scholarly journals Risk Factors And Security Issues In Various Cloud Storage Operations

Presently a days, cloud computing is a rising and method for registering in software engineering. Cloud computing is an arrangement of assets and administrations that are offered by the system or web. Distributed computing broadens different figuring methods like framework registering, appropriated processing. Today distributed computing is utilized as a part of both mechanical, research and scholastic fields. Cloud encourages its clients by giving virtual assets through web. As the field of distributed computing is spreading the new procedures are producing for cloud security. This expansion in distributed computing condition likewise expands security challenges for cloud designers. Customers or Users of cloud spare their information in the cloud subsequently the absence of security in cloud can lose the client's trust. In this paper we will discuss about on cloud database and information mining security issues in different viewpoints like multi-occupancy, flexibility, unwavering quality, accessibility on different divisions like modern and research regions, and furthermore examine existing security methods and methodologies for a safe cloud condition through enormous information ideas. What's more, this paper additionally study different parts of mechanical, training and research areas. This paper will empower scientists and experts to think about various security dangers, models and apparatuses proposed in existing distributed storage.

2017 ◽  
Vol 7 (1.1) ◽  
pp. 607
Author(s):  
S Naveen Kumar ◽  
K Nirmala

Presently a-days Cloud registering is rising field in light of its Performance, high accessibility, easily. Information store is principle             future that cloud benefit gives to the huge association to store tremendous measure of information. Yet at the same time numerous              associations are not prepared to execute distributed computing innovation since absence of security. So the principle goal of this paper is to understand the security issues and to anticipate unapproved access in distributed storage, it should be possible with the assistance of an effective validation strategy by utilizing cross breed verification calculation to give security of the information in cloud and guarantee amending code to keep up the nature of administration. In any case, solid client confirmation that confines illicit access to the               administration giving servers is the foremost prerequisite for securing cloud condition  


2018 ◽  
Vol 7 (2.7) ◽  
pp. 1017
Author(s):  
Ramesh Kumar Mojjad ◽  
Dr D.B.K.Kamesh ◽  
K B.K.S. Durga ◽  
N Sainath ◽  
A Kavitha

Distributed computing has waved the technological era in the year 2013 at a meeting in San Francisco, with sellers giving a lot of items and administrations that outfit IT which manages to convey request to cloud turmoil. Distributed computing pattern is expanding quickly for making the distributed computing well verse. The initial step for the association is to distinguish correct zone where the cloud issues exist. Surprisingly, the role of distributed computing has uplifted the era of business and government issues which lead to challenges towards security. The role of cloud technology improvements lead to display give business – supporting innovations in a proficient manner than any time in recent memory .the move from server to benefit based innovation got an intense change figuring innovation. However these improvements have made novel security challenges, including certain  issues whose  impact is a rising.[1] This paper displays a diagram and investigation of distributed computing, with a few security dangers, security issues, as of now utilized cloud innovations and security arrangements.  


2020 ◽  
Vol 13 (3) ◽  
pp. 313-318 ◽  
Author(s):  
Dhanapal Angamuthu ◽  
Nithyanandam Pandian

<P>Background: The cloud computing is the modern trend in high-performance computing. Cloud computing becomes very popular due to its characteristic of available anywhere, elasticity, ease of use, cost-effectiveness, etc. Though the cloud grants various benefits, it has associated issues and challenges to prevent the organizations to adopt the cloud. </P><P> Objective: The objective of this paper is to cover the several perspectives of Cloud Computing. This includes a basic definition of cloud, classification of the cloud based on Delivery and Deployment Model. The broad classification of the issues and challenges faced by the organization to adopt the cloud computing model are explored. Examples for the broad classification are Data Related issues in the cloud, Service availability related issues in cloud, etc. The detailed sub-classifications of each of the issues and challenges discussed. The example sub-classification of the Data Related issues in cloud shall be further classified into Data Security issues, Data Integrity issue, Data location issue, Multitenancy issues, etc. This paper also covers the typical problem of vendor lock-in issue. This article analyzed and described the various possible unique insider attacks in the cloud environment. </P><P> Results: The guideline and recommendations for the different issues and challenges are discussed. The most importantly the potential research areas in the cloud domain are explored. </P><P> Conclusion: This paper discussed the details on cloud computing, classifications and the several issues and challenges faced in adopting the cloud. The guideline and recommendations for issues and challenges are covered. The potential research areas in the cloud domain are captured. This helps the researchers, academicians and industries to focus and address the current challenges faced by the customers.</P>


