scholarly journals Secure Cloud Infrastructure: A Survey on Issues, Current Solutions, and Open Challenges

2021 ◽  
Vol 11 (19) ◽  
pp. 9005
Author(s):  
Yara Alghofaili ◽  
Albatul Albattah ◽  
Noura Alrajeh ◽  
Murad A. Rassam ◽  
Bander Ali Saleh Al-rimy

Cloud computing is currently becoming a well-known buzzword in which business titans, such as Microsoft, Amazon, and Google, among others, are at the forefront in developing and providing sophisticated cloud computing systems to their users in a cost-effective manner. Security is the biggest concern for cloud computing and is a major obstacle to users adopting cloud computing systems. Maintaining the security of cloud computing is important, especially for the infrastructure. Several research works have been conducted in the cloud infrastructure security area; however, some gaps have not been completely addressed, while new challenges continue to arise. This paper presents a comprehensive survey of the security issues at different cloud infrastructure levels (e.g., application, network, host, and data). It investigates the most prominent issues that may affect the cloud computing business model with regard to infrastructure. It further discusses the current solutions proposed in the literature to mitigate the different security issues at each level. To assist in solving the issues, the challenges that are still unsolved are summarized. Based on the exploration of the current challenges, some cloud features such as flexibility, elasticity and the multi-tenancy are found to pose new challenges at each infrastructure level. More specifically, the multi-tenancy is found to have the most impact at all infrastructure levels, as it can lead to several security problems such as unavailability, abuse, data loss and privacy breach. This survey concludes by giving some recommendations for future research.

Electronics ◽  
2021 ◽  
Vol 11 (1) ◽  
pp. 16
Author(s):  
Waqas Ahmad ◽  
Aamir Rasool ◽  
Abdul Rehman Javed ◽  
Thar Baker ◽  
Zunera Jalil

Cloud computing provides the flexible architecture where data and resources are dispersed at various locations and are accessible from various industrial environments. Cloud computing has changed the using, storing, and sharing of resources such as data, services, and applications for industrial applications. During the last decade, industries have rapidly switched to cloud computing for having more comprehensive access, reduced cost, and increased performance. In addition, significant improvement has been observed in the internet of things (IoT) with the integration of cloud computing. However, this rapid transition into the cloud raised various security issues and concerns. Traditional security solutions are not directly applicable and sometimes ineffective for cloud-based systems. Cloud platforms’ challenges and security concerns have been addressed during the last three years, despite the successive use and proliferation of multifaceted cyber weapons. The rapid evolution of deep learning (DL) in the artificial intelligence (AI) domain has brought many benefits that can be utilized to address industrial security issues in the cloud. The findings of the proposed research include the following: we present a comprehensive survey of enabling cloud-based IoT architecture, services, configurations, and security models; the classification of cloud security concerns in IoT into four major categories (data, network and service, applications, and people-related security issues), which are discussed in detail; we identify and inspect the latest advancements in cloud-based IoT attacks; we identify, discuss, and analyze significant security issues in each category and present the limitations from a general, artificial intelligence and deep learning perspective; we provide the technological challenges identified in the literature and then identify significant research gaps in the IoT-based cloud infrastructure to highlight future research directions to blend cybersecurity in cloud.


2019 ◽  
pp. 812-823
Author(s):  
K. Y. B. Williams ◽  
Jimmy A. G. Griffin

Better security and encryption is necessary with regard to all forms of Cloud Computing, Cloud Infrastructure, and Cloud Storage. Areas that are affected the hardest by security breaches include: retail/e-commerce, communications, transportation, and banking. Illustrated within this article are ways that companies such as Walmart, Verizon, Wells-Fargo, and BWM would be affected by a lapse in security and/or a breach in their Cloud Infrastructure. In this article issues that can magnify these breaches and data loss is discussed as it relates to Cloud Structure and Cloud Services based on known vulnerabilities and lack of product testing. This article concludes with why it is necessary to have Public Policies as part of the governing system on Cloud Computing, Cloud Infrastructure, and Cloud Storage


Author(s):  
K.Y.B. Williams ◽  
Jimmy A.G. Griffin

Better security and encryption is necessary with regard to all forms of Cloud Computing, Cloud Infrastructure, and Cloud Storage. Areas that are affected the hardest by security breaches include: retail/e-commerce, communications, transportation, and banking. Illustrated within this article are ways that companies such as Walmart, Verizon, Wells-Fargo, and BWM would be affected by a lapse in security and/or a breach in their Cloud Infrastructure. In this article issues that can magnify these breaches and data loss is discussed as it relates to Cloud Structure and Cloud Services based on known vulnerabilities and lack of product testing. This article concludes with why it is necessary to have Public Policies as part of the governing system on Cloud Computing, Cloud Infrastructure, and Cloud Storage


