Cloud Computing

Author(s):  
Shantanu Pal

In a cloud ecosystem, most of the data and software that users use reside on the remote server(s), which brings some new challenges for the system, especially security and privacy. At present, these security threats and attacks are the greatest concern for the service providers towards delivering a more secure cloud infrastructure. One of the major concerns is data security, implemented by the most effective means possible and the protection of stored data from unauthorized users and hackers. When considering these security issues, trust is one of the most important means to improve the system’s security and enable interoperability of current heterogeneous cloud computing platforms. The objective of this chapter is to discuss and understand the basic security and privacy challenges of a cloud computing environment as the security of cloud computing is the greatest challenge for delivering a safer cloud environment for both the service providers and the service customers. With this in mind, this chapter will introduce the risks and possible attacks in a cloud computing environment. The major goal is to specify the security risks and attacks and consider trust of cloud service users for delivering a safer and innovation business model.

2019 ◽  
pp. 992-1013
Author(s):  
Shivani Jaswal ◽  
Manisha Malhotra

Cloud computing is a rising paradigm in today's world. In this, users can send his or her request to any CSP, i.e., cloud service provider, of their choice. In return, the CSP reverts him back with that particular service. Now, while communicating from various two locations, the data transferred is not passed through that much amount of security and privacy as expected. So, there are lots of parameters in the environment that are taken care of while sending, receiving or just passing data over the network. This chapter presents various security issues that are underlying in cloud computing. This chapter has illustrated various issues such as Trust, Encryption, Authenticity, Confidentiality and Multi Tenancy. Also, some of the proposed solutions have also been discussed later in the chapter.


Author(s):  
Shivani Jaswal ◽  
Manisha Malhotra

Cloud computing is a rising paradigm in today's world. In this, users can send his or her request to any CSP, i.e., cloud service provider, of their choice. In return, the CSP reverts him back with that particular service. Now, while communicating from various two locations, the data transferred is not passed through that much amount of security and privacy as expected. So, there are lots of parameters in the environment that are taken care of while sending, receiving or just passing data over the network. This chapter presents various security issues that are underlying in cloud computing. This chapter has illustrated various issues such as Trust, Encryption, Authenticity, Confidentiality and Multi Tenancy. Also, some of the proposed solutions have also been discussed later in the chapter.


2016 ◽  
pp. 1053-1066 ◽  
Author(s):  
Nitin Nagar ◽  
Ugrasen Suman

Cloud computing is comprised of major demand from the every group of organization because of easy availability and cost effectiveness. The responsibilities of cloud service providers will become increasing more due to the great progression in every cloud computing deployment model (public, private and hybrid) and service models (SaaS, PaaS and IaaS). In this perspective, cloud computing faces multiple challenges, especially in cloud computing security at all levels (e.g., host, network, application and data levels). Authentication is the constantly the biggest concerned for IT industries to adopt cloud computing environment. The availability, performance, key logger attack, malicious insiders, outsider attacks and service disruptions explore (service hijacking) issues are the key research challenges in the cloud computing authentication level. In this aspect, traditional user name and password is not enough as a single factor (first factor). This paper has proposed a secure cloud computing framework which uses first factor as a crypt user name and password with the ATM pin as a second factor called M-pin. The proposed work focuses on a solution to the threats that are the major issues in the cloud adoption.


2020 ◽  
Vol 11 (2) ◽  
pp. 45-55
Author(s):  
Mimi Liza Abdul Majid ◽  
Suriayati Chuprat

Cloud computing has become an important alternative for solving big data processing. Nowadays, cloud service providers usually offer users a virtual machine with various combinations of prices. As each user has different circumstances, the problem of choosing the cost-minimized combination under a deadline constraint as well as user's preference is becoming more complex. This article is concerned with the investigation of adapting a user's preference policies for scheduling real-time divisible loads in a cloud computing environment. The workload allocation approach used in this research is using Divisible Load Theory. The proposed algorithm aggregates resources into groups and optimally distributes the fractions of load to the available resources according to user's preference. The proposed algorithm was evaluated by simulation experiments and compared with the baseline approach. The result obtained from the proposed algorithm reveals that a significant reduction in computation cost can be attained when the user's preferences are low priority.


2013 ◽  
Vol 13 (1) ◽  
pp. 46-60 ◽  
Author(s):  
N. Jeyanthi ◽  
N. Ch. S. N. Iyengar

Abstract Availability is one of the primary security issues in Cloud computing environment. The existing solutions that address the availability related issues can be applied in cloud computing environment, but because of their unique characteristics, such as on-demand self service, rapid elasticity, etc., there is a need to develop a detection mechanism that must satisfy the characteristics and an optimal profit for the Cloud Service Provider (CSP). A solution named Escape-on- Sight (EoS) algorithm is proposed in this paper that helps in detecting the attacker’s characteristics by analyzing traffic conditions stage by stage and protects the Data Center (DC) from malicious traffic. The profit analysis shows that the proposed approach has a reasonable chance of deploying EoS mechanism at DCs that are prone to DDoS attacks.


