A Survey on Security Aspects of Server Virtualization in Cloud Computing

Author(s):  
O Sri Nagesh ◽  
Tapas Kumar ◽  
Venkateswara Rao Vedula

Significant exploitation and utilization of cloud computing in industry is come with and in the identical time vulnerable by unease regarding protection of data hold by cloud computing providers. One of the penalties of moving data processing and storage off business site is that organizations have fewer controls over their infrastructure. seeing that, cloud service (CS) providers must hope that the CS provider is capable to protect their data and infrastructure from both exterior and domestic attacks. Presently however, such hope can only rely on organizational procedures stated by the CS provider and cannot be remotely verified and validated by an external party. The central distinction between cloud computing and conventional enterprise internal Information Technology services is that the proprietor and the consumer of cloud Information Technology infrastructures are separated in cloud. This transform requires a safety responsibility severance in cloud computing. Cloud service providers (CSP) should safe the services they propose and cannot surpass the customers’ authorities. Virtualization is a buildup utterance in the Information Technology world. With the assure to reduce the ever mounting infrastructure inside data centers connected to other important apprehensions such as ease of use and scalability, virtualization technology has been in advance recognition not only with IT experts yet also among administrators and executives as well. The progressively more growing rate of the approval of this technology has exposed these systems to new protection concerns which in recent history have been unnoticed or merely overlooked. This paper presents an in depth state of art gaze at  present most old server virtualization explanations, as well as a writing study on different security matters found inside this virtualization technology. These problems can be practical to all the existing virtualization technologies accessible with no spotlight on a specific answer. Nevertheless, we do susceptibility investigation of two of the mainstream recognized virtualization answers: VMware ESX and Xen. to conclude, we illustrate some clarifications on how to progress the security of online banking and electronic commerce, using virtualization.

Cloud computing means a set of Information Technology services offered to the users over the web on a rented base. Cloud computing has several benefits like pliable, planning, scalability, combination, and rebate .Security is one in every of the most challenges that hinder the expansion of cloud computing. This study introduces a brief analysis of the issues and challenges of cloud computing security. “Cloud computing services will be varied and must be defined from the perspective of the users of the service. Security of information keep within the cloud is most imperative test publically cloud setting. Due the security issues, information are uncovered by Cloud Service Providers (CSP) and others clients of cloud. To verify the information from security lapse, we are using Security Algorithm , named MONcrypt SSA to protect the data in cloud depository . The proposed technique is depend on information jumbling strategies. The MONcrypt SSA depends on Security as a Service (SEaaS). In this we can utilize the JAVA to recreation of results is utilized for measure the security of propose and existing jumbling procedures. MONcrypt contrast and present jumbling procedure that is Base64Encoding .The anticipated strategy gives better and shrewd security in examination with present obscurity strategies. Not at all like present system, MONcrypt diminishes the size of information that will be transferred in distributed storage.


2014 ◽  
Vol 984-985 ◽  
pp. 1309-1317 ◽  
Author(s):  
D. Sudha Devi ◽  
K. Thilagavathy ◽  
S. Vaghula Krishnan ◽  
S. Harish ◽  
R. Srinivasan

Cloud Computing is being intended to deliver information technology services based on internet on demand. The benefits of cloud technology are incomparable which takes the information technology into a new dimension. Organizations already invested for their own infrastructure are likely to set up private clouds to reap the benefits of cloud computing technologies. Cloud services are thriving by the open source software OpenStack. In this paper, we aim to introduce the largest open-source cloud operating system OpenStack with a new authentication mechanism. This paper tries to address the challenge of finding legitimate users by introducing One Time Password (OTP) as an authentication mechanism in OpenStack. Replay attacks can be defeated by using One Time Password. The OTP mechanism provides an extra level of protection which makes it extremely difficult for any potential intruder to abuse the recorded password that was already used to log into cloud service. The integration of OTP mechanism into OpenStack allows users to protect their credentials from unauthorized access. Also One Time Password is used to grant access to legitimate users into the cloud environment and to prevent access to malicious users bot attacks.With secured cloud environment users can enjoy lot many benefits of private cloud service.


Author(s):  
Amit Kr Mandal ◽  
Suvamoy Changder ◽  
Anirban Sarkar ◽  
Narayan C. Debnath

Software as a service (SaaS) is a new software development and deployment paradigm over the cloud. It offers Information Technology services dynamically as “on-demand” basis. The related application data are stored in the data centers managed by the Cloud Service Providers. Many enterprises are facing a major research challenge due to the unavailability of generic cloud architecture for designing, developing and deploying of cloud services. In this paper a flexible architecture for SaaS has been proposed, specifically for data centric cloud applications which may have access to heterogeneous types of databases. The architecture is composed of several layers, which are interacting with each other through the dynamically selected access points of the corresponding layers interfaces. The paper also enlisted the crucial features for SaaS architectural model. Moreover, a detailed comparative study has been done among the proposed SaaS architectural framework and other existing similar proposals based on the listed features.


CCIT Journal ◽  
2012 ◽  
Vol 5 (2) ◽  
pp. 145-167
Author(s):  
Sudaryono Sudaryono ◽  
Diah Aryani ◽  
Ira Tyas Ningrum

Cloud computing is a technology that utilizes the internet services using a central server with the goal of maintaining a virtual nature of data and applications. The presence of cloud computing will obviously lead to changes in the workings of information technologysystems within an organization. This is because the concepts of cloud computing through virtualization, standardization and other fundamental features can reduce information technology costs, simplify the management of information technology services, andaccelerating service delivery. In general, cloud computing architecture consists of: (1) Infrastructure as a Service (IaaS), (2) Platform as a Service (PaaS), and (3) Software as a Service (SaaS). Characteristics of cloud computing are: (1) self-service (on demand self service), (2) broadband access (broadband access network), (3) clustered resource (resource pooling), (4) elastic (rapid elasticity), and (5) measured service (measuredservice). While the advantages of cloud computing is: (1) without any initial investment, (2) convert CAPEX into OPEX, (3) flexible and easily developed, (4) focus on the business, rather than information technology, and (5) of control and responsibility of service. Withcloud computing consumers free themselves from the responsibility for managing the stack of computing resources. Levels ranging from SaaS when it is completely free, PaaS while still must make an application, and IaaS are still busy with the operating system. Thiscontrasts with On-Premise to take care of all your own.