Author(s):  
Ramandeep Kaur

A lot of research has been done in the field of cloud computing in computing domain.  For its effective performance, variety of algorithms has been proposed. The role of virtualization is significant and its performance is dependent on VM Migration and allocation. More of the energy is absorbed in cloud; therefore, the utilization of numerous algorithms is required for saving energy and efficiency enhancement in the proposed work. In the proposed work, green algorithm has been considered with meta heuristic algorithms, ABC (Artificial Bee colony .Every server has to perform different or same functions. A cloud computing infrastructure can be modelled as Primary Machineas a set of physical Servers/host PM1, PM2, PM3… PMn. The resources of cloud infrastructure can be used by the virtualization technology, which allows one to create several VMs on a physical server or host and therefore, lessens the hardware amount and enhances the resource utilization. The computing resource/node in cloud is used through the virtual machine. To address this problem, data centre resources have to be managed in resource -effective manner for driving Green Cloud computing that has been proposed in this work using Virtual machine concept with ABC and Neural Network optimization algorithm. The simulations have been carried out in CLOUDSIM environment and the parameters like SLA violations, Energy consumption and VM migrations along with their comparison with existing techniques will be performed.


Author(s):  
Linlin Wu ◽  
Rajkumar Buyya

In recent years, extensive research has been conducted in the area of Service Level Agreement (SLA) for utility computing systems. An SLA is a formal contract used to guarantee that consumers’ service quality expectation can be achieved. In utility computing systems, the level of customer satisfaction is crucial, making SLAs significantly important in these environments. Fundamental issue is the management of SLAs, including SLA autonomy management or trade off among multiple Quality of Service (QoS) parameters. Many SLA languages and frameworks have been developed as solutions; however, there is no overall classification for these extensive works. Therefore, the aim of this chapter is to present a comprehensive survey of how SLAs are created, managed and used in utility computing environment. We discuss existing use cases from Grid and Cloud computing systems to identify the level of SLA realization in state-of-art systems and emerging challenges for future research.


Author(s):  
Mamta ◽  
Rayavarapu Jaganadha Rao ◽  
Khursheed Ahmad Wani

The demand and development of chemicals, pesticides, fertilizers, and pharmaceuticals is increasing constantly posing a potential threat to the environment. The presence of pesticides and their impact makes their removal and detoxification a more urgent need. Bioremediation technologies have been successfully used and are gaining more and more importance with increased acceptance of eco-friendly remediation solutions among the scientific community. Bioremediation by fungi and bacteria is considered a better option for making environment free from pesticides, as chemical and physical methods are not only costly but also not very effective. However, the complex nature of pesticides is an obstacle to degrade the pesticides, so more versatile and robust microorganisms need to be identified which can produce the desired result in a very cost-effective manner. This study examines the role played by fungi and bacteria in degradation of the pesticides in environment and also identify the future research problems in this regard that need to be experimented.


2019 ◽  
pp. 446-458
Author(s):  
Arun Fera M. ◽  
M. Saravanapriya ◽  
J. John Shiny

Cloud computing is one of the most vital technology which becomes part and parcel of corporate life. It is considered to be one of the most emerging technology which serves for various applications. Generally these Cloud computing systems provide a various data storage services which highly reduces the complexity of users. we mainly focus on addressing in providing confidentiality to users' data. We are proposing one mechanism for addressing this issue. Since software level security has vulnerabilities in addressing the solution to our problem we are dealing with providing hardware level of security. We are focusing on Trusted Platform Module (TPM) which is a chip in computer that is used for secure storage that is mainly used to deal with authentication problem. TPM which when used provides a trustworthy environment to the users. A detailed survey on various existing TPM related security and its implementations is carried out in our research work.


Author(s):  
Zuleyha Yiner ◽  
Nurefsan Sertbas ◽  
Safak Durukan-Odabasi ◽  
Derya Yiltas-Kaplan

Cloud computing that aims to provide convenient, on-demand, network access to shared software and hardware resources has security as the greatest challenge. Data security is the main security concern followed by intrusion detection and prevention in cloud infrastructure. In this chapter, general information about cloud computing and its security issues are discussed. In order to prevent or avoid many attacks, a number of machine learning algorithms approaches are proposed. However, these approaches do not provide efficient results for identifying unknown types of attacks. Deep learning enables to learning features that are more complex, and thanks to the collection of big data as a training data, deep learning achieves more successful results. Many deep learning algorithms are proposed for attack detection. Deep networks architecture is divided into two categories, and descriptions for each architecture and its related attack detection studies are discussed in the following section of chapter.


2016 ◽  
pp. 221-247 ◽  
Author(s):  
Zhaolong Gou ◽  
Shingo Yamaguchi ◽  
B. B. Gupta

Cloud computing is a system, where the resources of a data center are shared using virtualization technology, such that it provides elastic, on demand and instant services to its customers and charges them based on the resources they use. In this chapter, we will discuss recent developments in cloud computing, various security issues and challenges associated with Cloud computing environment, various existing solutions provided for dealing with these security threats and will provide a comparative analysis these approaches. This will provide better understanding of the various security problems associated with the cloud, current solution space, and future research scope to deal with such attacks in better way.


Sign in / Sign up

Export Citation Format

Share Document