scholarly journals Survey of Triangle Security in Cloud

2021 ◽  
Vol 9 (2) ◽  
pp. 499-506
Author(s):  
Judy Flava B, Et. al.

Cloud computing remains the world's most demanded development trend. It is one of the most important topic whose application is currently being explored. The distributed storage has been one of the apparent administrations in distributed computing. Instead of providing the engaged worker for conventionally organizated storage, the distributed storage sets various outsider individuals with the knowledge. The customer does not care about any details on various external employees and no one knows exactly where information is spared. The distributed storage supplier asserts that the information can be secured, but no one trusts in it. Security risk is information placed in the plain content configuration over cloud and across the organization. This document offers a method that allows customers to securely store and access data from the distributed storage. It also ensures that neither the distributed storage provider, apart from the verified customer, can get details. This technique ensures the safety and confidentiality of cloud-related information. Another favorite position is that if the cloud provider breaks down, the information of the client remains safe as all information is encoded. Customers must also not stress that cloud providers have illegal access to their data.

Author(s):  
MD. Jareena Begum ◽  
B. Haritha

Cloud computing assumes an essential job in the business stage as figuring assets are conveyed on request to clients over the Internet. Distributed computing gives on-request and pervasive access to a concentrated pool of configurable assets, for example, systems, applications, and administrations This guarantees the vast majority of undertakings and number of clients externalize their information into the cloud worker. As of late, secure deduplication strategies have bid extensive interests in the both scholastic and mechanical associations. The primary preferred position of utilizing distributed storage from the clients' perspective is that they can diminish their consumption in buying and keeping up capacity framework. By the creating data size of appropriated registering, a decline in data volumes could help providers reducing the costs of running gigantic accumulating system and saving power usage. So information deduplication strategies have been proposed to improve capacity effectiveness in cloud stockpiles. Also, thinking about the assurance of delicate documents. Before putting away the records into the cloude stockpile they frequently utilize some encryption calculations to ensure them.In this paper we propose stratagies for secure information deduplication


2018 ◽  
Vol 7 (4.6) ◽  
pp. 13
Author(s):  
Mekala Sandhya ◽  
Ashish Ladda ◽  
Dr. Uma N Dulhare ◽  
. . ◽  
. .

In this generation of Internet, information and data are growing continuously. Even though various Internet services and applications. The amount of information is increasing rapidly. Hundred billions even trillions of web indexes exist. Such large data brings people a mass of information and more difficulty discovering useful knowledge in these huge amounts of data at the same time. Cloud computing can provide infrastructure for large data. Cloud computing has two significant characteristics of distributed computing i.e. scalability, high availability. The scalability can seamlessly extend to large-scale clusters. Availability says that cloud computing can bear node errors. Node failures will not affect the program to run correctly. Cloud computing with data mining does significant data processing through high-performance machine. Mass data storage and distributed computing provide a new method for mass data mining and become an effective solution to the distributed storage and efficient computing in data mining. 


2014 ◽  
Vol 926-930 ◽  
pp. 2811-2814 ◽  
Author(s):  
Zhi Hong Li

Cloud computing has offered a brand-new perspective to scalable, distributed computing, which allows significant reduction in IT costs and increase in capabilities. At the same time, however, due to the openness of accessible information relying on trust between cloud providers and customers, the problem of data security has been amplified under the cloud model. This paper investigates the security problem and some of the key challenges of implementing security solutions.


2013 ◽  
Vol 4 (4) ◽  
pp. 1-19 ◽  
Author(s):  
Gunnar Wahlgren ◽  
Stewart Kowalski

The authors combined ISO 27005 framework for IT Security Risk Management with NIST Multitier framework. With this combined framework the authors create a new approach to IT Security Risk Management where IT Security Risk Management is place at the strategic, tactical and operational levels of an organizational. In this paper the authors concentrate on the monitoring and communication steps of IT Security Risk Management and especially escalation of new IT Security Incidents. The authors present a first draft to an IT Security Risk Escalation Capability Maturity Model based on ISACA´s Risk IT Framework. Finally the authors apply the approach to typical cloud computing environment as a first step to evaluate this new approach.


Author(s):  
Rakesh Raut ◽  
Pragati Priyadarshinee ◽  
Manoj Jha

The aim of this paper is to measure the business performance by taking Cloud computing adoption as a mediating variable in Indian industries. A conceptual model is framed using the concept of a TAM-TOE framework which is combined with some new constructs of ‘Risk'. Partial and full mediation are used from the umbrella concept of SEM (Structural Equation Modelling) to test the hypotheses. The study identified that Technological variables ‘Technology Innovation (TI)' and ‘Usage of Technology (UT)' positively mediates the relationship, Organizational variable ‘Industry Usage (IU)' negatively mediates the relationship and Environmental variables ‘Management Style (MS)' positively mediates the relationship whereas ‘Trust (T)' has no mediation effect. The ‘Risk' factors ‘Risk Analysis (RA)' positively influences the mediation process and ‘Perceived IT Security Risk (PITR)' has no mediation effect on the dependent variable ‘Business performance (BP)'. The findings of the study have some important implications. As the constructs ‘Risk (Perceived IT Security Risk)' and ‘Trust' have no mediation effect, it implies industries do not give importance on these factors while adopting Cloud computing. Hence, risk and trust resulted as the barriers for technology adoption, and organizations should verify these criteria during Cloud computing adoption of a better performance in the business. The study tests indirect effect and direct effect on business performance considering Cloud computing adoption as the mediating variable.


