Detection of anomalies in cloud services using network flowdata analysis

Author(s):  
SS Chakravarthi ◽  
RJ Kannan

Cloud computing has paved an excellent platform for the emergence of cost-effective technological solutions. However, security and privacy issues still remain as a stringent challenge during service catering. Explicitly, the service utility anomalies are liable to cause severe privacy and security issues in cloud service delivery. So, the overall performance of cloud service consumption and end-user applications’ service levels utility is degraded. The open access and distributed nature of the cloud computing is the major reason for its vulnerability to intruders. The security and privacy in cloud services have many challenges and problems still open for research. This paper proposes an intrusion detection method capable of detecting nine categories of attacks in two stages. This paper focuses on establishing a network-based intrusion detection mechanism using machine learning techniques. A model will be constructed with a supervised learning methodology using historical network flowdata and flowdata collected from the Internet.

Author(s):  
Pappu Sowmya ◽  
R Kumar

Cloud computing is one of the trending technologies that provide boundless virtualized resources to the internet users as an important services through the internet, while providing the privacy and security. By using these cloud services, internet users get many parallel computing resources at low cost. It predicted that till 2016, revenues from the online business management spent $4 billion for data storage. Cloud is an open source platform structure, so it is having more chances to malicious attacks. Privacy, confidentiality, and security of stored data are primary security challenges in cloud computing. In cloud computing, ‘virtualization’ is one of the techniques dividing memory into different blocks. In most of the existing systems there is only single authority in the system to provide the encrypted keys. To fill the few security issues, this paper proposed a novel authenticated trust security model for secure virtualization system to encrypt the files. The proposed security model achieves the following functions: 1) allotting the VSM(VM Security Monitor) model for each virtual machine; 2) providing secret keys to encrypt and decrypt information by symmetric encryption.The contribution is a proposed architecture that provides a workable security that a cloud service provider can offer to its consumers. Detailed analysis and architecture design presented to elaborate security model.


Author(s):  
K Dinesh Kumar ◽  
E Umamaheswari

Cloud computing is one of the trending technologies that provide boundless virtualized resources to the internet users as an important services through the internet while providing the privacy and security. Using these cloud services, internet users get many parallel computing resources at low cost. It predicted that till 2016, revenues from the online business management spent $4 billion for data storage. Cloud is an open-source platform structure, so it is having more chances to malicious attacks. Privacy, confidentiality, and security of stored data are primary security challenges in cloud computing. In cloud computing, “virtualization” is one of the techniques dividing memory into different blocks. In most of the existing systems, there is only single authority in the system to provide the encrypted keys. To fill the few security issues, this paper proposed a novel authenticated trust security model for secure virtualization system to encrypt the files. The proposed security model achieves the following functions: (1) allotting the VM security monitor model for each virtual machine and (2) providing secret keys to encrypt and decrypt information by symmetric encryption.The contribution is a proposed architecture that provides a workable security that a cloud service provider can offer to its consumers. Detailed analysis and architecture design presented to elaborate security model. 


2019 ◽  
Vol 8 (2) ◽  
pp. 2079-2084

Nowadays cloud computing is a driving force which has a large impact on each aspect of our lives and widely used in today's business structure. With its capacity and capability, it is widely accepted by many organizations and users. Cloud computing provides numerous benefits to end users and companies in terms of cost, maintenance, management due to which many organizations prefer to use its services with open hands. With the increasing demand, day-by-day service providers also increased and the user has a choice to choose the best one based on their demand Cloud Storage is one such service that provides cost effective storage solution to the users. They provide unlimited storage to the users based on the requirement and charge according to that only. User can rely on them for the storage but apart from the numerous benefits security and privacy remains the biggest concern whenever a user moves to cloud services. Security triad comprises of authentication, Integrity, and availability remains the concern for every user while moving towards cloud-based services. Almost everyday industry and academician working on finding an effective and efficient way, which could provide secure migration of user data in the cloud. One of the solutions could be the use of cryptographic techniques to provide data security. Cryptography is accepted largely to ensure the privacy and security of data in cloud computing. In this paper, several cryptographic technique discussed which are expected to provide the solution to the user's problem when they tend to move towards cloud computing.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Amr M. Sauber ◽  
Passent M. El-Kafrawy ◽  
Amr F. Shawish ◽  
Mohamed A. Amin ◽  
Ismail M. Hagag