In cloud computing disseminated assets are shared by means of system in open condition. Subsequently client can without much of a stretch access their information from anyplace. Simultaneously exist protection and security problems because of numerous causes. Initial one is emotional improvement in system advances. Another is expanded interest for computing assets, which make numerous associations to reappropriate their information stockpiling. So there is a requirement for secure cloud stockpiling administration in open cloud condition where the supplier isn't a confided in one. Our research tends to various information security and protection assurance problems in a cloud computing condition and suggests a technique for giving diverse security administrations like validation, approval and classification alongside checking in postponement. 128 piece Advanced Cryptograph Standard (AES) is utilized to increment information security and classification. In this supported methodology information is encoded utilizing AES and afterward transferred on a cloud. The supported model uses Short Message Service (SMS) ready instrument with keeping away from unapproved access to client information.


Author(s):  
MD. Jareena Begum ◽  
B. Haritha

Cloud computing assumes an essential job in the business stage as figuring assets are conveyed on request to clients over the Internet. Distributed computing gives on-request and pervasive access to a concentrated pool of configurable assets, for example, systems, applications, and administrations This guarantees the vast majority of undertakings and number of clients externalize their information into the cloud worker. As of late, secure deduplication strategies have bid extensive interests in the both scholastic and mechanical associations. The primary preferred position of utilizing distributed storage from the clients' perspective is that they can diminish their consumption in buying and keeping up capacity framework. By the creating data size of appropriated registering, a decline in data volumes could help providers reducing the costs of running gigantic accumulating system and saving power usage. So information deduplication strategies have been proposed to improve capacity effectiveness in cloud stockpiles. Also, thinking about the assurance of delicate documents. Before putting away the records into the cloude stockpile they frequently utilize some encryption calculations to ensure them.In this paper we propose stratagies for secure information deduplication


Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Zhihao Yu ◽  
Liang Song ◽  
Linhua Jiang ◽  
Omid Khold Sharafi

Purpose Security is the most important issue in Internet of Things (IoT)-based smart cities and blockchain (BC). So, the present paper aims to detect and organize the literature regarding security in the IoT-based smart cities and BC context. It also proposes an agenda for future research. Therefore, the authors did a statistical review of security in IoT and BC in smart cities. The present investigation aims to determine the principal challenges and disturbances in IoT because of the BC adoption, the central BC applications in IoT-based smart cities and the BC future in IoT-based smart cities. Design/methodology/approach IoT) has a notable influence on modernizing and transforming the society and industry for knowledge digitizing. Therefore, it may be perceived and operated in real time. The IoT is undergoing exponential development in industry and investigation. Still, it contains some security and privacy susceptibilities. Naturally, the research community pays attention to the security and privacy of the IoT. Also, the academic community has put a significant focus on BC as a new security project. In the present paper, the significant mechanisms and investigations in BC ground have been checked out systematically because of the significance of security in the IoT and BC in smart cities. Electronic databases were used to search for keywords. Totally, based on different filters, 131 papers have been gained, and 17 related articles have been obtained and analyzed. The security mechanisms of BC in IoT-based smart cities have been ranked into three main categories as follows, smart health care, smart home and smart agriculture. Findings The findings showed that BC’s distinctive technical aspects might impressively find a solution for privacy and security problems encountering the IoT-based smart cities development. They also supply distributed storage, transparency, trust and other IoT support to form a valid, impressive and secure distributed IoT network and provide a beneficial guarantee for IoT-based smart city users’ security and privacy. Research limitations/implications The present investigation aims to be comprehensive, but some restrictions were also observed. Owing to the use of some filters for selecting the original papers, some complete works may be excluded. Besides, inspecting the total investigations on the security topic in BC and the IoT-based smart cities is infeasible. Albeit, the authors attempt to introduce a complete inspection of the security challenges in BC and the IoT-based smart cities. BC includes significant progress and innovation in the IoT-based smart cities’ security domain as new technology. Still, it contains some deficiencies as well. Investigators actively encounter the challenges and bring up persistent innovation and inspection of related technologies in the vision of the issues available in diverse application scenarios. Practical implications The use of BC technology in finding a solution for the security issues of the IoT-based smart cities is a research hotspot. There is numerable literature with data and theoretical support despite the suggestion of numerous relevant opinions. Therefore, this paper offers insights into how findings may guide practitioners and researchers in developing appropriate security systems dependent upon the features of IoT-based smart city systems and BC. This paper may also stimulate further investigation on the challenge of security in BC and IoT-based smart cities. The outcomes will be of great value for scholars and may supply sights into future investigation grounds in the present field. Originality/value As the authors state according to their knowledge, it is the first work using security challenges on BC and IoT-based smart cities. The literature review shows that few papers discuss how solving security issues in the IoT-based smart cities can benefit from the BC. The investigation suggests a literature review on the topic, recommending some thoughts on using security tools in the IoT-based smart cities. The present investigation helps organizations plan to integrate IoT and BC to detect the areas to focus. It also assists in better resource planning for the successful execution of smart technologies in their supply chains.