Due to higher need of memory and other special needs, cloud computing has become very popular. Many cloud encryption schemes are introduced to increase the protection of the files stored in the cloud. These encryption schemes are said to be safe and cannot be hacked. But in some case, due to some circumstances, certain authorities may force service providers to reveal the confidential data stored in the cloud. Thus making the cloud computing to lose its trust from the users in this paper, we are introducing our structure of another encryption conspire, which empowers distributed storage suppliers to make persuading counterfeit regarding the information put away in the cloud. Along these lines making the coercers, befuddled to see the acquired insider facts as obvious or not.so this sort of encryption makes the distributed computing progressively reliable. The greater part of the plans still accept that the specialist organizations are sheltered from hacking and can be trusted. Yet, practically speaking, a few elements may capture the correspondence among clients and specialist co-ops, convincing the specialist co-ops to discharge the information by controlling government control or other means.so for this situation, the encryptions are believed to be fizzled and the information which are regarded to be classified or mystery are discharged to these elements.


Presently a days, cloud computing is a rising and method for registering in software engineering. Cloud computing is an arrangement of assets and administrations that are offered by the system or web. Distributed computing broadens different figuring methods like framework registering, appropriated processing. Today distributed computing is utilized as a part of both mechanical, research and scholastic fields. Cloud encourages its clients by giving virtual assets through web. As the field of distributed computing is spreading the new procedures are producing for cloud security. This expansion in distributed computing condition likewise expands security challenges for cloud designers. Customers or Users of cloud spare their information in the cloud subsequently the absence of security in cloud can lose the client's trust. In this paper we will discuss about on cloud database and information mining security issues in different viewpoints like multi-occupancy, flexibility, unwavering quality, accessibility on different divisions like modern and research regions, and furthermore examine existing security methods and methodologies for a safe cloud condition through enormous information ideas. What's more, this paper additionally study different parts of mechanical, training and research areas. This paper will empower scientists and experts to think about various security dangers, models and apparatuses proposed in existing distributed storage.


Due to higher need of memory and other special needs, cloud computing has become very popular. Many cloud encryption schemes are introduced to increase the protection of the files stored in the cloud. These encryption schemes are said to be safe and cannot be hacked. But in some case, due to some circumstances, certain authorities may force service providers to reveal the confidential data stored in the cloud. Thus making the cloud computing to lose its trust from the users in this paper, we are introducing our structure of another encryption conspire, which empowers distributed storage suppliers to make persuading counterfeit regarding the information put away in the cloud. Along these lines making the coercers, befuddled to see the acquired insider facts as obvious or not.so this sort of encryption makes the distributed computing progressively reliable. The greater part of the plans still accept that the specialist organizations are sheltered from hacking and can be trusted. Yet, practically speaking, a few elements may capture the correspondence among clients and specialist co-ops, convincing the specialist co-ops to discharge the information by controlling government control or other means.so for this situation, the encryptions are believed to be fizzled and the information which are regarded to be classified or mystery are discharged to these elements.


Author(s):  
Rakesh Raut ◽  
Pragati Priyadarshinee ◽  
Manoj Jha

The aim of this paper is to measure the business performance by taking Cloud computing adoption as a mediating variable in Indian industries. A conceptual model is framed using the concept of a TAM-TOE framework which is combined with some new constructs of ‘Risk'. Partial and full mediation are used from the umbrella concept of SEM (Structural Equation Modelling) to test the hypotheses. The study identified that Technological variables ‘Technology Innovation (TI)' and ‘Usage of Technology (UT)' positively mediates the relationship, Organizational variable ‘Industry Usage (IU)' negatively mediates the relationship and Environmental variables ‘Management Style (MS)' positively mediates the relationship whereas ‘Trust (T)' has no mediation effect. The ‘Risk' factors ‘Risk Analysis (RA)' positively influences the mediation process and ‘Perceived IT Security Risk (PITR)' has no mediation effect on the dependent variable ‘Business performance (BP)'. The findings of the study have some important implications. As the constructs ‘Risk (Perceived IT Security Risk)' and ‘Trust' have no mediation effect, it implies industries do not give importance on these factors while adopting Cloud computing. Hence, risk and trust resulted as the barriers for technology adoption, and organizations should verify these criteria during Cloud computing adoption of a better performance in the business. The study tests indirect effect and direct effect on business performance considering Cloud computing adoption as the mediating variable.


Sign in / Sign up

Export Citation Format

Share Document