scholarly journals Personal Security in the Application of Online Software in the Technology Period 4.0

Author(s):  
Nguyen Tan Danh

Over the three industrial revolutions, man has achieved great achievements. But besides that great success will always go hand in hand with many problems that arise. Because the rate at which technology develops is directly proportional to the threats it poses. The emergence of new technology requires researchers and students to pay attention to discover new threats to make it reliable and user-friendly. In the meantime 4.0 cloud computing is a new technology model. Security issues in cloud computing are considered one of the biggest obstacles besides the broad benefits of cloud computing. New concepts introduced by the cloud create new challenges for the security community. Addressing these challenges requires, in addition to the ability to cultivate and adjust security measures developed for other systems, to propose new security policies, models and protocols to address optimal and effective cloud security challenges. In this article, we provide comprehensive research on cloud security including classification of known security threats and advanced practices in attempting to address these threats. The paper also provides classification dependency and provides solutions in the form of preventive action rather than proactive action.

2018 ◽  
pp. 1624-1656
Author(s):  
G. M. Siddesh ◽  
K. G. Srinivasa ◽  
L. Tejaswini

Security in cloud is to be increased to strengthen the confidence and trust of cloud service consumers. In the upcoming years, the scientific research and education teams will have to investigate finding new ways to handle the issue of cloud security. This chapter discusses the major threats and their impact on clouds, security measures to handle the attacks in clouds, security as a service in research and education, and steps to enhance security feature in clouds.


Web Services ◽  
2019 ◽  
pp. 2115-2137
Author(s):  
Santosh Kumar ◽  
Debanjan Sadhya ◽  
Durgesh Singh ◽  
S. K. Singh

Establishing identity has become very difficult in the vastly crowded cloud computing environment. The need for a trustworthy cloud authentication phenomenon has increased in the wake of heightened concerns about authentication and rapid advancements in cloud computing, database access, and Internet communication. Face recognition is a non-intrusive method, and facial characteristics are probably most common biometrics features used by humans to identify others. Authentication for cloud computing using face recognition is based on security issues related to data access and cloud database in a cloud. It can provide a satisfactory level of security measures to users and service providers, cloud consumers, and different organizations. In this chapter, the authors cover different research aspects related to cloud security.


Author(s):  
G. M. Siddesh ◽  
K. G. Srinivasa ◽  
L. Tejaswini

Security in cloud is to be increased to strengthen the confidence and trust of cloud service consumers. In the upcoming years, the scientific research and education teams will have to investigate finding new ways to handle the issue of cloud security. This chapter discusses the major threats and their impact on clouds, security measures to handle the attacks in clouds, security as a service in research and education, and steps to enhance security feature in clouds.


2019 ◽  
Vol 8 (4) ◽  
pp. 424
Author(s):  
Dr. K.SAI MANOJ

Now a days, cloud computing is an emerging and way of computing in computer science. Cloud computing is a set of resources and services that are offered by the network or internet. Cloud computing extends various computing techniques like grid computing, distributed compu-ting. Today cloud computing is used in both industrial, research and academic field. Cloud facilitates its users by providing virtual resources via internet. As the field of cloud computing is spreading the new techniques are developing. This increase in cloud computing environment also increases security challenges for cloud developers. Users of cloud save their data in the cloud hence the lack of security in cloud can lose the user’s trust.In this paper we will discuss some of the cloud security issues in various aspects like multi-tenancy, elasticity, reliability, availability etc in various sectors, the paper also discuss existing security techniques and approaches for a secure cloud environment. This paper will enable researchers and professionals to know about different security threats and models and tools proposed.  


2021 ◽  
Vol 14 (4) ◽  
pp. 448-461
Author(s):  
Mohammad Mehrtak ◽  
◽  
SeyedAhmad SeyedAlinaghi ◽  
Mehrzad MohsseniPour ◽  
Tayebeh Noori ◽  
...  

Cloud computing is among the most beneficial solutions to digital problems. Security is one of the focal issues in cloud computing technology, and this study aims at investigating security issues of cloud computing and their probable solutions. A systematic review was performed using Scopus, Pubmed, Science Direct, and Web of Science databases. Once the title and abstract were evaluated, the quality of studies was assessed in order to choose the most relevant according to exclusion and inclusion criteria. Then, the full texts of studies selected were read thoroughly to extract the necessary results. According to the review, data security, availability, and integrity, as well as information confidentiality and network security, were the major challenges in cloud security. Further, data encryption, authentication, and classification, besides application programming interfaces (API), were security solutions to cloud infrastructure. Data encryption could be applied to store and retrieve data from the cloud in order to provide secure communication. Besides, several central challenges, which make the cloud security engineering process problematic, have been considered in this study.


