scholarly journals A Systematic Review on Integrity and Security in Adoption of Cloud Computing Technologies

2018 ◽  
Vol 7 (2.7) ◽  
pp. 1017
Author(s):  
Ramesh Kumar Mojjad ◽  
Dr D.B.K.Kamesh ◽  
K B.K.S. Durga ◽  
N Sainath ◽  
A Kavitha

Distributed computing has waved the technological era in the year 2013 at a meeting in San Francisco, with sellers giving a lot of items and administrations that outfit IT which manages to convey request to cloud turmoil. Distributed computing pattern is expanding quickly for making the distributed computing well verse. The initial step for the association is to distinguish correct zone where the cloud issues exist. Surprisingly, the role of distributed computing has uplifted the era of business and government issues which lead to challenges towards security. The role of cloud technology improvements lead to display give business – supporting innovations in a proficient manner than any time in recent memory .the move from server to benefit based innovation got an intense change figuring innovation. However these improvements have made novel security challenges, including certain  issues whose  impact is a rising.[1] This paper displays a diagram and investigation of distributed computing, with a few security dangers, security issues, as of now utilized cloud innovations and security arrangements.  

Presently a days, cloud computing is a rising and method for registering in software engineering. Cloud computing is an arrangement of assets and administrations that are offered by the system or web. Distributed computing broadens different figuring methods like framework registering, appropriated processing. Today distributed computing is utilized as a part of both mechanical, research and scholastic fields. Cloud encourages its clients by giving virtual assets through web. As the field of distributed computing is spreading the new procedures are producing for cloud security. This expansion in distributed computing condition likewise expands security challenges for cloud designers. Customers or Users of cloud spare their information in the cloud subsequently the absence of security in cloud can lose the client's trust. In this paper we will discuss about on cloud database and information mining security issues in different viewpoints like multi-occupancy, flexibility, unwavering quality, accessibility on different divisions like modern and research regions, and furthermore examine existing security methods and methodologies for a safe cloud condition through enormous information ideas. What's more, this paper additionally study different parts of mechanical, training and research areas. This paper will empower scientists and experts to think about various security dangers, models and apparatuses proposed in existing distributed storage.


Author(s):  
Ahmad Salah AlAhmad ◽  
Hasan Kahtan ◽  
Yehia Ibrahim Alzoubi ◽  
Omar Ali ◽  
Ashraf Jaradat

2016 ◽  
Vol 9 (3) ◽  
pp. 157 ◽  
Author(s):  
Esmaeil Mehraeen ◽  
Marjan Ghazisaeedi ◽  
Jebraeil Farzi ◽  
Saghar Mirshekari

<p><strong>BACKGROUND:</strong> Healthcare data are very sensitive records that should not be made available to unauthorized people in order for protecting patient's information security. However, in progressed technologies as cloud computing which are vulnerable to cyber gaps that pose an adverse impact on the security and privacy of patients’ electronic health records and in these situations, security challenges of the wireless networks need to be carefully understood and considered. Recently, security concerns in cloud computing environment are a matter of challenge with rising importance.</p><p><strong>OBJECTIVE:</strong> In this study a systematic review to investigate the security challenges in cloud computing was carried out. We focused mainly on healthcare cloud computing security with an organized review of 210 full text articles published between 2000 and 2015.</p><p><strong>METHOD:</strong> A systematic literature review was conducted including PubMed, Science direct, Embase, ProQuest, Web of science, Cochrane, Emerald, and Scopus databases.</p><p><strong>FINDINGS:</strong> Using the strategies described, 666 references retrieved (for research question one 365, research question two 201, and research question three 100 references).</p><p><strong>IMPROVEMENTS:</strong> Review of articles showed that for ensuring healthcare data security, it is important to provide authentication, authorization and access control within cloud's virtualized network. Issues such as identity management and access control, Internet-based access, authentication and authorization and cybercriminals are major concerns in healthcare cloud computing. To manage these issues<strong> </strong>many involved events such as Hybrid Execution Model, VCC-SSF, sHype Hypervisor Security Architecture, Identity Management, and Resource Isolation approaches<em> </em>have to be defined for using cloud computing threat management processes.</p>


2021 ◽  
Vol 10 (1) ◽  
pp. 13-17
Author(s):  
S. Ravichandran ◽  
J. Sathiamoorthy

Distributed computing has been imagined as the cutting edge engineering of IT Enterprise. It moves the application programming and information bases to the incorporated enormous server farms, where the administration of the information and administrations may not be completely dependable. There are various security issues for distributed computing as it envelops numerous innovations including networks, information bases, working frameworks, virtualization, asset planning, exchange the board, load adjusting, simultaneousness control and memory the executives. Putting away information in an outsider's cloud framework causes genuine worry over information secrecy. Hence, security issues for a large number of these frameworks and advancements are material to distributed computing. We propose a key worker encryption conspire and incorporate it with a decentralized deletion code with the end goal that a safe conveyed stockpiling key framework is defined respectively.


