Security Issues Related to Cloud Applications in STEM Education

Author(s):  
Yong Chen

Learning based on cloud computing, denoted as cloud learning (CL) in short, is a disruptive innovation and a current buzzword in education. It provides a learner-centered platform that benefits learners, instructors, and education providers. However, because it requires the Internet and is built on cloud computing, CL has inherent security issues. By analyzing the benefits and the security threats inherent in CL, this chapter aims to help CL stakeholders in STEM Education (namely cloud service providers, cloud content providers, and cloud users) to better understand the security issues inherent in CL from the perspectives of confidentiality, integrity, and availability. The discussions about the risks that CL stakeholders in STEM education incur as a result of prevailing security threats and system vulnerabilities will help those stakeholders to assess the cost effectiveness of security countermeasures.

2018 ◽  
pp. 1222-1234
Author(s):  
Yong Chen

Learning based on cloud computing, denoted as cloud learning (CL) in short, is a disruptive innovation and a current buzzword in education. It provides a learner-centered platform that benefits learners, instructors, and education providers. However, because it requires the Internet and is built on cloud computing, CL has inherent security issues. By analyzing the benefits and the security threats inherent in CL, this chapter aims to help CL stakeholders in STEM Education (namely cloud service providers, cloud content providers, and cloud users) to better understand the security issues inherent in CL from the perspectives of confidentiality, integrity, and availability. The discussions about the risks that CL stakeholders in STEM education incur as a result of prevailing security threats and system vulnerabilities will help those stakeholders to assess the cost effectiveness of security countermeasures.


2019 ◽  
Vol 8 (2) ◽  
pp. 6408-6412

Cloud computing is a technology where it provides software, platform, infrastructure, security and everything as a service. But this technology faces many security issues because all the data or information are stored in the hands of the third party. The cloud users unable to know where the data are store in the cloud environment and also it is very difficult to analyze the trustworthiness of the cloud service providers. In this technology providing security is a very big challenging task. This challenge was overcome by developing different cloud security algorithms using cryptographic techniques. Recently many researchers identified that if the cryptographic algorithms are combined in a hybrid manner it will increase the security in the cloud environment. Even though, many research works are still carried out to improve security in the cloud computing environment. In this research article, a new step was taken to develop a new cloud security algorithm


2018 ◽  
pp. 54-76
Author(s):  
Tabassum N. Mujawar ◽  
Ashok V. Sutagundar ◽  
Lata L. Ragha

Cloud computing is recently emerging technology, which provides a way to access computing resources over Internet on demand and pay per use basis. Cloud computing is a paradigm that enable access to shared pool of resources efficiently, which are managed by third party cloud service providers. Despite of various advantages of cloud computing security is the biggest threat. This chapter describes various security concerns in cloud computing. The clouds are subject to traditional data confidentiality, integrity, availability and various privacy issues. This chapter comprises various security issues at different levels in environment that includes infrastructure level security, data level and storage security. It also deals with the concept of Identity and Access Control mechanism.


