scholarly journals Cryptographic Solution for Security Problem in Cloud Computing Storage During Global Pandemics

2021 ◽  
Vol 11 (2) ◽  
pp. 193-199
Author(s):  
Anuj Kumar Yadav ◽  
Ritika ◽  
Madan Garg

Cloud computing has emerged as a potential substitute over traditional computing systems during the time of the COVID-19 pandemic. Almost all organizations shift their working from conventional ways to the online form of working. Most of the organizations are planning to permanently change some % of their work to online WFH (Work from Home) mode. There are numerous benefits of using cloud services in terms of cost, portability, platform independence, accessibility, elasticity, etc. But security is the biggest barrier when one wants to move towards cloud computing services, especially the cloud storage service. To overcome the problem of security in cloud storage systems, we have presented an approach for data security in cloud storage. The proposed approach uses the cryptographic methods and provides security and monitoring features to the user data stored in cloud storage systems. The proposed approach continuously monitors user’s data for any kind of modification by attackers. Thus, approach not only provides data security but also improves user’s trust on cloud based storage services.

2021 ◽  
pp. 27-46
Author(s):  
W Kuan Hon ◽  
Christopher Millard ◽  
Jatinder Singh

This chapter discusses the risks in cloud computing. Concerns are often raised about decreased customer control and increased provider control of data in clouds, particularly regarding data security (confidentiality, integrity, and availability), fuelled perhaps by the relative lack of information available to customers regarding details of providers' components, suppliers, and mechanics. Colocation risks may also exist. One concern is the leakage of data to others sharing the infrastructure. Another consideration is that if hardware thought to contain a third party's target data is seized by authorities, data of other tenants sharing that hardware may be exposed also. Ultimately, cloud services differ in the degree of control and flexibility afforded to customers (and accordingly in their responsibility for security), and the extent to which providers or sub-providers can access user data. Much depends on a service's type and design. Prospective cloud users may manage their cloud risks not just through technological or contractual means, but also through insurance.


Author(s):  
A. V. Deorankar ◽  
Khushboo T. Khobragade

Cloud technology is very profitable for the business evolution. In cloud computing, the data is mostly outsourced. The security and integrity of the data in the cloud system is always a main worry. Because of rapid development of adaptable cloud services, it becomes increasingly vulnerable to use cloud services to share data in a friend circle in the environment of cloud computing. The user privacy is also an important concern. Many systems and technique are being developed to address these issues, but still there is always a scope of improvement. While addressing the issues related to the user privacy and data security and integrity, we must consider the efficiency of the system while accessing and searching for the data. In this paper, we discuss about the major challenges in cloud environment. Also, presented is a brief overview on proposed system with elliptical curve cryptography is a public key encryption technique uses the properties of elliptic curve in order to generate keys instead of using the traditional methodology of generation of keys.


Author(s):  
P. NagaRaju ◽  
N. Nagamalleswara Rao

Cloud computing (CC) is one amongst the developing technologies, which get more attention from academia as well as industries. It offers diverse benefits like sharing computing resources, service flexibility, reducing costs, etc. The Cloud Services Provider (CSP) is accountable for the data that are delivered to the cloud. The threat of seeing the stored data and using sensitive raw data by strangers is the main barrier in the utilization of cloud services. So, Data Security (DS) along with privacy is the chief issue, which is an obstacle while adopting the CC. Countless techniques are existent for ensuring data confidentiality, but they do not completely give protection to the data. To trounce these drawbacks, this paper introduces the Obfuscation (OB) based Modified Elliptical Curve Cryptography (MECC) algorithm for protecting data as of malicious attacks, which is termed as OB-MECC. Primarily, the proposed method obfuscates the data before they are uploaded to the cloud. For the OB of the data, the proposed work employs methods like substitution cipher (SC), position update, Ceaser cipher, binary conversion, 8-bit binary conversion, decimal(),  two complex(), and ASCII(). Then, encryption of the obfuscated data is done with the utilization of the MECC algorithm. After encryption, the data on the cloud is retrieved. The retrieved data is then decrypted by reversing the OB and encryption process to get the actual data. The outcomes corroborate that the confidentiality and security level are maximum for the proposed OB-MECC when contrasted to the existing approaches.


Author(s):  
Neha Thakur ◽  
Aman Kumar Sharma

Cloud computing has been envisioned as the definite and concerning solution to the rising storage costs of IT Enterprises. There are many cloud computing initiatives from IT giants such as Google, Amazon, Microsoft, IBM. Integrity monitoring is essential in cloud storage for the same reasons that data integrity is critical for any data centre. Data integrity is defined as the accuracy and consistency of stored data, in absence of any alteration to the data between two updates of a file or record.  In order to ensure the integrity and availability of data in Cloud and enforce the quality of cloud storage service, efficient methods that enable on-demand data correctness verification on behalf of cloud users have to be designed. To overcome data integrity problem, many techniques are proposed under different systems and security models. This paper will focus on some of the integrity proving techniques in detail along with their advantages and disadvantages.


2019 ◽  
Vol 13 (4) ◽  
pp. 356-363
Author(s):  
Yuezhong Wu ◽  
Wei Chen ◽  
Shuhong Chen ◽  
Guojun Wang ◽  
Changyun Li

Background: Cloud storage is generally used to provide on-demand services with sufficient scalability in an efficient network environment, and various encryption algorithms are typically applied to protect the data in the cloud. However, it is non-trivial to obtain the original data after encryption and efficient methods are needed to access the original data. Methods: In this paper, we propose a new user-controlled and efficient encrypted data sharing model in cloud storage. It preprocesses user data to ensure the confidentiality and integrity based on triple encryption scheme of CP-ABE ciphertext access control mechanism and integrity verification. Moreover, it adopts secondary screening program to achieve efficient ciphertext retrieval by using distributed Lucene technology and fine-grained decision tree. In this way, when a trustworthy third party is introduced, the security and reliability of data sharing can be guaranteed. To provide data security and efficient retrieval, we also combine active user with active system. Results: Experimental results show that the proposed model can ensure data security in cloud storage services platform as well as enhance the operational performance of data sharing. Conclusion: The proposed security sharing mechanism works well in an actual cloud storage environment.


