scholarly journals A Well-Organized Model in Cloud Computing Platform for Data Accessing

Cloud Computing is a trending technology. The main benefit is user will pay only for the resources which have been utilized in the cloud services. Data which are stored in cloud can be accessed by the people from anywhere in the world using internet connection. Because of difficulties in data access and lack of security, in the current database system people are moving to Cloud Service Provider (CSP). Network backup and recovery method are used in CSP so there is no data loss in case of hardware failure. In this paper, we planned an efficient model in cloud computing for data accessing which will reduce the search time of providing the public key of the data owner. Not only data storage and security, data access also plays an important role to consume less time. So, in this proposed system we are going to increase the time efficiency for the data accessing.

2020 ◽  
Author(s):  
Dinesh Arpitha R ◽  
Sai Shobha R

Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements but it possesses a new security risk towards correctness of data stored at cloud. The data storage in the cloud has been a promising issue in these days. This is due to the fact that the users are storing their valuable data and information in the cloud. The users should trust the cloud service providers to provide security for their data. Cloud storage services avoid the cost storage services avoids the cost expensive on software, personnel maintains and provides better performance less storage cost and scalability, cloud services through internet which increase their exposure to storage security vulnerabilities however security is one of the major drawbacks that preventing large organizations to enter into cloud computing environment. This work surveyed on several storage techniques and this advantage and its drawbacks.


2014 ◽  
Vol 989-994 ◽  
pp. 5498-5503
Author(s):  
Chun Xiao Wang ◽  
Ying Guo ◽  
Xiu Gang Guo

Based on the research in cross-regional resource scheduling and massive data storage, the article built public service platform including IaaS, PaaS and SaaS. It provided all kinds of management software and business software for middle size enterprise users, and provided the development, testing, deployment platform for software vendors, and provided unified resource management, monitoring and maintenance for platform operators which finally become cloud service platform to support enterprise management and software development lifecycle. This helps to form a self-loop and self-development cloud computing ecosystem, to form the linkage of cloud services production, cloud services consumption and cloud service management, and to provide comprehensive information support for the growth and development of middle size enterprise.


Author(s):  
Pappu Sowmya ◽  
R Kumar

Cloud computing is one of the trending technologies that provide boundless virtualized resources to the internet users as an important services through the internet, while providing the privacy and security. By using these cloud services, internet users get many parallel computing resources at low cost. It predicted that till 2016, revenues from the online business management spent $4 billion for data storage. Cloud is an open source platform structure, so it is having more chances to malicious attacks. Privacy, confidentiality, and security of stored data are primary security challenges in cloud computing. In cloud computing, ‘virtualization’ is one of the techniques dividing memory into different blocks. In most of the existing systems there is only single authority in the system to provide the encrypted keys. To fill the few security issues, this paper proposed a novel authenticated trust security model for secure virtualization system to encrypt the files. The proposed security model achieves the following functions: 1) allotting the VSM(VM Security Monitor) model for each virtual machine; 2) providing secret keys to encrypt and decrypt information by symmetric encryption.The contribution is a proposed architecture that provides a workable security that a cloud service provider can offer to its consumers. Detailed analysis and architecture design presented to elaborate security model.


2021 ◽  
Vol 2083 (4) ◽  
pp. 042077
Author(s):  
Tongtong Xu ◽  
Lei Shi

Abstract Cloud computing is a new way of computing and storage. Users do not need to master professional skills, but can enjoy convenient network services as long as they pay according to their own needs. When we use cloud services, we need to upload data to cloud servers. As the cloud is an open environment, it is easy for attackers to use cloud computing to conduct excessive computational analysis on big data, which is bound to infringe on others’ privacy. In this process, we inevitably face the challenge of data security. How to ensure data privacy security in the cloud environment has become an urgent problem to be solved. This paper studies the big data security privacy protection based on cloud computing platform. This paper starts from two aspects: implicit security mechanism and display security mechanism (encryption mechanism), so as to protect the security privacy of cloud big data platform in data storage and data computing processing.


2015 ◽  
Vol 15 (1) ◽  
pp. 46-54
Author(s):  
K. Govinda ◽  
E. Sathiyamoorthy

Abstract Cloud computing has become a victorious archetype for data storage, as well as for computation purposes. Greater than ever it concerns user’s privacy, so that data security in a cloud is increasing day by day. Ensuring security and privacy for data organization and query dispensation in the cloud is important for superior and extended uses of cloud based technologies. Cloud users can barely have the full benefits of cloud computing if we can ensure the real user’s privacy and his data security concerns this approach along with storing thin-skinned personal information in databases and software spread around the cloud. There are numerous service suppliers in WWW (World Wide Web), who can supply each service as a cloud. These cloud services will switch over data with a supplementary cloud, so that when the data is exchanged between the clouds, the problem of confidentiality revelation exists. So the privacy revelation problem concerning a person or a corporation is unavoidably open when releasing or data distributing in the cloud service. Confidentiality is a significant issue in any cloud computing environment. In this paper we propose and implement a mechanism to maintain privacy and secure data storage for group members or a community in cloud environment.