2014 ◽  
Vol 4 (4) ◽  
pp. 42-54 ◽  
Author(s):  
Nitin Nagar ◽  
Ugrasen Suman

Cloud computing is comprised of major demand from the every group of organization because of easy availability and cost effectiveness. The responsibilities of cloud service providers will become increasing more due to the great progression in every cloud computing deployment model (public, private and hybrid) and service models (SaaS, PaaS and IaaS). In this perspective, cloud computing faces multiple challenges, especially in cloud computing security at all levels (e.g., host, network, application and data levels). Authentication is the constantly the biggest concerned for IT industries to adopt cloud computing environment. The availability, performance, key logger attack, malicious insiders, outsider attacks and service disruptions explore (service hijacking) issues are the key research challenges in the cloud computing authentication level. In this aspect, traditional user name and password is not enough as a single factor (first factor). This paper has proposed a secure cloud computing framework which uses first factor as a crypt user name and password with the ATM pin as a second factor called M-pin. The proposed work focuses on a solution to the threats that are the major issues in the cloud adoption.


2018 ◽  
Vol 9 (1) ◽  
pp. 22-27
Author(s):  
Santosh Kumar Singh ◽  
P.K. Manjhi ◽  
R.K. Tiwari ◽  
V.R. Vadi

Cloud computing has formed the conceptual and infrastructural basis for tomorrow’s computing. The global computing infrastructure is rapidly moving towards cloud based architecture. While it is important to take advantages of cloud based computing by means of deploying it in diversified sectors, the security aspects in a cloud based computing environment remains at the core of interest. Cloud based services and service providers are being evolved which has resulted in a new business trend based on cloud technology. With the introduction of numerous cloud based services and geographically dispersed cloud service providers, sensitive information of different entities are normally stored in remote servers and locations with the possibilities of being exposed to unwanted parties in situations where the cloud servers storing those information are compromised. If security is not robust and consistent, the flexibility and advantages that cloud computing has to offer will have little credibility. This paper presents a review on the cloud computing concepts as well as security issues inherent within the context of cloud computing and cloud infrastructure.


Author(s):  
Priya Oberoi ◽  
Sumit Mittal ◽  
Rajneesh Kumar Gujral

Security is a critical factor for any of the computing platforms. Cloud computing is a new computing environment but still, its basic technology is the Internet. Thus, Cloud computing environment not only has the threats of its own but it is also prone to security issues of its underlying technology i.e. Internet. In this paper, the authors are proposing a secure routing framework viz. Authenticated Dynamic Routing in Cloud Networks (ADRCN) to mitigate the malicious insider attacks while maintaining the path integrity in the Clouds. Symmetric cryptography with hashing is used to maintain the integrity of the path between the source and destination. The purpose of ADRCN is to maintain the integrity of the path between the client and data center. If malicious insider tries to perform an attack between the client and the data center then it will be detected. This work aims to give a solution for detection and prevention of malicious insider attacks in Cloud-based environments.


Author(s):  
Yuan Zheng ◽  
Xiangbin Wen

With the continuous innovation and development of modern computer science and mobile Internet and other information technologies, artificial intelligence (AI) is not a new thing. It has been widely studied and applied in many fields, and it is very important for people in modern society. The research fields of artificial intelligence mainly include: deep learning, natural language processing, computer vision, intelligent robot, automatic programming, data mining and so on. All kinds of industrial production and daily life will bring a very important practical significance and far-reaching influence. The rapid development and improvement of AI have effectively changed the daily life of modern people and improved work efficiency, and promoted the vigorous and healthy development of human economic and social civilization and the progress of information technology. When widely used, traditional network information and big data processing technologies are difficult to adapt to its development needs. Only by closely combining cloud computing technology with other technologies can it play a better role and give full play to AI technology and its development. The enthusiasm and promotion of related application technologies have promoted the smooth progress of AI technology and related undertakings. With the development and improvement of cloud computing technology, more and more users tend to use the cloud to work. However, a large number of cloud service failures occurred, causing huge losses for enterprises and individuals. In order to prevent damage to the interests of enterprises and individuals, cloud service providers will provide high-quality services as much as possible. This paper aims to study the application of AI technology in cloud computing environment resources, research on the indicator of reliability, and propose a cloud service reliability verification method for the infrastructure-as-a-service layer. Experimental research shows that through the reliability detection method in this paper, users can easily and quickly obtain the reliability of the purchased cloud service, and can intuitively feel whether the performance of each server meets the promised situation in the cloud service provider’s SLA.


Author(s):  
Afaf Edinat ◽  
Rizik M. H. Al-Sayyed ◽  
Amjad Hudaib

Cloud computing is considered one of the most important techniques in the field of distributed computing which contributes to maintain increased scalability and flexibility in computer processing. This is achieved because it, using the Internet, provides different resources and shared services with minimum costs. Cloud service providers (CSPs) offer many different services to their customers, where the customers’ needs are met seeking the highest levels of quality at the lowest considerate prices. The relationship between CSPs and customers must be determined in a formal agreement, and to ensure how the QoS between them will be fulfilled, a clear Service Level Agreement (SLA) must be called for. Several previously-proposed models used in the literature to improve the QoS in the SLA for cloud computing and to face many of the challenges in the SLA are reviewed in this paper. We also addressed the challenges that are related to the violations of SLAs, and how overcoming them will enhance customers’ satisfaction. Furthermore, we proposed a model based on Deep Reinforcement Learning (DRL) and an enhanced DRL agent (EDRLA). In this model, and by optimizing the learning process in EDRLA, proposed agents would be able to have optimal CSPs by improving the learning process in EDRLA. This improvement will be reflected in the agent's performance and considerably affect it, especially in identifying cloud computing requirements based on the QoS metrics.


Sign in / Sign up

Export Citation Format

Share Document