The main goal of any data storage model on the cloud is accessing data in an easy way without risking its security. A security consideration is a major aspect in any cloud data storage model to provide safety and efficiency. In this paper, we propose a secure data protection model over the cloud. The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents the threats and attacks that affect data residing in the cloud. Our proposed model provides the benefits and effectiveness of security in cloud computing such as enhancement of the encryption of data in the cloud. It provides security and scalability of data sharing for users on the cloud computing. Our model achieves the security functions over cloud computing such as identification and authentication, authorization, and encryption. Also, this model protects the system from any fake data owner who enters malicious information that may destroy the main goal of cloud services. We develop the one-time password (OTP) as a logging technique and uploading technique to protect users and data owners from any fake unauthorized access to the cloud. We implement our model using a simulation of the model called Next Generation Secure Cloud Server (NG-Cloud). These results increase the security protection techniques for end user and data owner from fake user and fake data owner in the cloud.


Author(s):  
Kayalvili S ◽  
Sowmitha V

Cloud computing enables users to accumulate their sensitive data into cloud service providers to achieve scalable services on-demand. Outstanding security requirements arising from this means of data storage and management include data security and privacy. Attribute-based Encryption (ABE) is an efficient encryption system with fine-grained access control for encrypting out-sourced data in cloud computing. Since data outsourcing systems require flexible access control approach Problems arises when sharing confidential corporate data in cloud computing. User-Identity needs to be managed globally and access policies can be defined by several authorities. Data is dual encrypted for more security and to maintain De-Centralization in Multi-Authority environment.


Cloud computing is an internet-based service of delivering technology to users and an important technological facility where mutual resources are delivered on demand. Usage of cloud computing in educational Institutions provides students as well as administrative staff an opportunity to access various applications and knowledge swiftly. Its simplicity, upfront-cost, reduced downtime and less management effort make this service acceptable for all fragments of society particularly students and teachers. Despite the fact that the cloud computing technology is very useful, such as ease of access, cost effective. It has various issues like security violations, data confidentiality, data integrity, regional and geographical restrictions over the data. Safe cloud services are required to protect its users from different external threats such as disclosure or loss of data and compromising of users’ accounts. Users’ understanding about the cloud computing’s advantages, disadvantages and security issues can protect them from potential threats while ensuring its optimal usage in education. In this paper, a survey has been conducted to identify students understanding about the advantages, disadvantages and security issues regarding cloud computing in the educational sector. A sample of 212 respondents from graduate and undergraduate programs was taken to obtain required information. The findings reveal a lack of awareness about the use of cloud computing, its benefits, and security concerns and the implications of this deficiency are critical as multiple issues like outflow of personal data and its loss is faced by its users which may have adverse social, emotional and professional effects on student’s life. Considering the usefulness as well as the sensitivity of cloud computing in educational institutions, Authors propose maximum utilization of cloud computing in educational sector while ensuring the security of its users.


