scholarly journals A Novel Cloud Computing Algorithm of Security and Privacy

2013 ◽  
Vol 2013 ◽  
pp. 1-6 ◽  
Author(s):  
Chih-Yung Chen ◽  
Jih-Fu Tu

The emergence of cloud computing has simplified the flow of large-scale deployment distributed system of software suppliers; when issuing respective application programs in a sharing clouds service to different user, the management of material becomes more complex. Therefore, in multitype clouds service of trust environment, when enterprises face cloud computing, what most worries is the issue of security, but individual users are worried whether the privacy material will have an outflow risk. This research has mainly analyzed several different construction patterns of cloud computing, and quite relevant case in the deployment construction security of cloud computing by fit and unfit quality, and proposed finally an optimization safe deployment construction of cloud computing and security mechanism of material protection calculating method, namely, Global Authentication Register System (GARS), to reduce cloud material outflow risk. We implemented a system simulation to test the GARS algorithm of availability, security and performance. By experimental data analysis, the solutions of cloud computing security, and privacy derived from the research can be effective protection in cloud information security. Moreover, we have proposed cloud computing in the information security-related proposals that would provide related units for the development of cloud computing security practice.

2017 ◽  
Vol 54 ◽  
pp. 1-2 ◽  
Author(s):  
Yong Yu ◽  
Atsuko Miyaji ◽  
Man Ho Au ◽  
Willy Susilo

Author(s):  
Natasha Csicsmann ◽  
Victoria McIntyre ◽  
Patrick Shea ◽  
Syed S. Rizvi

Strong authentication and encryption schemes help cloud stakeholders in performing the robust and accurate cloud auditing of a potential service provider. All security-related issues and challenges, therefore, need to be addressed before a ubiquitous adoption of cloud computing. In this chapter, the authors provide an overview of existing biometrics-based security technologies and discuss some of the open research issues that need to be addressed for making biometric technology an effective tool for cloud computing security. Finally, this chapter provides a performance analysis on the use of large-scale biometrics-based authentication systems for different cloud computing platforms.


Author(s):  
Wei Zhang ◽  
Jie Wu ◽  
Yaping Lin

Cloud computing has attracted a lot of interests from both the academics and the industries, since it provides efficient resource management, economical cost, and fast deployment. However, concerns on security and privacy become the main obstacle for the large scale application of cloud computing. Encryption would be an alternative way to relief the concern. However, data encryption makes efficient data utilization a challenging problem. To address this problem, secure and privacy preserving keyword search over large scale cloud data is proposed and widely developed. In this paper, we make a thorough survey on the secure and privacy preserving keyword search over large scale cloud data. We investigate existing research arts category by category, where the category is classified according to the search functionality. In each category, we first elaborate on the key idea of existing research works, then we conclude some open and interesting problems.


Author(s):  
S. M. Wu ◽  
Y. C. Wu

Abstract. Cloud computing is an important part of the development of smart cities and also the focus of the information and communication technology (ICT) industry. From the concept of cloud computing, people and objects in cities are organized based on their application needs and computed in real time. It is a comprehensive utilization of the new generation of information and communication technology. This paper first introduces the concept of cloud computing, smart city construction in Taiwan, and the information security management standard of cloud computing, then describes the cloud computing security framework from three areas,and summarizes the implementation status of cloud computing in Taiwan, government policies, and measures, reaching the conclusion that information transmission must be fast and reliable and ensure personal privacy and security. Any type of information security problem will bring catastrophic consequences. Therefore, cloud computing also brings severe challenges to the traditional information security system.


2012 ◽  
Vol 4 (1) ◽  
pp. 52-66 ◽  
Author(s):  
Junaid Arshad ◽  
Paul Townend ◽  
Jie Xu ◽  
Wei Jie

The evolution of modern computing systems has lead to the emergence of Cloud computing. Cloud computing facilitates on-demand establishment of dynamic, large scale, flexible, and highly scalable computing infrastructures. However, as with any other emerging technology, security underpins widespread adoption of Cloud computing. This paper presents the state-of-the-art about Cloud computing along with its different deployment models. The authors also describe various security challenges that can affect an organization’s decision to adopt Cloud computing. Finally, the authors list recommendations to mitigate with these challenges. Such review of state-of-the-art about Cloud computing security can serve as a useful barometer for an organization to make an informed decision about Cloud computing adoption.


2016 ◽  
Vol 2016 ◽  
pp. 1-13 ◽  
Author(s):  
Hua He ◽  
Shanchen Pang ◽  
Zenghua Zhao

Performance evaluation of cloud computing systems studies the relationships among system configuration, system load, and performance indicators. However, such evaluation is not feasible by dint of measurement methods or simulation methods, due to the properties of cloud computing, such as large scale, diversity, and dynamics. To overcome those challenges, we present a novel Dynamic Scalable Stochastic Petri Net (DSSPN) to model and analyze the performance of cloud computing systems. DSSPN can not only clearly depict system dynamic behaviors in an intuitive and efficient way but also easily discover performance deficiencies and bottlenecks of systems. In this study, we further elaborate some properties of DSSPN. In addition, we improve fair scheduling taking into consideration job diversity and resource heterogeneity. To validate the improved algorithm and the applicability of DSSPN, we conduct extensive experiments through Stochastic Petri Net Package (SPNP). The performance results show that the improved algorithm is better than fair scheduling in some key performance indicators, such as average throughput, response time, and average completion time.


Author(s):  
Sambaiah G ◽  
Hyma Birudaraju

In this paper, we discuss security surveillance for Big data, cloud computing, Map Reduce and Hadoop environment. The focal point is on security surveillance in cloud computing that are corresponding with big data. Big data applications are a admirable beneficent to organizations, business, companies and many large scale and small scale industries.We also talk about various attainable solutions for the issues in Hadoop and cloud computing security. Cloud computing security is being blossom at a rapid pace which incorporate with computer security, network security, information security, and data privacy.Cloud computing plays a very crucial role in keep safe data, applications and the related infrastructure with the help of technologies, policies,controls , and big data tools. Moreover, Cloud computing, big data and its applications, advantages are likely to illustrated the most hopeful new boundaries in science.


Sign in / Sign up

Export Citation Format

Share Document