CCCE

Author(s):  
Omer K. Jasim ◽  
Safia Abbas ◽  
El-Sayed M. El-Horbaty ◽  
Abdel-Badeeh M. Salem

Cloud computing technology is a modern emerging trend in the distributed computing technology that is rapidly gaining popularity in network communication field. Despite the advantages that the cloud platforms bolstered, it suffers from many security issues such as secure communication, consumer authentication, and intrusion caused by attacks. These security issues relevant to customer data filtering and lost the connection at any time. In order to address these issues, this chapter, introduces an innovative cloud computing cryptographic environment, that entails both Quantum Cryptography-as-service and Quantum Advanced Encryption Standard. CCCE poses more secure data transmission channels by provisioning secret key among cloud's instances and consumers. In addition, the QCaaS solves the key generation and key distribution problems that emerged through the online negotiation between the communication parties. It is important to note that the CCCE solves the distance limitation coverage problem that is stemmed from the quantum state property.

2019 ◽  
pp. 524-551
Author(s):  
Omer K. Jasim ◽  
Safia Abbas ◽  
El-Sayed M. El-Horbaty ◽  
Abdel-Badeeh M. Salem

Cloud computing technology is a modern emerging trend in the distributed computing technology that is rapidly gaining popularity in network communication field. Despite the advantages that the cloud platforms bolstered, it suffers from many security issues such as secure communication, consumer authentication, and intrusion caused by attacks. These security issues relevant to customer data filtering and lost the connection at any time. In order to address these issues, this chapter, introduces an innovative cloud computing cryptographic environment, that entails both Quantum Cryptography-as-service and Quantum Advanced Encryption Standard. CCCE poses more secure data transmission channels by provisioning secret key among cloud's instances and consumers. In addition, the QCaaS solves the key generation and key distribution problems that emerged through the online negotiation between the communication parties. It is important to note that the CCCE solves the distance limitation coverage problem that is stemmed from the quantum state property.


2018 ◽  
pp. 1027-1043
Author(s):  
Basudeo Singh ◽  
Jasmine K.S.

Mobile cloud computing is a technique or model in which mobile applications are built, powered and hosted using cloud computing technology. In Mobile Cloud computing we can store information regarding sender, data and receiver on cloud through mobile application. As we store more and more information on cloud by client, security issue will arise. This chapter presents a review on the mobile cloud computing concepts as well as security issues and vulnerabilities affecting Cloud Systems and the possible solutions available to such issues within the context of cloud computing. It also describes the pros and cons of the existing security strategy and also introduces the existing issues in cloud computing such as data integrity, data segregation, and security.


2016 ◽  
Vol 3 (1) ◽  
pp. 42
Author(s):  
Quanhui Ren ◽  
Hui Gao

<span style="color: black; line-height: 115%; font-family: 'Calibri','sans-serif'; font-size: 12pt; mso-fareast-font-family: Calibri; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;" lang="EN-US">In order to adapt to rapid development of network information technology, the application of cloud computing technology is increasingly widespread. However, the security problem in the cloud computing environment has not been effectively resolved. Currently, the research on this problem is getting more attention from the industry. In order to further investigate the information security issues of cloud computing environment, this article not only discusses the basic concept, characteristics and service model of cloud computing, but also focuses on the cloud computing security reference model and cloud cube model. In this paper, the information security problems and concrete solutions in the former cloud computing environment are discussed from different aspects.</span>


Cloud Computing is a robust, less cost, and an effective platform for providing services. Nowadays, it is applied in various services such as consumer business or Information Technology (IT) carried over the Internet. This cloud computing has some risks of security because, the services which are required for its effective compilation is outsources often by the third party providers. This makes the cloud computing more hard to maintain and monitor the security and privacy of data and also its support. This sudden change in the process of storing data towards the cloud computing technology improved the concerns about different issues in security and also the various threats present in this cloud storage. In the concept of security in cloud storage, various threats and challenges are noted by recent researchers. Hence, an effective framework of providing security is required. The main aim of this paper is to analyze various issues in securing the cloud data threats present in the cloud storage and to propose a novel methodology to secure it. This paper also identifies the most crucial components that can be incorporated in the already existing security measures while designing the storage systems based on cloud. This study also provides us to identify all the available solutions for the challenges of security and privacy in cloud storage.


