scholarly journals Data Protection for Files and Logs in Fog Cloud Storage Using 3DES

Author(s):  
D. Vannur Vali

Nowadays cloud computing is being used extensively in daily life. With these new computing and communication technologies, new data security challenges arise. Privacy, integrity, and availability are the primary goals of the security structure. Many authentication schemes have been introduced over the years to ensure better security and to provide a wider range of services with a faster perspective. Each type of data is stored in the cloud and can be easily accessed anytime, anywhere. But, it lags due to location awareness when it comes to privacy in cloud computing. Improved cloud computing uses a fog-centric secure plan to ensure logs and information against unapproved access, change, and extinction. To obstruct unauthorized entry, the current scheme uses a technology called Xor-Combination to hide data. Besides, Xor-Combination results in preventing malicious recovery and ensuring better recovery capacity in case of data loss and Intermediate Fog does not provide server security. Cloud server and log files have been proposed and improved to provide higher security and intermediate security differently compared to the existing system for storing data on the fog server. Log files also contain personal information with equally critical protection and confidentiality of log data as an alternative scheme for storing logs in a cloud environment. Our proposed security to protect log files and data files on the main server on the Intermediate Fog server. We use an enhanced 3DES security method that provides better security than the Xor-combination technique.

2007 ◽  
Vol 9 (2) ◽  
Author(s):  
P. L. Wessels ◽  
L. P. Steenkamp

One of the critical issues in managing information within an organization is to ensure that proper controls exist and are applied in allowing people access to information. Passwords are used extensively as the main control mechanism to identify users wanting access to systems, applications, data files, network servers or personal information. In this article, the issues involved in selecting and using passwords are discussed and the current practices employed by users in creating and storing passwords to gain access to sensitive information are assessed. The results of this survey conclude that information managers cannot rely only on users to employ proper password control in order to protect sensitive information. 


Author(s):  
Joseph M. Woodside

The future of education lays in the hand of Cloud Computing given the benefits of learning delivery, costs reduction, and innovation. At the same time, the threat of cyber-attacks and security breaches are also mounting for education based organizations and are a prime target given the amount and type of personal information available. This manuscript discusses the cloud security, privacy, and ethical mechanisms required from a teacher, student, and administrator perspective.


Author(s):  
Jayashree K ◽  
Babu R ◽  
Chithambaramani R

The Internet of Things (IoT) architecture has gained an increased amount of attention from academia as well as the industry sector as a significant methodology for the development of innovative applications and systems. Currently, the merging of this architecture with that of Cloud computing has been largely motivated by the need for various applications and infrastructures in IoT. In addition to this, the Cloud ascends as an eminent solution that would help solve various challenges that are faced by the IoT standard when varied physical devices. There are an excessive number of Cloud service providers the web along with many other services. Thus, it becomes critical to choose the provider who can be efficient, consistent, and suitable, and who can deliver the best Quality of Service (QoS). Thus, this chapter discusses QoS for cloud computing and IoT.


2012 ◽  
pp. 1221-1236
Author(s):  
Gregory H. Carlton ◽  
Hill Zhou

Computing and communication technologies have merged to produce an environment where many applications and their associated data reside in remote locations, often unknown to the users. The adoption of cloud computing promises many benefits to users and service providers, as it shifts users’ concerns away from the physical location of system components and toward the accessibility of the system’s services. While this adoption of cloud computing may be beneficial to users and service providers, it increases areas of concern for computer forensic examiners that need to obtain data from cloud computing environments for evidence in legal matters. The authors present an overview of cloud computing, discuss the challenges it raises from a digital forensics perspective, describe suitable tools for forensic analysis of cloud computing environments, and consider the future of cloud computing.


Author(s):  
Kritika Verma ◽  
Sonal Dubey ◽  
M. A. Rizvi

Cloud based mobile learning (m-learning) is emerging as one of the most important branches of cloud computing, and is still in its infancy. These days, there are two emerging archetypes in Information and Communication Technologies (ICT) for learning. The first one is the anytime, anywhere, on-the-move, to be called the mobility archetype, and the second one is the cloud computing. Both archetypes are radically transforming the way we learn, communicate, access, and utilize information resources, and connect with peers and colleagues, thus affecting all aspects of education. This chapter delivers an introduction of the evolution of cloud based m-learning, benefits and characteristics of cloud based m-learning. It also canvasses the current scenario of m-learning utilizing the cloud, various challenges for implementing the m-learning system on the cloud. It further confers technologies used for cloud based m-learning. It also considers a brief look at methods for creating m-learning content and experiences, suggested by various researchers and concluded with the future aspects of the cloud based m-learning.


Big Data ◽  
2016 ◽  
pp. 2165-2198
Author(s):  
José Carlos Cavalcanti

Analytics (discover and communication of patterns, with significance, in data) of Big Data (basically characterized by large structured and unstructured data volumes, from a variety of sources, at high velocity - i.e., real-time data capture, storage, and analysis), through the use of Cloud Computing (a model of network computing) is becoming the new “ABC” of information and communication technologies (ICTs), with important effects for the generation of new firms and for the restructuring of those ones already established. However, as this chapter argues, successful application of these new ABC technologies and tools depends on two interrelated policy aspects: 1) the use of a proper model which could help one to approach the structure and dynamics of the firm, and, 2) how the complex trade-off between information technology (IT) and communication technology (CT) costs is handled within, between and beyond firms, organizations and institutions.


Author(s):  
Tziporah Stern

Privacy, or the right to hold information about oneself in secret (Masuda, 1979; O’Brien & Yasnof, 1999), has become increasingly important in the information society. With the rapid technological advances and the digitalization of information, retrieval of specific records is more rapid; personal information can be integrated into a number of different data files; and copying, transporting, collecting, storing, and processing large amounts of information is easier. Additionally, the advent of the World Wide Web and the fast-paced growth of the Internet have created further cause for concern. The vast amounts of digital information and the pervasiveness of the Internet facilitate new techniques for gathering information—for example, spyware, phishing, and cookies. Hence, personal information is much more vulnerable to being inappropriately used. This article outlines the importance of privacy in an e-commerce environment, the specific privacy concerns individuals may have, antecedents to these concerns, and potential remedies to quell them.


2008 ◽  
pp. 1360-1365
Author(s):  
Tziporah Stern

People have always been concerned about protecting personal information and their right to privacy. It is an age-old concern that is not unique to the Internet. People are concerned with protecting their privacy in various environments, including healthcare, the workplace and e-commerce. However, advances in technology, the Internet, and community networking are bringing this issue to the forefront. With computerized personal data files: a. retrieval of specific records is more rapid; b. personal information can be integrated into a number of different data files; and c. copying, transporting, collecting, storing, and processing large amounts of information are easier.


Sign in / Sign up

Export Citation Format

Share Document