Author(s):  
Nabeel Khan ◽  
Adil Al-Yasiri

Cloud Computing allows firms to outsource their entire information technology (IT) process, allowing them to concentrate more on their core business to enhance their productivity and innovation in offering services to customers. It allows businesses to cut down heavy cost incurred over IT infrastructure without losing focus on customer needs. However, to a certain limit adopting Cloud computing has struggled to grow among many established and growing organizations due to several security and privacy related issues. Throughout the course of this study several interviews were conducted, with cloud developers and security experts, and the literature was reviewed. This study enabled us to understand, current and future, security and privacy challenges with cloud computing by providing suitable solutions to identified challenges. The outcome of this study led to identification of total 18, current and future, security issues affecting several attributes of cloud computing. In this process of identification, the author also found mitigation techniques to avert these security issues. A security guide is formulated which enables organizations to be aware of security challenges, vulnerabilities and techniques to evade them.


2013 ◽  
Vol 791-793 ◽  
pp. 1686-1689
Author(s):  
Dong Dong Xin ◽  
Lan Qiu Huang

Recently, characterized by low inputs, high maintainability, rapid arrangement, reliable services, cloud computing is popular among scholars and enterprises around the world. Additionally, with many advantages, such as to reduce operating costs and to improve operational efficiency, it has attracted a host of financial and material resources from every state. During the continuous development of its technology and applications, cloud computing has encountered more severe security challenges that have become critical factors to hinder the development of cloud computing. The article summarizes existing cloud security issues, probes into relevant strategies as well as proposes some suggestions for cloud security that researches of fundamental theories have to be enhanced; innovative thoughts and empirical researches should be highlighted, which can be used as references for cloud security.


2016 ◽  
pp. 2055-2075
Author(s):  
Santosh Kumar ◽  
Debanjan Sadhya ◽  
Durgesh Singh ◽  
Sanjay Kumar Singh

Establishing identity has become very difficult in the vastly crowded cloud computing environment. The need for a trustworthy cloud authentication phenomenon has increased in the wake of heightened concerns about authentication and rapid advancements in cloud computing, database access, and Internet communication. Face recognition is a non-intrusive method, and facial characteristics are probably most common biometrics features used by humans to identify others. Authentication for cloud computing using face recognition is based on security issues related to data access and cloud database in a cloud. It can provide a satisfactory level of security measures to users and service providers, cloud consumers, and different organizations. In this chapter, the authors cover different research aspects related to cloud security.


A computing model in which the computing resources such as hardware, software and data are provided as a service via web browser or light-weight desktop machine on the internet is termed as Cloud computing. This computing model demolishes the requirement of keeping the resources of computer locally hence reducing the cost of worthy resources (Llorente, Montero & Moreno, 2012). A typical cloud is affected by various security concerns such as Temporary Denial of Service (TDOS) attacks, hijacking session issues, flashing attacks and theft of user identity. The motto of this study is to overcome the research gap between the cloud security constraints and the existing security danger. An investigation into the present cloud service models, presently applied security measures, security standards and their level of flawless shielding has been done. This thematic study helped in disclosing various security issues and their counter measures whereas the empirical study facilitated in acknowledgement of the botherings of users and security analysts in regards to those solution strategy. The empirical methods used in this research were interviews and questionnaires to justify the theoretical findings and to gain the originality of practitioners dealing with cloud security


2018 ◽  
pp. 268-285 ◽  
Author(s):  
Nabeel Khan ◽  
Adil Al-Yasiri

Cloud Computing allows firms to outsource their entire information technology (IT) process, allowing them to concentrate more on their core business to enhance their productivity and innovation in offering services to customers. It allows businesses to cut down heavy cost incurred over IT infrastructure without losing focus on customer needs. However, to a certain limit adopting Cloud computing has struggled to grow among many established and growing organizations due to several security and privacy related issues. Throughout the course of this study several interviews were conducted, with cloud developers and security experts, and the literature was reviewed. This study enabled us to understand, current and future, security and privacy challenges with cloud computing by providing suitable solutions to identified challenges. The outcome of this study led to identification of total 18, current and future, security issues affecting several attributes of cloud computing. In this process of identification, the author also found mitigation techniques to avert these security issues. A security guide is formulated which enables organizations to be aware of security challenges, vulnerabilities and techniques to evade them.


Sign in / Sign up

Export Citation Format

Share Document