scholarly journals Cost Efficient Media Cloud Storage and Systematic Risks Involved in the Cloud Computing

Now a days data is growing at a very fast rate. Here data is referred not only with organizational data but the data also from non-organizational and social media, the data may be PDF’s, Photos, Audios, Videos, XML file etc. To earn more profit, the organizations tends to establish Cloud Storage with minimum establishment cost and high security. To provide robust and secure platform is the main aspect of cloud. Lots of algorithms have been designed and implementing for securing the data at cloud but the attack on 2014 on cloud in which 50 million accounts were hacked, shows that cloud is not fully secured. The main focus of this paper is to draw attention towards security issues and cost-efficient cloud and the solution for implementing it.

2018 ◽  
Vol 3 (7) ◽  
pp. 74
Author(s):  
Mousumi Hasan Mukti ◽  
Sabina Zaman ◽  
Khalil Ahammad ◽  
Chowdhury Shahriar Muzammel

Cloud computing is being considered as a revolutionary technique in the field of enterprise hardware and software design and development. As the popularity of cloud computing is increasing day by day and it’s the mostly used technique in the online and automated business system, so the security of the stored data in the cloud and the accessing method of the data through the network must be ensured. Among the various types of server and network authentication protocol Kerberos is the latest and robust network protocol. For authentication, Kerberos is badly in need of a hosted server which has to be remaining running 24*7 and the access point should be a single server (centralized authentication service). Besides these, if the single server gets down, there is possibility of more attack as Kerberos can’t function its job. These are the major hindrance of Kerberos. This research paper has tried to overcome these security issues, accessing and recovering data by using the RAID level. RAID 5 is the most appropriate technique to recover from failure and in correcting the erroneous data by minimizing redundancy as well as mitigating data loss. Also, RAID 5 can be used in case of distributed data. So, a model has been proposed to configure RAID 5 to ensure better security of cloud storage by overcoming the limitations of Kerberos.


Cloud Computing is a robust, less cost, and an effective platform for providing services. Nowadays, it is applied in various services such as consumer business or Information Technology (IT) carried over the Internet. This cloud computing has some risks of security because, the services which are required for its effective compilation is outsources often by the third party providers. This makes the cloud computing more hard to maintain and monitor the security and privacy of data and also its support. This sudden change in the process of storing data towards the cloud computing technology improved the concerns about different issues in security and also the various threats present in this cloud storage. In the concept of security in cloud storage, various threats and challenges are noted by recent researchers. Hence, an effective framework of providing security is required. The main aim of this paper is to analyze various issues in securing the cloud data threats present in the cloud storage and to propose a novel methodology to secure it. This paper also identifies the most crucial components that can be incorporated in the already existing security measures while designing the storage systems based on cloud. This study also provides us to identify all the available solutions for the challenges of security and privacy in cloud storage.


JEJAK ◽  
2021 ◽  
Vol 14 (2) ◽  
pp. 364-383
Author(s):  
Tri Andjarwati ◽  
Vieqi Rakhma Wulan

This research was conducted to find out what steps the government has taken in striving for society to be 'digital literate', what obstacles are faced and what digital forms have been implemented by MSME players and cooperatives that have gone digital. The method used is an integrative review. The results of this study found that the government has tried various ways to make SMEs and cooperatives more “digitally literate”, from infrastructure, training to collaborating with related institutions and companies that have gone online first in terms of systems of operational (transaction), marketing and also payment. Obstacles to infrastructure and available facilities as well as the lack of information and human resource skills in utilizing digital are challenges faced by the government, SMEs and cooperatives. Therefore, better coordination from up to bottom is needed so that understanding and utilization of digital can be distributed evenly. For MSMEs and cooperatives that have “go digital”, found that they are still at the basic and intermediate levels, while the platforms used are still in the sharing economy, e-commerce, social media, cloud computing and other digital platforms related to applications to simplify transactions and operations.


2019 ◽  
pp. 1440-1459
Author(s):  
Sara Usmani ◽  
Faiza Rehman ◽  
Sajid Umair ◽  
Safdar Abbas Khan

The novel advances in the field of Information Technology presented the people pleasure, luxuries and ease. One of the latest expansions in the Information Technology (IT) industry is Cloud Computing, a technology that uses the internet for storage and access of data. It is also known as on-demand computing. The end user can access personal data and applications anywhere any time with a device having internet. Cloud Computing has gained an enormous attention but it results in the issues of data security and privacy as the data is scattered on different machines in different places across the globe which is a serious threat to the technology. It has many advantages like flexibility, efficiency and scalability but many of the companies are hesitant to invest in it due to privacy concerns. In this chapter, the objective is to review the privacy and security issues in cloud storage of Big Data and to enhance the security in cloud environment so that end users can enjoy a trustworthy and reliable data storage and access.


