav ◽  
Ritika ◽  
Madan Garg

Cloud computing has emerged as a potential substitute over traditional computing systems during the time of the COVID-19 pandemic. Almost all organizations shift their working from conventional ways to the online form of working. Most of the organizations are planning to permanently change some % of their work to online WFH (Work from Home) mode. There are numerous benefits of using cloud services in terms of cost, portability, platform independence, accessibility, elasticity, etc. But security is the biggest barrier when one wants to move towards cloud computing services, especially the cloud storage service. To overcome the problem of security in cloud storage systems, we have presented an approach for data security in cloud storage. The proposed approach uses the cryptographic methods and provides security and monitoring features to the user data stored in cloud storage systems. The proposed approach continuously monitors user’s data for any kind of modification by attackers. Thus, approach not only provides data security but also improves user’s trust on cloud based storage services.


Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Shurui Gao ◽  
Weidong Meng

PurposeCloud-based technologies are reliably improving Information Technology (IT) environment incorporating changes and modifications to the present business structure. Cloud computing enables small and medium-sized businesses (SMBs) to organize and exchange pertinent data and information in real time. This study checks out the influence of cloud-based services (IT infrastructure, expenses of cloud services, cloud data security and IT knowledge of human resources) on customers' satisfaction in SMBs.Design/methodology/approachCloud computing offers a way to coordinate and share organizational and personal information and data. The adoption of cloud services is one of the most emerging technological advances in the current competitive business environment. Cloud-based services allow start-ups or SMBs to take advantage of technological advancements and respond more quickly to changing consumer demands. In the available literature, cloud computing has received a lot of attention. However, there is also a research gap in creating a paradigm that links the value development drivers in the electronic industry with the leveraging impact of cloud and intercloud computing resources for start-ups and SMBs. A hypothetical model was constructed based on a literature review, and the associations between the latent variables were investigated utilizing structural equations.FindingsFindings from the study confirmed the validity of the proposed model for customer satisfaction assessment. Besides, the results showed that customer satisfaction is affected by cloud-based services in SMBs. The results illustrated that IT infrastructure influences customer satisfaction significantly and positively, with a T-value of 2.42. Also, the results confirmed that the cost of cloud services with a T-value of 2.68 affects customer satisfaction significantly and positively. Cloud data security also impacts customer satisfaction with a T-value of 5.20. The results also showed that the IT knowledge of human resources affects customer satisfaction with a T-value of 3.01.Originality/valueThe main originality of this research is proposing a new conceptual model to assess the impact of cloud-based services on the satisfaction of the customers in SMBs.


Author(s):  
Shailendra Singh ◽  
Sunita Gond

As this is the age of technology and every day we are receiving the news about growing popularity of internet and its applications. Cloud computing is an emerging paradigm of today that is rapidly accepted by the industry/organizations/educational institutions etc. for various applications and purpose. As computing is related to distributed and parallel computing which are from a very long time in the market, but today is the world of cloud computing that reduces the cost of computing by focusing on personal computing to data center computing. Cloud computing architecture and standard provide a unique way for delivering computation services to cloud users. It is having a simple API (Application Platform Interface) to users for accessing storage, platform and hardware by paying-as-per-use basis. Services provided by cloud computing is as same as other utility oriented services like electricity bill, water, telephone etc. over shared network. There are many cloud services providers in the market for providing services like Google, Microsoft, Manjrasoft Aneka, etc.


2019 ◽  
Vol 16 (9) ◽  
pp. 3989-3994
Author(s):  
Jaspreet Singh ◽  
Deepali Gupta ◽  
Neha Sharma

Nowadays, Cloud computing is developing quickly and customers are requesting more administrations and superior outcomes. In the cloud domain, load balancing has turned into an extremely intriguing and crucial research area. Numbers of algorithms were recommended to give proficient mechanism for distributing the cloud user’s requests for accessing pool cloud resources. Also load balancing in cloud should provide notable functional benefits to cloud users and at the same time should prove out to be eminent for cloud services providers. In this paper, the pre-existing load balancing techniques are explored. The paper intends to provide landscape for classification of distinct load balancing algorithms based upon the several parameters and also address performance assessment bound to various load balancing algorithms. The comparative assessment of various load balancing algorithms will helps in proposing a competent load balancing technique for intensify the performance of cloud data centers.