Internet-of-Things (IoT) has been considered as a fundamental part of our day by day existence with billions of IoT devices gathering information remotely and can interoperate within the current Internet framework. Fog computing is nothing but cloud computing to the extreme of network security. It provides computation and storage services via CSP (Cloud Service Provider) to end devices in the Internet of Things (IoT). Fog computing allows the data storing and processing any nearby network devices or nearby cloud endpoint continuum. Using fog computing, the designer can reduce the computation architecture of the IoT devices. Unfortunitily, this new paradigm IoT-Fog faces numerous new privacy and security issues, like authentication and authorization, secure communication, information confidentiality. Despite the fact that the customary cloud-based platform can even utilize heavyweight cryptosystem to upgrade security, it can't be performed on fog devices drectly due to reseource constraints. Additionally, a huge number of smart fog devices are fiercely disseminated and situated in various zones, which expands the danger of being undermined by some pernicious gatherings. Trait Based Encryption (ABE) is an open key encryption conspire that enables clients to scramble and unscramble messages dependent on client qualities, which ensures information classification and hearty information get to control. Be that as it may, its computational expense for encryption and unscrambling stage is straightforwardly corresponding to the multifaceted nature of the arrangements utilized. The points is to assess the planning, CPU burden, and memory burden, and system estimations all through each phase of the cloud-to-things continuum amid an analysis for deciding highlights from a finger tapping exercise for Parkinson's Disease patients. It will be appeared there are confinements to the proposed testbeds when endeavoring to deal with upwards of 35 customers at the same time. These discoveries lead us to a proper conveyance of handling the leaves the Intel NUC as the most suitable fog gadget. While the Intel Edison and Raspberry Pi locate a superior balance at in the edge layer, crossing over correspondence conventions and keeping up a self-mending network topology for "thing" devices in the individual territory organize.


Author(s):  
Arumugam So Raman

This paper is documenting the potential of Fog Computing in Education. First, this study explores the difference between cloud computing and Fog Computing. Then the features of computing explained briefly. A tremendous increase in Internet usage among the people does not allow the sustainability to continue depending on Cloud Computing as a centralized web server, due to the truth that Cloud Computing system allows access to internet data as well as therefore making it feasible for users to availability, share along with store information in remote servers. With Fog Computing, multiple users, gadgets such as automobiles, wearable gizmos, sensing units, wise gadgets, an organization can accept one another utilizing their very own Fog facilities. In the educational sector, Fog computing technology boosts educational operations and provides a platform with agility, versus slowing them down or quitting them. Fog computing is a modern technology that is set for high development in the future, as well as will substantially improve day-to-day procedures for many sectors, including education. Finally, security issues and challenges of implementation Fog computing discussed.


2013 ◽  
Vol 10 (4) ◽  
pp. 1539-1545 ◽  
Author(s):  
K Chandra Mouli ◽  
U Seshadri

Now a day Cloud Computing is rapidly using computing technology. For low cost and high-end benefits this cloud computing is utilized. The major issue in this cloud computing is Ensuring the security, because the often store sensitive data with third party cloudproviders but these providers may beuntrusted.Working with single cloud is prevented, because in customer’s perception the failure in service availability and thepossibility of viciousgang in single cloud. To overcome these types of failures, a recent and popular technology is emerged called cloud of clouds or multi clouds or inters clouds. In this paper we illustrated the recent research towards multi clouds from single cloud and addressed possible solutions in security concern.Here we used the SSS (Secret Key Sharing) technique to share the key between servers. From this we can found that there is less attention in the field of multi cloud security compare with single cloud providers. The main intention of this work is to reduce the security risks related to cloud users and to encourage theuse of cloud- of -clouds due to its ability.


2021 ◽  
Vol 14 (4) ◽  
pp. 448-461
Author(s):  
Mohammad Mehrtak ◽  
◽  
SeyedAhmad SeyedAlinaghi ◽  
Mehrzad MohsseniPour ◽  
Tayebeh Noori ◽  
...  

Cloud computing is among the most beneficial solutions to digital problems. Security is one of the focal issues in cloud computing technology, and this study aims at investigating security issues of cloud computing and their probable solutions. A systematic review was performed using Scopus, Pubmed, Science Direct, and Web of Science databases. Once the title and abstract were evaluated, the quality of studies was assessed in order to choose the most relevant according to exclusion and inclusion criteria. Then, the full texts of studies selected were read thoroughly to extract the necessary results. According to the review, data security, availability, and integrity, as well as information confidentiality and network security, were the major challenges in cloud security. Further, data encryption, authentication, and classification, besides application programming interfaces (API), were security solutions to cloud infrastructure. Data encryption could be applied to store and retrieve data from the cloud in order to provide secure communication. Besides, several central challenges, which make the cloud security engineering process problematic, have been considered in this study.


Sign in / Sign up

Export Citation Format

Share Document