scholarly journals Performance Improvement of MONCRYPT SSA Over Data Obfuscation in Cloud Security

Cloud computing means a set of Information Technology services offered to the users over the web on a rented base. Cloud computing has several benefits like pliable, planning, scalability, combination, and rebate .Security is one in every of the most challenges that hinder the expansion of cloud computing. This study introduces a brief analysis of the issues and challenges of cloud computing security. “Cloud computing services will be varied and must be defined from the perspective of the users of the service. Security of information keep within the cloud is most imperative test publically cloud setting. Due the security issues, information are uncovered by Cloud Service Providers (CSP) and others clients of cloud. To verify the information from security lapse, we are using Security Algorithm , named MONcrypt SSA to protect the data in cloud depository . The proposed technique is depend on information jumbling strategies. The MONcrypt SSA depends on Security as a Service (SEaaS). In this we can utilize the JAVA to recreation of results is utilized for measure the security of propose and existing jumbling procedures. MONcrypt contrast and present jumbling procedure that is Base64Encoding .The anticipated strategy gives better and shrewd security in examination with present obscurity strategies. Not at all like present system, MONcrypt diminishes the size of information that will be transferred in distributed storage.

Author(s):  
O Sri Nagesh ◽  
Tapas Kumar ◽  
Venkateswara Rao Vedula

Significant exploitation and utilization of cloud computing in industry is come with and in the identical time vulnerable by unease regarding protection of data hold by cloud computing providers. One of the penalties of moving data processing and storage off business site is that organizations have fewer controls over their infrastructure. seeing that, cloud service (CS) providers must hope that the CS provider is capable to protect their data and infrastructure from both exterior and domestic attacks. Presently however, such hope can only rely on organizational procedures stated by the CS provider and cannot be remotely verified and validated by an external party. The central distinction between cloud computing and conventional enterprise internal Information Technology services is that the proprietor and the consumer of cloud Information Technology infrastructures are separated in cloud. This transform requires a safety responsibility severance in cloud computing. Cloud service providers (CSP) should safe the services they propose and cannot surpass the customers’ authorities. Virtualization is a buildup utterance in the Information Technology world. With the assure to reduce the ever mounting infrastructure inside data centers connected to other important apprehensions such as ease of use and scalability, virtualization technology has been in advance recognition not only with IT experts yet also among administrators and executives as well. The progressively more growing rate of the approval of this technology has exposed these systems to new protection concerns which in recent history have been unnoticed or merely overlooked. This paper presents an in depth state of art gaze at  present most old server virtualization explanations, as well as a writing study on different security matters found inside this virtualization technology. These problems can be practical to all the existing virtualization technologies accessible with no spotlight on a specific answer. Nevertheless, we do susceptibility investigation of two of the mainstream recognized virtualization answers: VMware ESX and Xen. to conclude, we illustrate some clarifications on how to progress the security of online banking and electronic commerce, using virtualization.


Author(s):  
VINITHA S P ◽  
GURUPRASAD E

Cloud computing has been envisioned as the next generation architecture of IT enterprise. It moves the application software and databases to the centralized large data centers where management of data and services may not be fully trustworthy. This unique paradigm brings out many new security challenges like, maintaining correctness and integrity of data in cloud. Integrity of cloud data may be lost due to unauthorized access, modification or deletion of data. Lacking of availability of data may be due to the cloud service providers (CSP), in order to increase their margin of profit by reducing the cost, CSP may discard rarely accessed data without detecting in timely fashion. To overcome above issues, flexible distributed storage, token utilizing, signature creations used to ensure integrity of data, auditing mechanism used assists in maintaining the correctness of data and also locating, identifying of server where exactly the data has been corrupted and also dependability and availability of data achieved through distributed storage of data in cloud. Further in order to ensure authorized access to cloud data a admin module has been proposed in our previous conference paper, which prevents unauthorized users from accessing data and also selective storage scheme based on different parameters of cloud servers proposed in previous paper, in order to provide efficient storage of data in the cloud. In order to provide more efficiency in this paper dynamic data operations are supported such as updating, deletion and addition of data.


2019 ◽  
pp. 1686-1711
Author(s):  
Vijay L. Hallappanavar ◽  
Mahantesh N. Birje

Cloud computing is a model for enabling everywhere, suitable, on-demand network access. There are a number of challenges to provide cloud computing services and to accomplish this, it is necessary to establish trust across the cloud, between the user and the service provider. It is becoming increasingly complex for cloud users to make distinction among service providers offering similar kinds of services. There must be some mechanisms in the hands of users to determine trustworthiness of service providers so that they can select service providers with confidence and with some degree of assurance that service provider will not behave unpredictably or maliciously. An effective trust management system helps cloud service providers and consumers reap the benefits brought about by cloud computing technologies. Hence the objective of this chapter is to describe existing mechanisms that are used to determine a trust worthiness of a cloud service, various models that are used for calculating a trust value and method to establish trust management system.


