Proposing a model on Security challenges in cloud computing especially Social Media and Social Sites

Author(s):  
Fayaz Ahmad Lone ◽  
◽  
Amit Kumar Chaturvedi
2018 ◽  
Vol 7 (1.9) ◽  
pp. 200
Author(s):  
T A.Mohanaprakash ◽  
J Andrews

Cloud computing is associate inclusive new approach on however computing services square measure made and utilized. Cloud computing is associate accomplishment of assorted styles of services that has attracted several users in today’s state of affairs. The foremost enticing service of cloud computing is information outsourcing, because of this the information homeowners will host any size of information on the cloud server and users will access the information from cloud server once needed. A dynamic outsourced auditing theme that cannot solely defend against any dishonest entity and collision, however conjointly support verifiable dynamic updates to outsourced information. The new epitome of information outsourcing conjointly faces the new security challenges. However, users might not totally trust the cloud service suppliers (CSPs) as a result of typically they may be dishonest. It's tough to work out whether or not the CSPs meet the customer’s expectations for information security. Therefore, to with success maintain the integrity of cloud information, several auditing schemes are projected. Some existing integrity ways will solely serve for statically archived information and a few auditing techniques is used for the dynamically updated information. The analyzed numerous existing information integrity auditing schemes together with their consequences.


2019 ◽  
Vol 13 ◽  
pp. 67-75
Author(s):  
Muhammad Abdullahi Maigari ◽  
Uthman Abdullahi Abdul-Qadir

This paper examines the abduction of the schoolgirls in Chibok Local Government Area of Borno State, Nigeria in 2014. The paper examined how the abduction of the schoolgirls generated responses and support for the rescue of the abducted girls from people and organization from different parts of the globe. The Islamists terrorist organization operating in Borno State has attracted the attention of the world since 2009 when they started attacking government establishments and security installations northeast which later escalated to major cities in Northern Nigeria. Methodologically, the paper utilized secondary sources of data to analyze the phenomenon studied. The paper revealed that the development and innovations in information and communication technology which dismantled traditional and colonial boundaries enabled people to express support, solidarity and assist victims of conflict who resides millions of Kilometers away. This shows that Internet-based communications technology has reduced the distance of time and space that characterised traditional mass media. The campaign for the release of the schoolgirls on the social media platforms particularly Twitter and Facebook has tremendously contributed to the release of some of them. Furthermore, the girls freed from abduction have received proper attention: education and reintegration programmes which enable them to start post-abduction life. In this regard, social media has become a tool for supporting the government in moments of security challenges which the Bring Back Our Girls campaign attracted foreign and domestic assistance to Nigeria in the search of the abducted girls and the fight against the Islamist insurgents.


Author(s):  
Hussain Al-Aqrabi ◽  
Lu Liu

The authors present the key security challenges and solutions on the Cloud with the help of literature reviews and an experimental model created on OPNET that is simulated to produce useful statistics to establish the approach that the Cloud computing service providers should take to provide optimal security and compliance. The literature recommends the concept of unified threat management for ensuring secured services on the Cloud. Through the simulation results, the authors demonstrate that UTM may not be a feasible approach to security implementation as it may become a bottleneck for the application Clouds. The fundamental benefits of Cloud computing (resources on demand and high elasticity) may be diluted if UTMs do not scale up effectively as per the traffic loads on the application Clouds. Moreover, it is not feasible for application Clouds to absorb the performance degradation for security and compliance because UTM will not be a total solution for security and compliance. Applications also share the vulnerabilities just like the systems, which will be out of UTM Cloud’s control.


Author(s):  
Zaigham Mahmood

Cloud Computing is an attractive paradigm for organisations that have a requirement to process large scalable distributed applications. It allows for self-provisioning of cloud resources to develop and host applications as well as acquire storage and networking resources. Connected Government (c-government) is an area where cloud technologies can be effectively used to achieve the benefits that the cloud paradigm promises. Social Media, Web 2.0 and mobile technologies can all help to further enhance the connected government capabilities. Using such technologies, governments and citizens can engage in real time in the electronic participation of a government's functioning. In this chapter, we introduce the cloud paradigm and then discussing the requirements of c-government, we outline how cloud technologies can help to achieve an open and transparent c-government. The aim is to provide the basics of relationship between c-government and cloud computing to set the scene for other contributions in this volume.


Author(s):  
N. Raghavendra Rao

Multidisciplinary experts are required to develop a model for resource management in a country. Various concepts in information and communication technology are required to be applied in designing and developing a model for the management of natural resources. The concepts such as cloud computing along with social media play an important role. Case illustrations are discussed in this chapter stressing the role of cloud computing along with the concepts of collaborative technology in developing models for the benefit of citizens in a country.


Author(s):  
Anshu Devi ◽  
Ramesh Kait ◽  
Virender Ranga

Fog computing is a term coined by networking giant Cisco. It is a new paradigm that extends the cloud computing model by conferring computation, storage, and application services at the periphery of networks. Fog computing is a gifted paradigm of cloud computing that facilitates the mobility, portability, heterogeneity, and processing of voluminous data. These distinct features of fog help to reduce latency and make it suitable for location-sensitive applications. Fog computing features raise new security concerns and challenges. The existing cloud security has not been implemented directly due to mobility, heterogeneity of fog nodes. As we know, IoT has to process large amount of data quickly; therefore, it has various functionality-driven applications that escalate security concerns. The primary aim of this chapter is to present the most recent security aspects such as authentication and trust, reputation-based trust model, rogue fog node and authentication at different level, security threats, challenges, and also highlights the future aspects of fog.


Sign in / Sign up

Export Citation Format

Share Document