Author(s):  
Zainab Salih Ageed ◽  
Rowaida Khalil Ibrahim ◽  
Mohammed A. M. Sadeeq

The ability to provide massive data storage, applications, platforms plus many other services leads to make the number of clouds services providers been increased. Providing different types of services and resources by various providers implies to get a high level of complexity. This complexity leads to face many challenges related to security, reliability, discovery, service selection, and interoperability. In this review, we focus on the use of many technologies and methods for utilizing the semantic web and ontology in cloud computing and distributed system as a solution for these challenges. Cloud computing does not have an own search engine to satisfy the needs of the providers of the cloud service. Using ontology enhances the cloud computing self-motivated via an intelligent framework of SaaS and consolidating the security by providing resources access control. The use RDF and OWL semantic technologies in the modeling of a multi-agent system are very effective in increases coordination the interoperability. One of the most efficient proposed frameworks is building cloud computing marketplace that collects the consumer's requirements of cloud services provider and managing these needs and resources to provide quick and reliable services.


2021 ◽  
Author(s):  
Andy E Williams

The resources that can be made available on-demand through cloud computing are continually increasing. One potential addition is General Collective Intelligence or GCI, which has been defined as a platform that combines individuals into a single intelligence with the potential for exponentially greater general problem-solving ability (intelligence) than any individual. The concept of a cognitive computing platform involves leveraging GCI to orchestrate cooperation between any entities that are required in order to create the capacity to maximize any collective outcome targeted. Rather than executing programming code, a cognitive computing platform must execute functional models in which each of the functional operations composing that model is implemented in some programming language. All services that run on the cloud, as well as the cloud itself, can potentially be offered as cognitive computing platforms. Where current cloud computing limits customers to a particular cloud service vendor, cloud computing as a cognitive computing platform has the potential to completely decouple users from any such dependencies, while at the same time creating the potential for an exponential increase in demand for cloud services from those vendors that participate by decoupling their services in this way.


2020 ◽  
Author(s):  
Mueen Uddin ◽  
Anjum Khalique ◽  
Awais Khan Jumani

This paper reviews, discusses, and highlights some of the standard cloud computing vulnerabilities primarily related to virtualization platforms and their implementations while outsourcing services and resources to different end-users and business enterprises. Furthermore, we provide Blockchain-enabled solutions for virtualized cloud computing platform involving both the end-users as well as cloud service providers (CSP) to address and solve different security and privacy-related vulnerabilities using blockchain-enabled solutions to improve their cloud services and resource provisioning facilities.


2016 ◽  
Vol 2 (1) ◽  
Author(s):  
Marco Battarra ◽  
Marco Consonni ◽  
Samuele De Domenico ◽  
Andrea Milani

This paper describes our work on STORM CLOUDS[1], a project with the main objective of migrating smart-city services, that Public Authorities (PAs) currently provided using traditional Information Technology, to a cloud-based environment. Our organization was in charge of finding the technical solutions, so we designed and implemented a cloud computing solution called Storm Clouds Platform (SCP), for that purpose. In principle, the applications we ported could run on a public cloud service, like Amazon Web ServicesTM[2] or Microsoft® Azure[3], that provide computational resources on a pay-per-use paradigm. However, these solutions have disadvantages due to their proprietary nature: vendor lock-in is one of the issues but other serious problems are related to the lack of full control on how data and applications are processed in the cloud. As an example, when using a public cloud, the users of the cloud services have very little control on the location where applications run and data are stored, if there is any. This is identified as one of the most important obstacles in cloud computing adoption, particularly in applications manage personal data and the application provider has legal obligation of preserving end user privacy[4]. This paper explains how we faced the problem and the solutions we found. We designed a cloud computing platform — completely based on open software components — that can be used for either implementing private clouds or for porting applications to public clouds.


Author(s):  
K Dinesh Kumar ◽  
E Umamaheswari

Cloud computing is one of the trending technologies that provide boundless virtualized resources to the internet users as an important services through the internet while providing the privacy and security. Using these cloud services, internet users get many parallel computing resources at low cost. It predicted that till 2016, revenues from the online business management spent $4 billion for data storage. Cloud is an open-source platform structure, so it is having more chances to malicious attacks. Privacy, confidentiality, and security of stored data are primary security challenges in cloud computing. In cloud computing, “virtualization” is one of the techniques dividing memory into different blocks. In most of the existing systems, there is only single authority in the system to provide the encrypted keys. To fill the few security issues, this paper proposed a novel authenticated trust security model for secure virtualization system to encrypt the files. The proposed security model achieves the following functions: (1) allotting the VM security monitor model for each virtual machine and (2) providing secret keys to encrypt and decrypt information by symmetric encryption.The contribution is a proposed architecture that provides a workable security that a cloud service provider can offer to its consumers. Detailed analysis and architecture design presented to elaborate security model. 


Sign in / Sign up

Export Citation Format

Share Document