2013 ◽  
Vol 756-759 ◽  
pp. 872-876
Author(s):  
Zu Chun Dun

The Rapid development of cloud computing impels the new situation of information technology services in foreign language teaching in universities, and brings more quality requirements to subject librarians in universities. The teaching database of English reading in universities combines image, audio, video, text, animation and interactive contents for teaching to create a fresh, vivid, interesting English learning environment. The paper proposes the implementation strategies of university English reading teaching datebase construction and the cloud service model according to the concept of cloud computing; It thinks that the subject librarians should supply personalized services for the readers, at the same time, they should also strive to be cloud librarians.


Author(s):  
Ediz Şaykol ◽  
Ayşe Seçil Başer ◽  
Kazim Sari

Cloud computing, as being one of the trendy topics, provides mechanisms for the companies to meet all the information technology and management requirements at a desired performance level with reduced upfront investments. From the economical perspective, it creates a positive impact by helping them focus on their own business. With this positive impact, it causes a huge increase on the number of user firms, and many service providers try to provide solutions based on the user firms’ needs. There are studies on identifying the factors that are used in selecting cloud service solutions in the literature. Having examined the pivotal points among the Information Technology (IT) sector in Turkey, we conducted a survey among the managers of various firms to gather information about their cloud service provider and the factors that provision their choice. Since that decision is very strategic, and once decided it is very hard to alter, it is worth analyzing the set of factors that are used in the survey further in order to identify the most important ones and help new companies for their selection. We provide statistical evaluations based on the results of the survey in this study.


2020 ◽  
Vol 9 (1) ◽  
pp. 52-56
Author(s):  
P. K. Paul ◽  
Bashiru Aremu ◽  
P. S. Aithal ◽  
Ricardo Saavedra ◽  
Ripu Ranjan Sinha

Cloud computing is one of the emerging areas and components within the Information Technology space. Cloud Computing is a kind of virtualization techniques which is achieved by the internet and similar services. Cloud Computing is growing rapidly within Information Technology. This is responsible for the creation of a healthy virtual information technology infrastructure. Cloud Computing is very much important for distributing IT Infrastructure for the concerned organizations and its branches or sister organizations. Cloud Computing is rapidly moving towards the government and public sectors as well due to its benefits and opportunities. Cloud Computing is also called as Virtualization Technology. Within the support of Cloud Computing, there are many service models and types that are emerging viz. Software, Applications, Platforms and Operating Systems, Hardware and infrastructure, Contents and Information, etc. The emerging other technologies are also increasing and many of them relate to the Cloud Computing viz. Big Data, Analytics, Internet of Things (IoT), etc. The market of the cloud also depends on various other things and it is important to note that, apart from the existing established IT organizations and companies, there are many new specially dedicated cloud service providers also emerging rapidly. Cloud Computing Services and its emergence including the current market scenario is provided in this paper including some of the companies and their basic services as well.


Integration of Cloud Computing and Wireless Sensor Network led tremendous growth in the development of Information Technology, during the trust and reputation of service providers for information technology play an essential role. Cloud computing is web-based computing was in the services based on the internet such as data, storage, and computing resources are delivered to the local devices through the internet. Wireless sensor network deals with monitoring, gathering of the information about the physical or environmental conditions. The integration of these two domains has tremendous advantages to improve the business infrastructure and performance worldwide. The security of data on the cloud and calculation of trust and reputation of the Cloud Service Provides (CSP) and Sensor Network Providers (SNP) are the issues for this new paradigm. To fulfill these issues This paper presents novel techniques, for 1) trust and reputation calculation 2) data security on cloud 3) choosing desirable CSP and SNP for the service. This paper proposes Data Security by taking into account the services of Wireless Sensor Network (WSN) and Cloud Service Providers. Our experimental results help users to choose the best service providers in case of both Cloud and Wireless Sensor Network. In addition to that, data security is provided using a data encryption algorithm.


2021 ◽  
Vol 23 (1) ◽  
Author(s):  
Patricia Mtsweni ◽  
Sello N. Mokwena ◽  
Michael N. Moeti

Background: Organisations outsource Information Technology (IT) services in order to keep up with the IT evolution and to remain competitive. Although the IT operations department is responsible to manage service provider service quality, they are not in a position to evaluate IT services performance because of the loss of control and capability in the IT environment.Objectives: This article investigated the impact of outsourcing in-house IT services on the performance of IT operations and how it affects the performance of the organisation.Methods: The qualitative approach was used in this research. Data was collected using structured interviews and were analysed using thematic analysis.Results: Outsourcing of IT services was found to have negative and positive impact on the organisation. Knowledge of the operating environment proved to be significant in the provision of relevant services that add value to the organisation. The results of the analysis revealed that in-house IT and the quality of IT services provided have a direct impact on the performance of the organisation.Conclusion: The study demonstrated that outsourcing IT services impacts the quality and the performance of the organisation positively and negatively. The study recommended that in-house IT and outsource service providers need to collaborate to ensure smooth service delivery, process alignment and also to equip in-house IT with skills to handle first-line support.


Sign in / Sign up

Export Citation Format

Share Document