scholarly journals A Survey on User Awareness of Cloud Security

2018 ◽  
Vol 7 (2.32) ◽  
pp. 131
Author(s):  
Dr Gudapati Syam Prasad ◽  
Vidya S. Gaikwad

The cloud computing technology provides cost effective, powerful computation resources on the fly. It minimizes the need to procure and maintain expensive hardware, software and reserve space for IT infrastructure. These features for cloud computing encourages organizations and individuals to migrate their resources needs and services to the cloud. However, cloud computing services provided by third-party vendors possesses various security threats. The cloud services store sensitive data (such as credentials, personal information, etc.) of various users on the shared environment that escalates security concerns. The  aim of this research survey paper are three-fold: i) provides guideline for researchers who are new to the cloud computing security area, ii) provides the state-of-the-art survey of cloud computing security issues and challenges, and iii) provides the further research directions required into security assurance of the cloud computing.  

Author(s):  
N. Chandrakala ◽  
B. Thirumala Rao

Cloud services help individuals and organization to use data that are managed by third parties or another person at remote locations. With the increase in the development of cloud computing environment, the security has become the major concern that has been raised more consistently in order to move data and applications to the cloud as individuals do not trust the third party cloud computing providers with their private and most sensitive data and information. This paper presents, the migration of virtual machine to improve the security in cloud computing. Virtual machine (VM) is an emulation of a particular computer system. In cloud computing, virtual machine migration is a useful tool for migrating operating system instances across multiple physical machines. It is used to load balancing, fault management, low-level system maintenance and reduce energy consumption. Virtual machine (VM) migration is a powerful management technique that gives data center operators the ability to adapt the placement of VMs in order to better satisfy performance objectives, improve resource utilization and communication locality, achieve fault tolerance, reduce energy consumption, and facilitate system maintenance activities. In the migration based security approach, proposed the placement of VMs can make enormous difference in terms of security levels. On the bases of survivability analysis of VMs and Discrete Time Markov Chain (DTMC) analysis, we design an algorithm that generates a secure placement arrangement that the guest VMs can moves before succeeds the attack.


Electronics ◽  
2021 ◽  
Vol 10 (21) ◽  
pp. 2673
Author(s):  
Saba Rehman ◽  
Nida Talat Bajwa ◽  
Munam Ali Shah ◽  
Ahmad O. Aseeri ◽  
Adeel Anjum

A cloud computing environment provides a cost-effective way for the end user to store and access private data over remote storage using some Internet connection. The user has access to the data anywhere and at any time. However, the data over the cloud do not remain secure all the time. Since the data are accessible to the end user only by using the interference of a third party, it is prone to breach of authentication and integrity of the data. Moreover, cloud computing allows simultaneous users to access and retrieve their data online over different Internet connections, which leads to the exposure, leakage, and loss of a user’s sensitive data in different locations. Many algorithms and protocols have been developed to maintain the security and integrity of the data using cryptographic algorithms such as the Elliptic Curve Cryptography (ECC). This paper proposes a secure and optimized scheme for sharing data while maintaining data security and integrity over the cloud. The proposed system mainly functions by combining the ECC and the Advanced Encryption Standard (AES) method to ensure authentication and data integrity. The experimental results show that the proposed approach is efficient and yields better results when compared with existing approaches.


2018 ◽  
Vol 7 (2.21) ◽  
pp. 355
Author(s):  
P Sheela Gowr ◽  
N Kumar

Cloud computing was a hasting expertise which has innovated to a collection of new explores. A sub-ordinate device for Information services, it has an ability towards encourage development by feeding convenient environments for a choice of forms of development is different sequence. Clouds usually consider being eco-friendly, however keep it has open to the diversity of some security issues to can change together the feeder as well as users of these cloud services. In this issue are principally associated to the protection of the information flow throughout also being store in the cloud, with simple problems along with data ease of use, data right to use and data confidentiality. Data encryption and service authentication scheme has been initiated by the industries to deal with them. In this paper analyse and examine different issues on security beside with the different procedure worn by the industries to solve these effects. 