Author(s):  
Ihssan Alkadi

There are many steps involved with securing a cloud system and its applications (SaaS) and developed ones in (PaaS). Security and privacy issues represent the biggest concerns to moving services to external clouds (Public). With cloud computing, data are stored and delivered across the Internet. The owner of the data does not have control or even know where their data are being stored. Additionally, in a multi-tenant environment, it may be very difficult for a cloud service provider to provide the level of isolation and associated guarantees that are possible with an environment dedicated to a single customer. Unfortunately, to develop a security algorithm that outlines and maps out the enforcement of a security policy and procedure can be a daunting task. A good security algorithm presents a strategy to counter the vulnerabilities in a cloud system. This chapter covers the complete overview, comparative analysis of security methods in Cloud Applications in STEM Education and the introduction of a new methodology that will enforce cloud computing security against breaches and intrusions. Much light will be shed on existing methodologies of security on servers used for cloud applications in STEM education and storage of data, and several methods will be presented in addition to the newly developed method of security in cloud-based servers, such as the MIST (Alkadi). Not only can cloud networks be used to gather sensitive information on multiple platforms, also there are needs to prevent common attacks through weak password recovery, retrieval, authentication, and hardening systems; otherwise hackers will spread cyber mayhem. Discussion of current security issues and algorithms in a real world will be presented. Different technologies are being created and in constant competition to meet the demands of users who are generally “busy”. The selling point of these technologies is the ability to address these demands without adding more to any workloads. One of the demands often discussed is that users want to have their digital information accessible from anywhere at any time. This information includes documents, audio libraries, and more. Users also demand the ability to manage, edit and update this information regardless of physical location. Somewhat recently, mobile devices such as laptops, tablets, and smartphones have provided these abilities. This is no small feat as vendors and providers have reduced the size of these devices to increase mobility. However, as the amount of personal information that users are wanting to access has grown exponentially, manipulation and storage of it require more capable devices. To meet increased demands, increasing the capabilities of mobile devices may be impractical. Making mobile devices more powerful without technological advancement would require that the device be larger and use more resources such as battery life and processing power to function properly. Storing all of a user's information on a mobile device that travels everywhere also adds vulnerability risks. The best technical solution to having a user's information accessible is some sort of online storage where there is the convenience to store, manipulate and retrieve data. This is one of the most practical applications for the concept of cloud computing in STEM education. As storage capabilities and Internet bandwidth has increased, so has the amount of personal data that users store online. And today, the average user has billions of bytes of data online. Access is everywhere and whenever is needed. As everyone started doing so, people want their data safe and secure to maintain their privacy. As the user base grew in size, the number of security issues of the personal data started to become increasingly important. As soon as someone's data are in the remote server, unwanted users or “hackers” can have many opportunities to compromise the data. As the online server needs to be up and running all the time, the only way to secure the cloud server is by using better passwords by every user. By the same token, the flaws in the password authentication and protection system can also help unwanted users to get their way to other people's personal data. Thus, the password authentication system should also be free from any loopholes and vulnerabilities.


2014 ◽  
Vol 701-702 ◽  
pp. 1106-1111 ◽  
Author(s):  
Xin Zheng Zhang ◽  
Ya Juan Zhang

As information and processes are migrating to the cloud, Cloud Computing is drastically changing IT professionals’ working environment. Cloud Computing solves many problems of conventional computing. However, the new technology has also created new challenges such as data security, data ownership and trans-code data storage. We discussed about Cloud computing security issues, mechanism, challenges that Cloud service providers and consumers face during Cloud engineering. Based on concerning of security issues and challenges, we proposed several encryption algorithms to make cloud data secure and invulnerable. We made comparisons among DES, AES, RSA and ECC algorithms to find combinatorial optimization solutions, which fit Cloud environment well for making cloud data secure and not to be hacked by attackers.


2020 ◽  
Author(s):  
Dinesh Arpitha R ◽  
Sai Shobha R

Cloud computing is the computing technology which provides resources like software, hardware, services over the internet. Cloud computing provides computation, software, data access, and storage services that do not require end- user knowledge of the physical location and configuration of the system that delivers the services. Cloud computing enables the user and organizations to store their data remotely and enjoy good quality applications on the demand without having any burden associated with local hardware resources and software managements but it possesses a new security risk towards correctness of data stored at cloud. The data storage in the cloud has been a promising issue in these days. This is due to the fact that the users are storing their valuable data and information in the cloud. The users should trust the cloud service providers to provide security for their data. Cloud storage services avoid the cost storage services avoids the cost expensive on software, personnel maintains and provides better performance less storage cost and scalability, cloud services through internet which increase their exposure to storage security vulnerabilities however security is one of the major drawbacks that preventing large organizations to enter into cloud computing environment. This work surveyed on several storage techniques and this advantage and its drawbacks.