Internet-of-Things (IoT) has been considered as a fundamental part of our day by day existence with billions of IoT devices gathering information remotely and can interoperate within the current Internet framework. Fog computing is nothing but cloud computing to the extreme of network security. It provides computation and storage services via CSP (Cloud Service Provider) to end devices in the Internet of Things (IoT). Fog computing allows the data storing and processing any nearby network devices or nearby cloud endpoint continuum. Using fog computing, the designer can reduce the computation architecture of the IoT devices. Unfortunitily, this new paradigm IoT-Fog faces numerous new privacy and security issues, like authentication and authorization, secure communication, information confidentiality. Despite the fact that the customary cloud-based platform can even utilize heavyweight cryptosystem to upgrade security, it can't be performed on fog devices drectly due to reseource constraints. Additionally, a huge number of smart fog devices are fiercely disseminated and situated in various zones, which expands the danger of being undermined by some pernicious gatherings. Trait Based Encryption (ABE) is an open key encryption conspire that enables clients to scramble and unscramble messages dependent on client qualities, which ensures information classification and hearty information get to control. Be that as it may, its computational expense for encryption and unscrambling stage is straightforwardly corresponding to the multifaceted nature of the arrangements utilized. The points is to assess the planning, CPU burden, and memory burden, and system estimations all through each phase of the cloud-to-things continuum amid an analysis for deciding highlights from a finger tapping exercise for Parkinson's Disease patients. It will be appeared there are confinements to the proposed testbeds when endeavoring to deal with upwards of 35 customers at the same time. These discoveries lead us to a proper conveyance of handling the leaves the Intel NUC as the most suitable fog gadget. While the Intel Edison and Raspberry Pi locate a superior balance at in the edge layer, crossing over correspondence conventions and keeping up a self-mending network topology for "thing" devices in the individual territory organize.


Author(s):  
Syrine Sahmim Ep Guerbouj ◽  
Hamza Gharsellaoui ◽  
Sadok Bouamama

This journal article deals with the most important existing problems of security and privacy of the Cloud Computing (CC), Internet of Things (IoT) and Cloud of Things (CoT) concepts especially confidentiality issues. With the evolution of ubiquitous computing, everything is connected everywhere, therefore these concepts have been widely studied in the literature. However, due to the systems complexity and the difficulty to control each access attempt, intrusions and vulnerabilities will be more recurrent. To tackle this issue, researchers have been focused on various approaches enforcing security and privacy. In the present article, risk factors and solutions regarding these technologies are reviewed then current and future trends are discussed.


2019 ◽  
pp. 1440-1459
Author(s):  
Sara Usmani ◽  
Faiza Rehman ◽  
Sajid Umair ◽  
Safdar Abbas Khan

The novel advances in the field of Information Technology presented the people pleasure, luxuries and ease. One of the latest expansions in the Information Technology (IT) industry is Cloud Computing, a technology that uses the internet for storage and access of data. It is also known as on-demand computing. The end user can access personal data and applications anywhere any time with a device having internet. Cloud Computing has gained an enormous attention but it results in the issues of data security and privacy as the data is scattered on different machines in different places across the globe which is a serious threat to the technology. It has many advantages like flexibility, efficiency and scalability but many of the companies are hesitant to invest in it due to privacy concerns. In this chapter, the objective is to review the privacy and security issues in cloud storage of Big Data and to enhance the security in cloud environment so that end users can enjoy a trustworthy and reliable data storage and access.


2018 ◽  
pp. 77-92 ◽  
Author(s):  
Srinivas Sethi ◽  
Sai Sruti

Cloud computing refers to the basic setup for an emerging model of service delivery, that has the advantage of decreasing the cost by sharing computing, infrastructure including storage resources. This can be combined with on-demand delivery mechanism relying on a pay-per-use model. Cloud computing offers an added level of risk because of essential services provided by it to a third party, which makes it difficult to maintain data privacy and security. Security in cloud computing is a critical aspect, which has various issues and challenges related to it. Cloud service providers/ brokers and the cloud service users should make aware of safety cloud. That is the cloud is safe enough from all kinds of the threats, so that the users do not face any problem like; loss of data or data theft. There is a possibility that, a malicious user can enters the cloud by imitating an authentic user, thus corrupt the entire cloud. It can affect many users who are sharing these types of clouds. This chapter mentions the list of parameters that disturb the security of the cloud. This also explores the cloud security issues and challenges faced by cloud service provider/brokers and cloud service users like; data, privacy, and infected application. Finally, it discusses the countermeasure for handling these issues and its challenges.


Sign in / Sign up

Export Citation Format

Share Document