scholarly journals CSPM- Cloud Security Posture Management (Comprehensive Security for Cloud Environment)

Author(s):  
Jyoti Bolannavar

As enterprises place more services in public cloud and as the public cloud providers introduce more infrastructure and platform services directly into the hands of developers, it is becoming increasingly complex and time-consuming to answer the seemingly straightforward question “Are we using these services securely?” and “Does the configuration of my cloud services represent excessive risk?” For example, manually assessing the secure setup and configuration in cloud environments across different services, each with varying granularities of authorization policies, is extremely difficult, if not impossible. Simple misconfiguration issues (such as open storage buckets) represent significant risk (see “Open File Shares Are Your Biggest Cloud Security Problem”) and occur often, as evidenced by continuing publicized data disclosures from publicly exposed storage buckets.

Author(s):  
M. Chaitanya ◽  
K. Durga Charan

Load balancing makes cloud computing greater knowledgeable and could increase client pleasure. At reward cloud computing is among the all most systems which offer garage of expertise in very lowers charge and available all the time over the net. However, it has extra vital hassle like security, load administration and fault tolerance. Load balancing inside the cloud computing surroundings has a large impact at the presentation. The set of regulations relates the sport idea to the load balancing manner to amplify the abilties in the public cloud environment. This textual content pronounces an extended load balance mannequin for the majority cloud concentrated on the cloud segregating proposal with a swap mechanism to select specific strategies for great occasions.


Author(s):  
Vitthal Sadashiv Gutte ◽  
Sita Devulapalli

Correctness of data and efficient mechanisms for data security, while transferring the file to and from Cloud, are of paramount importance in today's cloud-centric processing. A mechanism for correctness and efficient transfer of data is proposed in this article. While processing users request data, a set of attributes are defined and checked. States with attributes at different levels are defined to prevent unauthorized access. Security is provided while storing the data using a chunk generation algorithm and verification of chunks using lightweight Third-Party Auditor (TPA). TPA uses digital signatures to verify user's data that are generated by RSA with MD5 algorithms. The metadata file of generated chunks is encrypted using a modified AES algorithm. The proposed method prevents unauthorized users from accessing the data in the cloud environment, in addition to maintaining data integrity. Results of the proposed cloud security model implementation are discussed.


2016 ◽  
Vol 2 (1) ◽  
Author(s):  
Anastasia Panori ◽  
Agustín González-Quel ◽  
Miguel Tavares ◽  
Dimitris Simitopoulos ◽  
Julián Arroyo

During the last decade, there has been an increased interest on cloud computing and especially on the adoption of public cloud services. The process of developing cloud-based public services or migrating existing ones to the Cloud is considered to be of particular interest—as it may require the selection of the most suitable applications as well as their transformation to fit in the new cloud environment. This paper aims at presenting the main findings of a migration process regarding smart city applications to a cloud infrastructure. First, it summarises the methodology along with the main steps followed by the cities of Agueda (Portugal), Thessaloniki (Greece) and Valladolid (Spain) in order to implement this migration process within the framework of the STORM CLOUDS project. Furthermore, it illustrates some crucial results regarding monitoring and validation aspects during the empirical application that was conducted via these pilots. These findings should be received as a helpful experience for future efforts designed by cities or other organisations that are willing to move their applications to the Cloud.


2021 ◽  
Author(s):  
David Andrew Lloyd Tenty

As we approach the limits of Moore’s law the Cloud computing landscape is becoming ever more heterogeneous in order to extract more performance from available resources. Meanwhile, the container-based cloud is of growing importance as a lightweight way to deploy applications. A unified heterogeneous systems framework for use with container-based applications in the heterogeneous cloud is required. We present a bytecode-based framework and it’s implementation called Man O’ War, which allows for the creation of novel, portable LLVM bitcode-based containers for use in the heterogeneous cloud. Containers in Man O’ War enabled systems can be efficiently specialized for the available hardware within the Cloud and expand the frontiers for optimization in heterogeneous cloud environments. We demonstrate that a framework utilizing portable bytecode-based containers eases optimizations such as heterogeneous scaling which have the potential to improve resource utilization and significantly lower costs for users of the public cloud.