2018 ◽  
pp. 54-76
Author(s):  
Tabassum N. Mujawar ◽  
Ashok V. Sutagundar ◽  
Lata L. Ragha

Cloud computing is recently emerging technology, which provides a way to access computing resources over Internet on demand and pay per use basis. Cloud computing is a paradigm that enable access to shared pool of resources efficiently, which are managed by third party cloud service providers. Despite of various advantages of cloud computing security is the biggest threat. This chapter describes various security concerns in cloud computing. The clouds are subject to traditional data confidentiality, integrity, availability and various privacy issues. This chapter comprises various security issues at different levels in environment that includes infrastructure level security, data level and storage security. It also deals with the concept of Identity and Access Control mechanism.


Author(s):  
Amit Kr Mandal ◽  
Suvamoy Changder ◽  
Anirban Sarkar ◽  
Narayan C. Debnath

Software as a service (SaaS) is a new software development and deployment paradigm over the cloud. It offers Information Technology services dynamically as “on-demand” basis. The related application data are stored in the data centers managed by the Cloud Service Providers. Many enterprises are facing a major research challenge due to the unavailability of generic cloud architecture for designing, developing and deploying of cloud services. In this paper a flexible architecture for SaaS has been proposed, specifically for data centric cloud applications which may have access to heterogeneous types of databases. The architecture is composed of several layers, which are interacting with each other through the dynamically selected access points of the corresponding layers interfaces. The paper also enlisted the crucial features for SaaS architectural model. Moreover, a detailed comparative study has been done among the proposed SaaS architectural framework and other existing similar proposals based on the listed features.


2013 ◽  
Vol 660 ◽  
pp. 196-201 ◽  
Author(s):  
Muhammad Irfan ◽  
Zhu Hong ◽  
Nueraimaiti Aimaier ◽  
Zhu Guo Li

Cloud Computing is not a revolution; it’s an evolution of computer science and technology emerging by leaps and bounds, in order to merge all computer science tools and technologies. Cloud Computing technology is hottest to do research and explore new horizons of next generations of Computer Science. There are number of cloud services providers (Amazon EC2), Rackspace Cloud, Terremark and Google Compute Engine) but still enterprises and common users have a number of concerns over cloud service providers. Still there is lot of weakness, challenges and issues are barrier for cloud service providers in order to provide cloud services according to SLA (Service Level agreement). Especially, service provisioning according to SLAs is core objective of each cloud service provider with maximum performance as per SLA. We have identified those challenges issues, as well as proposed new methodology as “SLA (Service Level Agreement) Driven Orchestration Based New Methodology for Cloud Computing Services”. Currently, cloud service providers are using “orchestrations” fully or partially to automate service provisioning but we are trying to integrate and drive orchestration flows from SLAs. It would be new approach to provision cloud service and deliver cloud service as per SLA, satisfying QoS standards.


2014 ◽  
Vol 701-702 ◽  
pp. 1106-1111 ◽  
Author(s):  
Xin Zheng Zhang ◽  
Ya Juan Zhang

As information and processes are migrating to the cloud, Cloud Computing is drastically changing IT professionals’ working environment. Cloud Computing solves many problems of conventional computing. However, the new technology has also created new challenges such as data security, data ownership and trans-code data storage. We discussed about Cloud computing security issues, mechanism, challenges that Cloud service providers and consumers face during Cloud engineering. Based on concerning of security issues and challenges, we proposed several encryption algorithms to make cloud data secure and invulnerable. We made comparisons among DES, AES, RSA and ECC algorithms to find combinatorial optimization solutions, which fit Cloud environment well for making cloud data secure and not to be hacked by attackers.


The proliferation of Cloud Computing has opened new and attractive offerings for consumers. Cloud Service Providers promote and market packages of cloud computing services that cater to diverse opportunities and user applications. While this has obvious advantages, there are certain factors that are a cause for concern. Monitoring the underlying infrastructure that supports the entire fabric of cloud computing is an aspect that requires a great deal of attention. The aspect of monitoring takes on a great deal of significance when performance and robustness of cloud service on offer is taken into consideration. Although research has been conducted into various cloud computing monitoring techniques, there is scope and room yet for an integrated cloud monitoring solution that can fulfill the requirements of cloud administrators to ensure optimal performance of the underlying infrastructure of a cloud computing network. In this paper, we propose a unified monitoring model that is essentially a composite framework involving hardware and network layers. Studies conducted during our experiments suggest that our unified cloud monitoring approach can significantly aid in reducing overall carbon emissions while helping meeting compliance and audit norms by ensuring that the underlying cloud infrastructure is monitored closely


Author(s):  
Nur Widiyasono ◽  
Imam Riadi ◽  
Ahmad Luthfie

<p>Cloud services are offered by many cloud service providers, but in for large companies generally are build  by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.</p>


2018 ◽  
pp. 1624-1656
Author(s):  
G. M. Siddesh ◽  
K. G. Srinivasa ◽  
L. Tejaswini

Security in cloud is to be increased to strengthen the confidence and trust of cloud service consumers. In the upcoming years, the scientific research and education teams will have to investigate finding new ways to handle the issue of cloud security. This chapter discusses the major threats and their impact on clouds, security measures to handle the attacks in clouds, security as a service in research and education, and steps to enhance security feature in clouds.


Sign in / Sign up

Export Citation Format

Share Document