Author(s):  
Jitendra Singh ◽  
Vikas Kumar

Cloud computing is expanding in reach, with its utility-based features and enhanced agility. Still, there is a big concern about the privacy and security of the data. Because of these concerns, third-party cloud users are employing the cloud only for less sensitive data, and the advantage of cloud computing is not fully harnessed. In order to ensure the privacy and security of data, proper compliance and regulatory standards become very important for the cloud domain. Although a number of such standards exist for the traditional computing, they must be modified for their wider adoption to the cloud platforms. This chapter considers the worldwide available standards in the technical and non-technical categories for wider coverage of the cloud platforms. In the technical category, security standards presently followed by cloud computing have been discussed, while in the non-technical category, privacy and accounting standards like HIPPA, SAS 70, GAPP, etc. have been considered.


Author(s):  
Georgia Dede ◽  
George Hatzithanasis ◽  
Thomas Kamalakis ◽  
Christos Michalakelis

Cloud computing is a rapidly evolving computational model, which has succeeded in transforming the ICT industry and the economy's production techniques by making corresponding services even more accessible to businesses, offering cost-effective solutions. The cloud broker is a new business model, derived from the necessity of finding the best provider, or the best bundle for the end user. It is a third-party business that assists clients in making the best decision in choosing the most suitable cloud provider and the most effective service bundle for their needs, in terms of performance and price. This chapter analyzes the cloud broker business model and highlights the broker's vital role and the benefits that arise from the use of its services. In that context, it describes cloud brokering and a market analysis, together with the most popular pricing models, together with a comparison among them, concluding with future directions for the expansion of the brokerage model.


2014 ◽  
Vol 543-547 ◽  
pp. 3100-3104
Author(s):  
Xin Huang ◽  
Yu Xing Peng ◽  
Peng Fei You

The massive data in Data centers network will be frequently accessed massive datasets for cloud services, which will lead to some new requirements and becomes an important issue for interconnection topology and data management in cloud computing. According to the cost-effective, the paper proposes a new interconnection network MyHeawood for cloud computing. MyHeawood is constructed by small switches and servers with dual-port NIC according to recursive method. The data placement strategy in MyHeawood is a hashing algorithm based on the family of hash functions. MyHeawood uses three replicas strategy base on master copy, which is allocated in different sub layer to improve the reliability of data.


The introduction of cloud computing has revolutionized business and technology. Cloud computing has merged technology and business creating an almost indistinguishable framework. Cloud computing has utilized various techniques that have been vital in reshaping the way computers are used in business, IT, and education. Cloud computing has replaced the distributed system of using computing resources to a centralized system where resources are easily shared between user and organizations located in different geographical locations. Traditionally the resources are usually stored and managed by a third-party, but the process is usually transparent to the user. The new technology led to the introduction of various user needs such as to search the cloud and associated databases. The development of a selection system used to search the cloud such as in the case of ELECTRE IS and Skyline; this research will develop a system that will be used to manage and determine the quality of service constraints of these new systems with regards to networked cloud computing. The method applied will mimic the various selection system in JAVA and evaluate the Quality of service for multiple cloud services. The FogTorch search tool will be used for quality service management of three cloud services.


Author(s):  
MAHITHA. O ◽  
SUMA. V

Cloud computing has intern the attention of today’s leading IT industries offering huge potential for more flexible, readily scalable and cost effective IT operation. There is a significant anticipation for emergent innovation and expanded capabilities of a cloud-based environment as the cloud services are still in the infant stage. With all technology innovation, the biggest gain will be realized when the Cloud services are efficiently utilized. One of the prime contributions of Cloud is its capacity to handle a huge amount of data for either processing or storing. The inadequacy of this model is that it is prone to disaster. Some of the popular scheduling techniques applied by the researchers and leading IT industries are Round Robin, Preemptive scheduling etc. This research focuses on a novel approach for disaster management through efficient scheduling mechanism.This paper presents a Priority Preemptive scheduling (PPS) with aging of the low priority jobs in Cloud for disaster management. The implementation results show that the jobs at any instance of time are provided with the resources and henceforth preventing them to enter the starvation, which is one of the prime causes for disaster.


Sign in / Sign up

Export Citation Format

Share Document