Internet is a network of interconnected systems which works collaboratively and services the users without any disruption. But for achieving the same in real time, needs the new prominent technology cloud computing. The massive attractive features and simple pay-as-you-go model of cloud makes it reachable to all the users Denial-of-Service (DoS) plays a crucial role in making the services inaccessible to its intended users. The traditional DoS can no longer be successful in the cloud scenario as it poses the auto scaling feature. Still, the DoS can consume the bandwidth of the cloud customers as they need to pay for their complete usage. In spite of the huge number of recovery measures available in cloud, DoS becoming harder every day in terms of attack volume and severity. Hence complete mitigation against DoS attack is the expected solution which needs to be proved in today’s digital world. Moving Target Defence (MTD) is one such prominent emerging solution which aims to avoid the DDoS attacks in the cloud environment. The challenge of MTD is to change the attack surface periodically such that the attackers will be facing difficulty in even the attack attempts. This paper aims to provide solution for avoiding DoS attack by adopting MTD algorithm for making the web servers redundant in the cloud environment. Experimental simulations prove the effectiveness of MTD in the public cloud environment.


Kybernetes ◽  
2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Haiyan Zhuang ◽  
Babak Esmaeilpour Ghouchani

Purpose Virtual machines (VMs) are suggested by the providers of cloud services as the services for the users over the internet. The consolidation of VM is the tactic of the competent and smart utilization of resources from cloud data centers. Placement of a VM is one of the significant issues in cloud computing (CC). Physical machines in a cloud environment are aware of the way of the VM placement (VMP) as the mapping VMs. The basic target of placement of VM issue is to reduce the physical machines' items that are running or the hosts in cloud data centers. The VMP methods have an important role in the CC. However, there is no systematic and complete way to discuss and analyze the algorithms. The purpose of this paper is to present a systematic survey of VMP techniques. Also, the benefits and weaknesses connected with selected VMP techniques have been debated, and the significant issues of these techniques are addressed to develop the more efficient VMP technique for the future. Design/methodology/approach Because of the importance of VMP in the cloud environments, in this paper, the articles and important mechanisms in this domain have been investigated systematically. The VMP mechanisms have been categorized into two major groups, including static and dynamic mechanisms. Findings The results have indicated that an appropriate VMP has the capacity to decrease the resource consumption rate, energy consumption and carbon emission rate. VMP approaches in computing environment still need improvements in terms of reducing related overhead, consolidation of the cloud environment to become an extremely on-demand mechanism, balancing the load between physical machines, power consumption and refining performance. Research limitations/implications This study aimed to be comprehensive, but there were some limitations. Some perfect work may be eliminated because of applying some filters to choose the original articles. Surveying all the papers on the topic of VMP is impossible, too. Nevertheless, the authors are trying to present a complete survey over the VMP. Practical implications The consequences of this research will be valuable for academicians, and it can provide good ideas for future research in this domain. By providing comparative information and analyzing the contemporary developments in this area, this research will directly support academics and working professionals for better knowing the growth in the VMP area. Originality/value The gathered information in this paper helps to inform the researchers with the state of the art in the VMP area. Totally, the VMP's principal intention, current challenges, open issues, strategies and mechanisms in cloud systems are summarized by explaining the answers.


Database as a Service provides high availability and scalability in cloud but users do not physically control over their data, therefore, data integrity is serious concerned. Authenticity of data and its verification is one of major risk in next generation document-oriented databases. It is possible that malicious insider and outsider can change and compromise the data. A system is proposed in which cloud environment secure storage and access semi-structured data for non-relational document-oriented database. The proposed system effectively provides data integrity for sensitive and confidential fields and verification of data whether it has been altered or not in outsource database in the public domain.


2021 ◽  
Vol 7 ◽  
pp. e539
Author(s):  
Arash Heidari ◽  
Nima Jafari Navimipour

Cloud computing is one of the most important computing patterns that use a pay-as-you-go manner to process data and execute applications. Therefore, numerous enterprises are migrating their applications to cloud environments. Not only do intensive applications deal with enormous quantities of data, but they also demonstrate compute-intensive properties very frequently. The dynamicity, coupled with the ambiguity between marketed resources and resource requirement queries from users, remains important issues that hamper efficient discovery in a cloud environment. Cloud service discovery becomes a complex problem because of the increase in network size and complexity. Complexity and network size keep increasing dynamically, making it a complex NP-hard problem that requires effective service discovery approaches. One of the most famous cloud service discovery methods is the Ant Colony Optimization (ACO) algorithm; however, it suffers from a load balancing problem among the discovered nodes. If the workload balance is inefficient, it limits the use of resources. This paper solved this problem by applying an Inverted Ant Colony Optimization (IACO) algorithm for load-aware service discovery in cloud computing. The IACO considers the pheromones’ repulsion instead of attraction. We design a model for service discovery in the cloud environment to overcome the traditional shortcomings. Numerical results demonstrate that the proposed mechanism can obtain an efficient service discovery method. The algorithm is simulated using a CloudSim simulator, and the result shows better performance. Reducing energy consumption, mitigate response time, and better Service Level Agreement (SLA) violation in the cloud environments are the advantages of the proposed method.


Sign in / Sign up

Export Citation Format

Share Document