Presently a days, cloud computing is a rising and method for registering in software engineering. Cloud computing is an arrangement of assets and administrations that are offered by the system or web. Distributed computing broadens different figuring methods like framework registering, appropriated processing. Today distributed computing is utilized as a part of both mechanical, research and scholastic fields. Cloud encourages its clients by giving virtual assets through web. As the field of distributed computing is spreading the new procedures are producing for cloud security. This expansion in distributed computing condition likewise expands security challenges for cloud designers. Customers or Users of cloud spare their information in the cloud subsequently the absence of security in cloud can lose the client's trust. In this paper we will discuss about on cloud database and information mining security issues in different viewpoints like multi-occupancy, flexibility, unwavering quality, accessibility on different divisions like modern and research regions, and furthermore examine existing security methods and methodologies for a safe cloud condition through enormous information ideas. What's more, this paper additionally study different parts of mechanical, training and research areas. This paper will empower scientists and experts to think about various security dangers, models and apparatuses proposed in existing distributed storage.


Author(s):  
Sara Usmani ◽  
Faiza Rehman ◽  
Sajid Umair ◽  
Safdar Abbas Khan

The novel advances in the field of Information Technology presented the people pleasure, luxuries and ease. One of the latest expansions in the Information Technology (IT) industry is Cloud Computing, a technology that uses the internet for storage and access of data. It is also known as on-demand computing. The end user can access personal data and applications anywhere any time with a device having internet. Cloud Computing has gained an enormous attention but it results in the issues of data security and privacy as the data is scattered on different machines in different places across the globe which is a serious threat to the technology. It has many advantages like flexibility, efficiency and scalability but many of the companies are hesitant to invest in it due to privacy concerns. In this chapter, the objective is to review the privacy and security issues in cloud storage of Big Data and to enhance the security in cloud environment so that end users can enjoy a trustworthy and reliable data storage and access.


Author(s):  
Chintan M. Bhatt

Cloud Computing changes the way Information Technology (IT) is expended and oversaw, promising enhanced cost efficiencies, quickened advancement, quicker time-to-market, and the capacity to scale applications of interest (Leighton, 2009). Users have started to explore new ways to interact with each other with the omnipresent nature of Social Networks and Cloud Computing. Facebook, YouTube, Orkut, Twitter, Flickr, Google+, Four Square, Pinterest, and the likes have distorted the way the Internet (Social Cloud) is being used. However, there is an absence of comprehension of protection and security issues of online networking. The protection and security of online networking should be explored, concentrated on and portrayed from different viewpoints (PCs, social, mental and so on). It is basic to distinguish security dangers and shield protection through constant and adaptable frameworks. Subsequent to there is no intelligent limits of the social networking, it is vital to consider the issue from a worldwide viewpoint as well.


2018 ◽  
Vol 7 (4.5) ◽  
pp. 329
Author(s):  
Sultan Ahmad ◽  
Dr. Mohammad Mazhar Afza

As Cloud Computing has become a new way to store information remotely. It makes possible for many companies to become paperless. IT people and companies can outsource their huge data by using this emerging technology. The major important characteristics of cloud computing are on-demand self-service, broad network access, resource pooling, rapid elasticity and measured services. These cloud computing characteristics are helpful for organizations to become agile. Also there are few serious problems like security, scalability, availability and interoperability which are associated with the above cloud computing characteristics. Providing a secure and efficient access and retrieval of the valuable data is a main concern of cloud computing technologies. It is very important to protect data and credentials of cloud client on the internet. Apart from these security issues of data, the deletion of data on cloud storage is also a very serious issue nowadays.  Once a cloud user wants to delete his data, it must be sure that data actually deleted from all cloud storage sources and there should not be remain any copy of data exist at anywhere in cloud storage anyway. In this paper, different existing data deletion and retrieval methods are studied, observed and analyzed. The importance and related challenges to assured data deletion on the cloud storage are explored.  


2017 ◽  
Vol 11 (1) ◽  
pp. 52-64
Author(s):  
Emmy Mugisha ◽  
Gongxuan Zhang ◽  
Maouadj Zine El Abidine ◽  
Mutangana Eugene

In cloud storage systems, data security management is becoming a serious matter. Big data and accessibility power is increasingly high, though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks toward the correctness of the data in cloud. As a result, cloud storage security has become one of the driving components in Cloud Computing regarding to data manipulation trust on both hosting center and on-transit. This paper proposes a TPM-Based Security over Multi-Cloud Storage Architecture (MCSA) grounded on Erasure Codes to apply root of trust based on hardware authenticity. An erasure codes such as Reed-Solomon, is capable of assuring stability in storage costs with best practice to guarantee data accessibility failure recovery. A Multi-Cloud Control Node manages other Control Nodes evolved in the cloud; this work introduces TPM-Based Security functions per Control node in the architecture. This concept will resolve a number of storage security issues, hence Cloud Computing adoption.


Sign in / Sign up

Export Citation Format

Share Document