The Legal Issues in Outer Space Data Storage by Cloud-Computing Services

2015 ◽  
Author(s):  
Irina Loredana Sttnculescu
Author(s):  
Babangida Zubairu

The emergence of new innovations in technology changes the rate of data generated in health-related institutions and the way data should be handled. As such, the amount of data generated is always on the increase, which demands the need of advanced, automated management systems and storage platforms for handling large biomedical data. Cloud computing has emerged as the promising technology for present and future that can handle large amount of data and enhance processing and management of the data remotely. One of the disturbance concerns of the technology is the security of the data. Data in the cloud is subject to security threats, and this has highlighted the need for exploring security measures against the threats. The chapter provides detailed analysis of cloud computing deployment strategies and risks associated with the technology and tips for biomedical data storage and processing through cloud computing services.


2020 ◽  
Vol 17 (4) ◽  
pp. 1590-1594
Author(s):  
V. Sathya ◽  
A. Shiny ◽  
S. Sajid Hussain ◽  
Ashutosh Gauda

Cloud computing is the movement of enlisting computing services like organization servers, accumulating databases, arranging, programming examination over the Internet. Companies offering these computing services are known as cloud providers and typically charge for cloud computing services based on usage, similar to how you are billed for water or electricity at home. It enables the companies to consume a compute resource, such as a Virtual Machine (VM), storage or an application, as a utility—just like electricity—rather than building and maintaining large computing materials in the house. Though servers are greatly protected against unauthorized access, there are incidents where classified data stored on servers are accessed by the maintenance staffs. So, the security plays a major role in cloud storage as when the user stores the data in the cloud, it stays there and anybody accessing it cannot be known at all. Hence, this paper mainly deals with the idea of storing data securely in the cloud using Symmetric and Asymmetric Cryptography algorithms including AES, 3DES, Blowfish, RSA along with modern Steganography LSB algorithm for wireless communication which hides the key inside the cover image.


2018 ◽  
Vol 12 (6) ◽  
pp. 143 ◽  
Author(s):  
Osama Harfoushi ◽  
Ruba Obiedat

Cloud computing is the delivery of computing resources over the Internet. Examples include, among others, servers, storage, big data, databases, networking, software, and analytics. Institutes that provide cloud computing services are called providers. Cloud computing services were primarily developed to help IT professionals through application development, big data storage and recovery, website hosting, on-demand software delivery, and analysis of significant data patterns that could compromise a system’s security. Given the widespread availability of cloud computing, many companies have begun to implement the system because it is cost-efficient, reliable, scalable, and can be accessed from anywhere at any time. The most demanding feature of a cloud computing system is its security platform, which uses cryptographic algorithm levels to enhance protection of unauthorized access, modification, and denial of services. For the most part, cloud security uses algorithms to ensure the preservation of big data stored on remote servers. This study proposes a methodology to reduce concerns about data privacy by using cloud computing cryptography algorithms to improve the security of various platforms and to ensure customer satisfaction.


2021 ◽  
Vol 13 (1) ◽  
pp. 9-17
Author(s):  
Mohamad Iqbal Suriansyah ◽  
Iyan Mulyana ◽  
Junaidy Budi Sanger ◽  
Sandi Winata

Analyzing compute functions by utilizing the IAAS model for private cloud computing services in packstack development is one of the large-scale data storage solutions. Problems that often occur when implementing various applications are the increased need for server resources, the monitoring process, performance efficiency, time constraints in building servers and upgrading hardware. These problems have an impact on long server downtime. The development of private cloud computing technology could become a solution to the problem. This research employed Openstack and Packstack by applying one server controller node and two servers compute nodes. Server administration with IAAS and self-service approaches made scalability testing simpler and time-efficient. The resizing of the virtual server (instance) that has been carried out in a running condition shows that the measurement of the overhead value in private cloud computing is more optimal with a downtime of 16 seconds.


2019 ◽  
Vol 8 (2) ◽  
pp. 4152-4158

Many companies which essentially required cloud computing services are still in ambivalence whether to adopt it or not. In this research paper an attention has been drawn on security of storage as a Service which is an integral part of Infrastructure as a Service which provide famous CSP, AWS. Whenever someone rent the storage from the cloud service provider, chances of its compromising can take place. Therefore it is intelligence to encrypt the data before uploading it to the cloud and more intelligently divide the data into fragments and encrypt these fragments separately and then upload on cloud. Suppose that if this data is divided into n fragments then n algorithm are required to encrypt these fragments or use single one algorithm and change its key n times otherwise if only one key will be used and someone steal this key then all fragments will be decrypted with the same key. Many algorithms like DES, AES, RSA, Elgamal and Blow Fish are there but they all are static in nature and one more weakness of these algorithms is that size of encrypted file increased. While some researchers used these algorithms in combination and some used double encryption, nevertheless nature remains static and decrypted file size increase rapidly. Now, there is a requirement to design a data sensitive algorithm which could sense data and produce different key for different data automatically. In this paper Two Pass Multidimensional Key Generation and Encryption Algorithm has been proposed which will sort the above problem. Another beauty of this algorithm is that it checks the integrity of the documents while decrypting. Out of millions or billions of characters if only one character or word is altered or removed then this algorithm will show that documents integrity has been violated.