2021 ◽  
Vol 23 (07) ◽  
pp. 458-463
Author(s):  
Varun Ravalia ◽  
◽  
Neha Sehrawat ◽  

In the modern era, technologies are being used by everyone.” Cloud” refers to a collaborative expression for boundless advancements and progression. Cloud computing is a disruptive technology for providing on-demand access to data and applications from anywhere at any time in the world. Cloud computing incorporates various available innovations and technologies like virtualization, bandwidth networks, Web 2.0, browser interfaces, and time-sharing. Cloud computing enables us to share the resources like storage, applications, services, and networks without physically obtaining them. The data is stored in the databases on the servers and users/clients need to request access by sending the request to these servers. This paper includes the various details of cloud technology, its characteristics, its models alongside the challenges and problems faced in cloud computing. Here the focus is on the theoretical explanation of the cloud, models of the cloud, and the problems in the security and confrontation faced during the exertion of the cloud technology.


The quick improvement of handling and storage technologies and success of the Internet, computing devices are now less expensive, more accessible. This innovative method has enabled the new business model that is cloud computing, in this model, resources are provided as common service that client takes on lease on the Internet. The corporations are showing more interest and participation in cloud computing and they startedto move their businesses on cloud computing. In past few years, cloud computing technology set up as an emerging research point. Numerous analysts, in any case, concentrate only on technological aspects of cloud technology, thereby ignoring the business openings and possibilities that can be offered by cloud technology. The focus of this paper lies on the increasing role of cloud computing in business and also how cloud computing influencing business positively. We will also discuss about challenges for cloud computing to completely penetrate in business and how these challenges are declining with time and also with cloud maturity. As the enterprises matured in cloud environment the overall challenges reduced very quickly.


Author(s):  
Dr. Manish Jivtode

Cloud computing is viewed as one of the most promising technologies in computing today. This is a new concept of large scale distributed computing. It provides an open platform for every user on the pay-per-use basis. Cloud computing provides number of interfaces and APIs to interact with the services provided to the users. With the development of web services distributed application, Security of data is another important subject in various layers of distributed computing. In this study, security of data that can be used during the access of distributed environment over various layers will be described.


Cloud computing has been viewed as the cutting edge engineering of Information Technology(IT). The Cloud worldview included preferences and its potential for decreasing expenses and time for an administration that favors towards security issues. Distributed computing is a total of data technology(IT) that offered to the client dependent on renting. Despite the fact that countless security issues are tended to, in any case some are not tended to and a few calculations are proposed for security issues. This paper shows an on the diverse Operating Systems of utilizing our refreshed H-HABE calculations and contrast and the different most normal encryption instruments. A near report made on a few encryption methods are utilized in the Different Operating Systems in the cloud. At long last, the real measurements like distinctive working framework issues present in distributed computing are examined.


Author(s):  
Lawan Ahmed Mohammed ◽  
Kashif Munir

The change in physical structures of computing facilities into small and portable devices, or even wearable computers, has enhanced ubiquitous information processing. The basic paradigm of such pervasive computing is the combination of strongly decentralized and distributed computing with the help of diversified devices allowing for spontaneous connectivity via the Internet. In general, pervasive computing strives to simplify day-to-day life by providing mobile users with the means to carry out personal and business tasks via mobile and portable devices. This chapter examines the security challenges that are barriers to mainstream pervasive computing and explains why traditional security mechanisms fail to meet the demands of these environments.


Author(s):  
Arvind Dhaka ◽  
Amita Nandal ◽  
Rahul Dixit

This chapter deals with the main development challenges of 5G network. The 5G terminals can be made as reconfigurable multimode and cognitive radio enabled. Such networks will have software defined radio modulation schemes. The 5G mobile networks will focus on the development of the user terminals where the terminals will have access to different wireless technologies at the same time and will combine different flows from different technologies. It is beneficial to deploy cloud-computing platforms running on general-purpose hardware, leading to a cloud-RAN system. This chapter is focused on the challenges and benefits of implementing reconfigurable signal processing algorithms on a cloud-computing platform and address various security issues with cognitive radio networks.


Sign in / Sign up

Export Citation Format

Share Document