2018 ◽  
pp. 77-92 ◽  
Author(s):  
Srinivas Sethi ◽  
Sai Sruti

Cloud computing refers to the basic setup for an emerging model of service delivery, that has the advantage of decreasing the cost by sharing computing, infrastructure including storage resources. This can be combined with on-demand delivery mechanism relying on a pay-per-use model. Cloud computing offers an added level of risk because of essential services provided by it to a third party, which makes it difficult to maintain data privacy and security. Security in cloud computing is a critical aspect, which has various issues and challenges related to it. Cloud service providers/ brokers and the cloud service users should make aware of safety cloud. That is the cloud is safe enough from all kinds of the threats, so that the users do not face any problem like; loss of data or data theft. There is a possibility that, a malicious user can enters the cloud by imitating an authentic user, thus corrupt the entire cloud. It can affect many users who are sharing these types of clouds. This chapter mentions the list of parameters that disturb the security of the cloud. This also explores the cloud security issues and challenges faced by cloud service provider/brokers and cloud service users like; data, privacy, and infected application. Finally, it discusses the countermeasure for handling these issues and its challenges.


Author(s):  
Mohd. Akbar ◽  
Mohammad Suaib ◽  
Mohd. Shahid Husain ◽  
Saurabh Shukla

The cloud computing environment is one of the most promising technologies in the development of computing resources. The cloud service providers provide almost every resource for computing to their users through the internet. With all its advantages, cloud computing has major security issues. Especially in the case of public clouds, anyone can misuse the services for performing unlawful activities. The traditional approaches used for cyber forensics and network forensics are not adequate for the cloud environment because of many technical constraints. There is a need for setting up effective countermeasures that can help an investigator to identify and track unlawful activities happened in a cloud environment. Cloud forensics is an emerging area of research where the researchers aim to provide effective digital forensic techniques that help in the investigation of digital crimes in a cloud environment. The cloud environment helps to extract data even from devices that are not physically accessible. However, cloud forensics is not as easy as it seems; a lot of the success depends on the cloud service model implemented in the context. Getting the support of cloud service providers in accessing the potential sources of evidence necessary for investigation is also a major concern. Another critical aspect of cloud forensics is dealing with legal issues. This chapter discusses the basic concepts of cloud forensics, its challenges, and future directions.


2015 ◽  
pp. 1702-1720
Author(s):  
Yoshito Kanamori ◽  
Minnie Yi-Miin Yen

Cloud computing is changing the way corporate computing operates and forcing the rapid evolution of computing service delivery. It is being facilitated by numerous technological approaches and a variety of business models. Although utilizing the infrastructure of existing computing and networking technologies, different cloud service providers (CSPs) are able to unite their efforts and address a much broader business space. As a result, confusion has emerged and questions have risen from both Information Technology (IT) and business communities. How cloud environments differ from traditional models, and how these differences affect their adoption are of major importance. In this chapter, the authors first clarify misperceptions by introducing the new threats and challenges involved in cloud environments. Specifically, security issues and concerns will be depicted in three practical scenarios designed to illuminate the different security problems in each cloud deployment model. The chapter also further discusses how to assess and control the concerns and issues pertaining to the security and risk management implementations.


Author(s):  
Alpana M. Desai ◽  
Kenrick Mock

Cloud computing has recently emerged in prominence and is being rapidly adopted by organizations because of its potential and perceived benefits of flexibility and affordability. According to surveys conducted in 2008 and 2009 by International Data Corporation (IDC) of IT executives and CIOs, security was cited as the top concern for the adoption of cloud computing. Enterprises that plan to utilize cloud services for their infrastructure, platform, and/or software needs must understand the security risks and privacy issues related to cloud computing. This chapter discusses the technical, legal, and policy/organizational security risks of cloud computing, and reviews recommendations/strategies for managing and mitigating security threats in cloud computing. It also presents vendor-specific solutions and strategies that cloud service providers are implementing for mitigating security risks in cloud computing.


Sign in / Sign up

Export Citation Format

Share Document