scholarly journals Privacy and Security Aware Cloud Storage using Double Cryptography Method

Cloud computing, a remote technology that enlightens with several on-demand services. Cloud computing developed with a principle of sharing resources available as per the company needs. Prominent cloud services utilized today are networking, storage, servers, software’s, etc. Cloud computing's distributed nature and advanced features create a remarkable footprint in the IT field. It is fair to say without cloud technology the next technical era can't exist. However the cloud computing widely spaced, simultaneous some serious challenges still exists. As per the real-time scenario, there are several challenges still alive, but among which privacy and security are prominent to take concern. Among which the trustworthiness of third-party providers increases the attention on developing an enhanced cloud system. In this paper, we proposed an improved double encryption-decryption (IDED) method for a secure cloud system. The main intention of the proposed work is increasing the privacy and security for the cloud users. The principle applied to the proposed methodology is double encryption and double decryption. The encrypted files are decrypted to view the original data using the keys. These keys are available only to the authenticated users which ensures the system's privacy and security in all manner. The mechanism is processed under the query system of sending and response from the data authority

Author(s):  
Jitendra Singh ◽  
Vikas Kumar

Cloud computing is expanding in reach, with its utility-based features and enhanced agility. Still, there is a big concern about the privacy and security of the data. Because of these concerns, third-party cloud users are employing the cloud only for less sensitive data, and the advantage of cloud computing is not fully harnessed. In order to ensure the privacy and security of data, proper compliance and regulatory standards become very important for the cloud domain. Although a number of such standards exist for the traditional computing, they must be modified for their wider adoption to the cloud platforms. This chapter considers the worldwide available standards in the technical and non-technical categories for wider coverage of the cloud platforms. In the technical category, security standards presently followed by cloud computing have been discussed, while in the non-technical category, privacy and accounting standards like HIPPA, SAS 70, GAPP, etc. have been considered.


2018 ◽  
pp. 856-882
Author(s):  
Indira K. ◽  
Vennila A.

The cloud computing is the term which have different services such as storage, servers, and applications which are delivered to an organization's computers and devices through the Internet for both technical and economical reasons. However they are many potential cloud users are reluctant to move to cloud computing on a large scale due to the unaddressed security issues present in cloud computing and so is increased the complexity of the infrastructures behind these services. So in this chapter, the challenges faced on both auditing and monitoring is identified. Accordingly it considers an investigation which uses to produce the major security audit issues present in cloud computing today based on a framework for security subsystems. To overcome the standards of auditing and process of auditing is briefly explained. There are also many platforms that provide cloud services also those domains are listed out with domain based monitoring process.


Author(s):  
Indira K. ◽  
Vennila A

The cloud computing is the term which have different services such as storage, servers, and applications which are delivered to an organization's computers and devices through the Internet for both technical and economical reasons. However they are many potential cloud users are reluctant to move to cloud computing on a large scale due to the unaddressed security issues present in cloud computing and so is increased the complexity of the infrastructures behind these services. So in this chapter, the challenges faced on both auditing and monitoring is identified. Accordingly it considers an investigation which uses to produce the major security audit issues present in cloud computing today based on a framework for security subsystems. To overcome the standards of auditing and process of auditing is briefly explained. There are also many platforms that provide cloud services also those domains are listed out with domain based monitoring process.


Sensors ◽  
2018 ◽  
Vol 18 (8) ◽  
pp. 2664 ◽  
Author(s):  
Luis Belem Pacheco ◽  
Eduardo Pelinson Alchieri ◽  
Priscila Mendez Barreto

The use of Internet of Things (IoT) is rapidly growing and a huge amount of data is being generated by IoT devices. Cloud computing is a natural candidate to handle this data since it has enough power and capacity to process, store and control data access. Moreover, this approach brings several benefits to the IoT, such as the aggregation of all IoT data in a common place and the use of cloud services to consume this data and provide useful applications. However, enforcing user privacy when sending sensitive information to the cloud is a challenge. This work presents and evaluates an architecture to provide privacy in the integration of IoT and cloud computing. The proposed architecture, called PROTeCt—Privacy aRquitecture for integratiOn of internet of Things and Cloud computing, improves user privacy by implementing privacy enforcement at the IoT devices instead of at the gateway, as is usually done. Consequently, the proposed approach improves both system security and fault tolerance, since it removes the single point of failure (gateway). The proposed architecture is evaluated through an analytical analysis and simulations with severely constrained devices, where delay and energy consumption are evaluated and compared to other architectures. The obtained results show the practical feasibility of the proposed solutions and demonstrate that the overheads introduced in the IoT devices are worthwhile considering the increased level of privacy and security.


Web Services ◽  
2019 ◽  
pp. 712-727
Author(s):  
Fawzy Soliman

Cloud systems could help companies to optimize the structure and operation of supply chain and improve organizational performance into a higher level. In this chapter, the advantages and basic operation methods of cloud computing are analyzed, and the essential factors that contribute to the success of the cloud system are evaluated through some business examples. Supply chain firms rely on cloud system to share resources and to achieve integration through the Internet. Cloud systems could transform customer relationship and internal operation to achieve sustainable competitive advantages. Cloud services are providing the ability to share information to the supply chain at any time anywhere. This chapter explores the relationship between supply chain organization and cloud computing. This chapter also discusses the benefits and advantage to evaluate of cloud system in successful factors.


