scholarly journals A cloud computing separation model based on information flow

Open Physics ◽  
2019 ◽  
Vol 17 (1) ◽  
pp. 128-134 ◽  
Author(s):  
Wei Ma ◽  
Huanqin Li ◽  
Deden Witarsyah

Abstract Separation is the primary consideration in cloud computing security. A series of security and safety problems would arise if a separation mechanism is not deployed appropriately, thus affecting the confidence of cloud end-users. In this paper, together with characteristics of cloud computing, the separation issue in cloud computing has been analyzed from the perspective of information flow. The process of information flow in cloud computing systems is formalized to propose corresponding separation rules. These rules have been verified in this paper and it is shown that the rules conform to non-interference security, thus ensuring the security and practicability of the proposed rules.

2018 ◽  
Vol 7 (2.21) ◽  
pp. 355
Author(s):  
P Sheela Gowr ◽  
N Kumar

Cloud computing was a hasting expertise which has innovated to a collection of new explores. A sub-ordinate device for Information services, it has an ability towards encourage development by feeding convenient environments for a choice of forms of development is different sequence. Clouds usually consider being eco-friendly, however keep it has open to the diversity of some security issues to can change together the feeder as well as users of these cloud services. In this issue are principally associated to the protection of the information flow throughout also being store in the cloud, with simple problems along with data ease of use, data right to use and data confidentiality. Data encryption and service authentication scheme has been initiated by the industries to deal with them. In this paper analyse and examine different issues on security beside with the different procedure worn by the industries to solve these effects. 


2012 ◽  
Vol 4 (1) ◽  
pp. 52-66 ◽  
Author(s):  
Junaid Arshad ◽  
Paul Townend ◽  
Jie Xu ◽  
Wei Jie

The evolution of modern computing systems has lead to the emergence of Cloud computing. Cloud computing facilitates on-demand establishment of dynamic, large scale, flexible, and highly scalable computing infrastructures. However, as with any other emerging technology, security underpins widespread adoption of Cloud computing. This paper presents the state-of-the-art about Cloud computing along with its different deployment models. The authors also describe various security challenges that can affect an organization’s decision to adopt Cloud computing. Finally, the authors list recommendations to mitigate with these challenges. Such review of state-of-the-art about Cloud computing security can serve as a useful barometer for an organization to make an informed decision about Cloud computing adoption.


2019 ◽  
Vol 8 (2) ◽  
pp. 699-705
Author(s):  
Sultan Alshamrani

Cloud computing systems consist of a pool of Virtual Machines (VMs), which are installed physically on the provider's set up. The main aim of the VMs is to offer the service to the end users. With the current increasing demand for the cloud VMs, there is always a huge requirement to secure the cloud systems. To keep these cloud systems secured, they need a continuous and a proper monitoring. For the purpose of monitoring, several algorithms are available with FVMs. FVM is a forensic virtual machine which monitors the threats among the VMs. Our formulated algorithm runs on FVM. In this paper, we formulate the Random-Start-Round-Robin algorithm for monitoring inside FVM.


Sign in / Sign up

Export Citation Format

Share Document