2021 ◽  
pp. 53-60
Author(s):  
Paweł Olber ◽  

The role and capabilities of digital forensics in the cloud computing environment still remain an unsolved and insufficiently explored scientific area. The growing popularity of cloud-based data storage services makes recovery of evidence on the Internet a major challenge for forensic IT exminers. Existing legal barriers in most cases prevent direct access to cloud stored resources for the purpose of recovering data. In many situations, assistance from foreign law enforcement and judicial authorities is required. Findings made during forensic IT analysis that allow reconstructing user’s activities and indicate the act of taking advantage of cloud computing data storage is a justification for undertaking international cooperation. Therefore, it is important to know potential sources of information that enable the reconstruction of the activity of the user in cloud computing services, as well as the awareness of the current state of knowledge and scientific research in this field.


2013 ◽  
Vol 17 (4) ◽  
pp. 159-170 ◽  
Author(s):  
Mathew Nicho ◽  
Mahmoud Hendy

Even though cloud computing, as a model, is not new, organizations are increasingly implementing it because of its large-scale computation and data storage, flexible scalability, relative reliability, and cost economy of services. However, despite its rapid adoption in some sectors and domains, it is evident from research and statistics, that security-related threats are the most noticeable barrier to its widespread adoption. To investigate the reasons behind these threats, the authors used available literature to identify and aggregate information about IS security threats in cloud computing. Based on this information, the authors explored the dimensions of the nature of threat by interviewing a cloud computing practitioner in an organization that uses both the private and public cloud deployment models. From these findings, the authors found that IS security threats in cloud computing must be defined at different levels; namely, at the business and technical level, as well as from a generic and cloud-specific threat perspective. Based on their findings, the authors developed the Cloud Computing Threat Matrix (CCTM) which provides a two-dimensional definition of threat that enables cloud users to fully comprehend the concerns so that they can make relevant decisions while availing cloud computing services.


2019 ◽  
pp. 1748-1768
Author(s):  
Babangida Zubairu

The emergence of new innovations in technology changes the rate of data generated in health-related institutions and the way data should be handled. As such, the amount of data generated is always on the increase, which demands the need of advanced, automated management systems and storage platforms for handling large biomedical data. Cloud computing has emerged as the promising technology for present and future that can handle large amount of data and enhance processing and management of the data remotely. One of the disturbance concerns of the technology is the security of the data. Data in the cloud is subject to security threats, and this has highlighted the need for exploring security measures against the threats. The chapter provides detailed analysis of cloud computing deployment strategies and risks associated with the technology and tips for biomedical data storage and processing through cloud computing services.


2014 ◽  
Vol 3 ◽  
pp. 94-112
Author(s):  
Angelė Pečeliūnaitė

The article analyses the possibility of how Cloud Computing can be used by libraries to organise activities online. In order to achieve a uniform understanding of the essence of technology SaaS, IaaS, and PaaS, the article discusses the Cloud Computing services, which can be used for the relocation of libraries to the Internet. The improvement of the general activity of libraries in the digital age, the analysis of the international experience in the libraries are examples. Also the article discusses the results of a survey of the Lithuanian scientific community that confirms that 90% of the scientific community is in the interest of getting full access to e-publications online. It is concluded that the decrease in funding for libraries, Cloud Computing can be an economically beneficial step, expanding the library services and improving their quality.


Author(s):  
Shengju Yang

In order to solve the trust problems between users and cloud computing service providers in cloud computing services, the existing trust evaluation technology and access control technology in the cloud computing service are analyzed. And the evaluation index of cloud computing is also analyzed. Users can calculate the relevant indicators of cloud computing service according to their own business goals, and choose the appropriate cloud computing services according to their own trust need. In addition, the reliability assessment method of users based on the service process is proposed. Cloud computing access control system can be used for user credibility evaluation, and it can handle user access requests according to user's creditability. In the study, a cloud computing service trust evaluation tool is designed, and the modeling and architecture designs of trust evaluation are also given. The effectiveness of the method is verified by experiments on cloud computing service evaluation methods.


Sign in / Sign up

Export Citation Format

Share Document