Author(s):  
Shailendra Singh ◽  
Sunita Gond

As this is the age of technology and every day we are receiving the news about growing popularity of internet and its applications. Cloud computing is an emerging paradigm of today that is rapidly accepted by the industry/organizations/educational institutions etc. for various applications and purpose. As computing is related to distributed and parallel computing which are from a very long time in the market, but today is the world of cloud computing that reduces the cost of computing by focusing on personal computing to data center computing. Cloud computing architecture and standard provide a unique way for delivering computation services to cloud users. It is having a simple API (Application Platform Interface) to users for accessing storage, platform and hardware by paying-as-per-use basis. Services provided by cloud computing is as same as other utility oriented services like electricity bill, water, telephone etc. over shared network. There are many cloud services providers in the market for providing services like Google, Microsoft, Manjrasoft Aneka, etc.


Author(s):  
Rola Motawie ◽  
Mahmoud M. El-Khouly ◽  
Samir Abou El-Seoud

Cloud is a pool of computing resources which are distributed among cloud users. Cloud computing has many benefits like scalability, flexibility, cost savings, reliability, maintenance and mobile accessibility. Since cloud-computing technology is growing day by day, it comes with many security problems. Securing the data in the cloud environment is most critical challenges which act as a barrier when implementing the cloud. There are many new concepts that cloud introduces, such as resource sharing, multi-tenancy, and outsourcing, create new challenges for the security community. In this work, we provide a comparable study of cloud computing privacy and security concerns. We identify and classify known security threats, cloud vulnerabilities, and attacks.


2014 ◽  
Vol 5 (2) ◽  
pp. 20-43 ◽  
Author(s):  
Kristian Beckers ◽  
Isabelle Côté ◽  
Ludger Goeke ◽  
Selim Güler ◽  
Maritta Heisel

Cloud computing systems offer an attractive alternative to traditional IT-systems, because of economic benefits that arise from the cloud's scalable and flexible IT-resources. The benefits are of particular interest for SME's. The reason is that using Cloud Resources allows an SME to focus on its core business rather than on IT-resources. However, numerous concerns about the security of cloud computing services exist. Potential cloud customers have to be confident that the cloud services they acquire are secure for them to use. Therefore, they have to have a clear set of security requirements covering their security needs. Eliciting these requirements is a difficult task, because of the amount of stakeholders and technical components to consider in a cloud environment. Therefore, the authors propose a structured, pattern-based method supporting eliciting security requirements and selecting security measures. The method guides potential cloud customers to model the application of their business case in a cloud computing context using a pattern-based approach. Thus, a potential cloud customer can instantiate our so-called Cloud System Analysis Pattern. Then, the information of the instantiated pattern can be used to fill-out our textual security requirements patterns and individual defined security requirement patterns, as well. The presented method is tool-supported. Our tool supports the instantiation of the cloud system analysis pattern and automatically transfers the information from the instance to the security requirements patterns. In addition, they have validation conditions that check e.g., if a security requirement refers to at least one element in the cloud. The authors illustrate their method using an online-banking system as running example.


2019 ◽  
Vol 16 (9) ◽  
pp. 3989-3994
Author(s):  
Jaspreet Singh ◽  
Deepali Gupta ◽  
Neha Sharma

Nowadays, Cloud computing is developing quickly and customers are requesting more administrations and superior outcomes. In the cloud domain, load balancing has turned into an extremely intriguing and crucial research area. Numbers of algorithms were recommended to give proficient mechanism for distributing the cloud user’s requests for accessing pool cloud resources. Also load balancing in cloud should provide notable functional benefits to cloud users and at the same time should prove out to be eminent for cloud services providers. In this paper, the pre-existing load balancing techniques are explored. The paper intends to provide landscape for classification of distinct load balancing algorithms based upon the several parameters and also address performance assessment bound to various load balancing algorithms. The comparative assessment of various load balancing algorithms will helps in proposing a competent load balancing technique for intensify the performance of cloud data centers.


The introduction of cloud computing has revolutionized business and technology. Cloud computing has merged technology and business creating an almost indistinguishable framework. Cloud computing has utilized various techniques that have been vital in reshaping the way computers are used in business, IT, and education. Cloud computing has replaced the distributed system of using computing resources to a centralized system where resources are easily shared between user and organizations located in different geographical locations. Traditionally the resources are usually stored and managed by a third-party, but the process is usually transparent to the user. The new technology led to the introduction of various user needs such as to search the cloud and associated databases. The development of a selection system used to search the cloud such as in the case of ELECTRE IS and Skyline; this research will develop a system that will be used to manage and determine the quality of service constraints of these new systems with regards to networked cloud computing. The method applied will mimic the various selection system in JAVA and evaluate the Quality of service for multiple cloud services. The FogTorch search tool will be used for quality service management of three cloud services.


Sign in / Sign up

Export Citation Format

Share Document