2018 ◽  
Vol 7 (4.6) ◽  
pp. 13
Author(s):  
Mekala Sandhya ◽  
Ashish Ladda ◽  
Dr. Uma N Dulhare ◽  
. . ◽  
. .

In this generation of Internet, information and data are growing continuously. Even though various Internet services and applications. The amount of information is increasing rapidly. Hundred billions even trillions of web indexes exist. Such large data brings people a mass of information and more difficulty discovering useful knowledge in these huge amounts of data at the same time. Cloud computing can provide infrastructure for large data. Cloud computing has two significant characteristics of distributed computing i.e. scalability, high availability. The scalability can seamlessly extend to large-scale clusters. Availability says that cloud computing can bear node errors. Node failures will not affect the program to run correctly. Cloud computing with data mining does significant data processing through high-performance machine. Mass data storage and distributed computing provide a new method for mass data mining and become an effective solution to the distributed storage and efficient computing in data mining. 


2021 ◽  
Vol 10 (1) ◽  
pp. 13-17
Author(s):  
S. Ravichandran ◽  
J. Sathiamoorthy

Distributed computing has been imagined as the cutting edge engineering of IT Enterprise. It moves the application programming and information bases to the incorporated enormous server farms, where the administration of the information and administrations may not be completely dependable. There are various security issues for distributed computing as it envelops numerous innovations including networks, information bases, working frameworks, virtualization, asset planning, exchange the board, load adjusting, simultaneousness control and memory the executives. Putting away information in an outsider's cloud framework causes genuine worry over information secrecy. Hence, security issues for a large number of these frameworks and advancements are material to distributed computing. We propose a key worker encryption conspire and incorporate it with a decentralized deletion code with the end goal that a safe conveyed stockpiling key framework is defined respectively.


As of late the Smartphone has encountered basic inventive movements yet in the meantime remains a low computational substance. Versatile distributed computing is one of the advancement basic in the present portable condition kept running by utilizing cell phones in cloud condition. Versatile distributed computing is a promising method to manage impediments of cell phones as far as battery utilization and capacity. Versatile Cloud Computing is the most basic fields with creating age of the present fast web utilizing and Mobile world close-by its uses it needs to goes facing a fragment of the issues. As the data is scattered preparing and getting to it with cell phones all the trade encounters the framework so it is powerless against strike.


2018 ◽  
Vol 3 (7) ◽  
pp. 74
Author(s):  
Mousumi Hasan Mukti ◽  
Sabina Zaman ◽  
Khalil Ahammad ◽  
Chowdhury Shahriar Muzammel

Cloud computing is being considered as a revolutionary technique in the field of enterprise hardware and software design and development. As the popularity of cloud computing is increasing day by day and it’s the mostly used technique in the online and automated business system, so the security of the stored data in the cloud and the accessing method of the data through the network must be ensured. Among the various types of server and network authentication protocol Kerberos is the latest and robust network protocol. For authentication, Kerberos is badly in need of a hosted server which has to be remaining running 24*7 and the access point should be a single server (centralized authentication service). Besides these, if the single server gets down, there is possibility of more attack as Kerberos can’t function its job. These are the major hindrance of Kerberos. This research paper has tried to overcome these security issues, accessing and recovering data by using the RAID level. RAID 5 is the most appropriate technique to recover from failure and in correcting the erroneous data by minimizing redundancy as well as mitigating data loss. Also, RAID 5 can be used in case of distributed data. So, a model has been proposed to configure RAID 5 to ensure better security of cloud storage by overcoming the limitations of Kerberos.


Sign in / Sign up

Export Citation Format

Share Document