Author(s):  
K Pooja ◽  
◽  
Dr Shailaja S ◽  

Multiple applications of cloud servicing can be seen in the field of logical programming as well as IT industries. Complex computations over local machines may demand for plenty of system resources thereby delaying the data processing operations. In order to achieve speed in processing one must opt for cloud computing techniques. Extensive maneuver of cloud services is desirable for scientific computation of user data and application. This will require a platform designed in a way to meet the specific requirements of individual users, providing an ease for moving their data and applications over different devices. Symbolic-Numeric Computation using cloud service platform is presented in the paper. In this approach user tasks are presented in the form of symbolic expressions using languages like Java, C/C++, APIs etc. Proposed work employs Python programming for carrying out compilation process.


Author(s):  
Howard Hamilton ◽  
Hadi Alasti

Data security in the cloud continues to be a huge concern. The adoption of cloud services continues to increase with more businesses transitioning from on premise technology infrastructures to outsourcing cloud-based infrastructures. As the cloud becomes more popular, users are increasingly demanding control over critical security elements of the data and technology assets that are in the cloud. In addition, there are still cries for greater data and security in the cloud. The goal of this paper is to provide cloud service users with greater control over data security in the cloud while at the same time optimizing overall security in the multi-tenant cloud computing environment. This paper introduces cloud-based intelligent agents that are configurable by the users and are expected to give greater compliance for data security in any of the cloud service models.


2019 ◽  
Vol 8 (S1) ◽  
pp. 54-57
Author(s):  
V. Sulochana

This article proposed a graphical password authentication which uses chunks of images to overcome the loopholes present in the traditional authentication methods. The graphical password contains a selection of chunks of images which creates password for authenticating cloud users for accessing cloud services. The article includes the details of chunks of images authentication, algorithm and implementation of chunk of images.


Cloud computing or in other words, shared computing is a unique way of sharing resources via the Internet. It combines and extends features of parallel processing, grid computing, and distributed computing. Cloud Computing environments provide a competent way to schedule and process various jobs on remote machines. Rather than relying on local machines, Cloud users access services remotely via high-speed networks. Various users submitting jobs to be processed to Cloud would expect Quality of Service (QoS). So, currently, many researchers are proposing various heuristics that provide QoS to cloud users. The job scheduler is responsible for scheduling various jobs to its best-matched resource to achieve desired QoS. There are Service Level Agreements (SLAs) between Cloud Service Providers (CSPs) and Cloud users, which need to be followed by both the parties. Benefits would be affected in case of not complying with SLAs. In this paper various SLAs like Hard SLA, Best Effort SLA and Soft SLA are proposed. Jobs with required QoS parameters like Reliability, Execution Time and Priority are submitted to the scheduler. QoS of resources is determined by parameters like Reliability, Job Completion Time and the Cost of the resource. Schedulers then assign the Job to the best-matched resource according to specified SLA. Simulation is performed for First Fit and Best Fit heuristic approaches. Performances of both the heuristic approaches are evaluated with performance parameters like Average Resource Utilization (ARU), Success Rate of Jobs (SR) and Total Completion Time (TCT). This research work is useful for various organizations that provide various Cloud services to users who seek different levels of QoS for various applications.


Cloud computing can store and manage the large amount of data. Storing the data on to cloud is widespread among companies additionally as private users. It permits its users to access the cloud services from the different locations. It wants solely a working internet connection to access the cloud services. A lot of attention is gained by cloud still there are some problems that need to be taken in considerations(i.e. data security, privacy and reliability)in which data security is one in all the most problems. The biggest challenge in the cloud is to maintain the integrity and confidentiality of data. Many techniques are urged for data protection in cloud. This paper focuses on the present security techniques for shielding the data in cloud. The paper has been carried out on the basis of cryptography, intrusion detection, attacks solutions, Data integrity and privacy as well as authentication and identity.


2021 ◽  
Vol 2083 (4) ◽  
pp. 042077
Author(s):  
Tongtong Xu ◽  
Lei Shi

Abstract Cloud computing is a new way of computing and storage. Users do not need to master professional skills, but can enjoy convenient network services as long as they pay according to their own needs. When we use cloud services, we need to upload data to cloud servers. As the cloud is an open environment, it is easy for attackers to use cloud computing to conduct excessive computational analysis on big data, which is bound to infringe on others’ privacy. In this process, we inevitably face the challenge of data security. How to ensure data privacy security in the cloud environment has become an urgent problem to be solved. This paper studies the big data security privacy protection based on cloud computing platform. This paper starts from two aspects: implicit security mechanism and display security mechanism (encryption mechanism), so as to protect the security privacy of cloud big data platform in data storage and data computing processing.


Sign in / Sign up

Export Citation Format

Share Document