2021 ◽  
Vol 27 (2) ◽  
Author(s):  
H. Hamza ◽  
A.F.D Kana ◽  
M.Y. Tanko ◽  
S. Aliyu

Cloud computing is a model that aims to deliver a reliable, customizable and scalable computing environment for end-users. Cloud computing is one of the most widely used technologies embraced by sectors and academia, offering a versatile and effective way to store and retrieve documents. The performance and efficiency of cloud computing services always depend upon the performance of the execution of user tasks submitted to the cloud system. Scheduling of user tasks plays a significant role in improving the performance of cloud services. Accordingly, many dependent task scheduling algorithms have been proposed to improve the performance of cloud services and resource utilization; however, most of the techniques for determining which task should be scheduled next are inefficient. This research provided an enhanced algorithm for scheduling dependent tasks in cloud that aims at improving the overall performance of the system. The Dependent tasks were represented as a directed acyclic graph (DAG) and the number of dependent tasks and their total running time were used as a heuristic for determining which path should be explored first. Best first search approach based on the defined heuristic was used to traverse the graph to determine which task should be scheduled next. The results of the simulation using WorkflowSim toolkit showed an average improvement of 18% and 19% on waiting time and turnaround time were achieved respectively.


Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Shurui Gao ◽  
Weidong Meng

PurposeCloud-based technologies are reliably improving Information Technology (IT) environment incorporating changes and modifications to the present business structure. Cloud computing enables small and medium-sized businesses (SMBs) to organize and exchange pertinent data and information in real time. This study checks out the influence of cloud-based services (IT infrastructure, expenses of cloud services, cloud data security and IT knowledge of human resources) on customers' satisfaction in SMBs.Design/methodology/approachCloud computing offers a way to coordinate and share organizational and personal information and data. The adoption of cloud services is one of the most emerging technological advances in the current competitive business environment. Cloud-based services allow start-ups or SMBs to take advantage of technological advancements and respond more quickly to changing consumer demands. In the available literature, cloud computing has received a lot of attention. However, there is also a research gap in creating a paradigm that links the value development drivers in the electronic industry with the leveraging impact of cloud and intercloud computing resources for start-ups and SMBs. A hypothetical model was constructed based on a literature review, and the associations between the latent variables were investigated utilizing structural equations.FindingsFindings from the study confirmed the validity of the proposed model for customer satisfaction assessment. Besides, the results showed that customer satisfaction is affected by cloud-based services in SMBs. The results illustrated that IT infrastructure influences customer satisfaction significantly and positively, with a T-value of 2.42. Also, the results confirmed that the cost of cloud services with a T-value of 2.68 affects customer satisfaction significantly and positively. Cloud data security also impacts customer satisfaction with a T-value of 5.20. The results also showed that the IT knowledge of human resources affects customer satisfaction with a T-value of 3.01.Originality/valueThe main originality of this research is proposing a new conceptual model to assess the impact of cloud-based services on the satisfaction of the customers in SMBs.


Author(s):  
Abdulelah Alwabel ◽  
Robert John Walters ◽  
Gary B. Wills

Cloud computing is a new paradigm that promises to move IT a step further towards utility computing, in which computing services are delivered as a utility service. Traditionally, Cloud employs dedicated resources located in one or more data centres in order to provide services to clients. Desktop Cloud computing is a new type of Cloud computing that aims at providing Cloud capabilities at low or no cost. Desktop Clouds harness non dedicated and idle resources in order to provide Cloud services. However, the nature of such resources can be problematic because they are prone to failure at any time without prior notice. This research focuses on the resource allocation mechanism in Desktop Clouds.The contributions of this chapter are threefold. Firstly, it defines and explains Desktop Clouds by comparing them with both Traditional Clouds and Desktop Grids. Secondly, the paper discusses various research issues in Desktop Clouds. Thirdly, it proposes a resource allocation model that is able to handle node failures.


2016 ◽  
pp. 1162-1190
Author(s):  
Peter Sasvari ◽  
Zoltán Nagymate

Innovation capability has increasingly been searched by the ICT sector in cloud computing applications recently. This chapter describes the economic potentials of cloud computing and explores the characteristics of its usage among Hungarian enterprises. Although enterprises are aware of the basic concept of cloud computing, they have concerns about its application mainly due to data security issues and the lack of education. The chance of using cloud computing services is mainly facilitated by the creation of easier application and consultation would positively affect their usage. According to microenterprises and corporations, faster information flow and remote access are the key benefits of cloud usage. In the case of small-sized enterprises, the two main advantages are easier system recoverability and a higher level of mobility in case of a system breakdown. For the medium-sized enterprises, remote access and greater data security were the key benefits of using cloud computing services in 2014.


Author(s):  
Yulin Yao

Cloud Computing has offered many services to organizations and individuals. The emerging types of services such as analytics, mobile services and emerging software as a service have been offered but there is a lack of analysis on the current status. Core technologies for emerging Cloud services have been identified and presented. This brief opinion paper provides an overview of the current emerging Cloud services and explains the benefits for several disciplines. Four areas have been identified that may bring in more positive impacts for the future direction.


Sign in / Sign up

Export Citation Format

Share Document