Managing Risk in Cloud Computing

Author(s):  
Lawan Ahmed Mohammed

Computer crime is now becoming a major international problem, with continual increases in incidents of cracking, hacking, viruses, worms, bacteria and the like having been reported in recent years. As a result of this massive vulnerabilities and new intrusion techniques, the rate of cybercrime has accelerated beyond imagination. In recent years, cloud computing have become ubiquitous, permeating every aspect of our personal and professional lives. Governments and enterprises are now adopting cloud technologies for numerous applications to increase their operational efficiency, improve their responsiveness and competitiveness. It is therefore vital to find ways of reducing and controlling the risk associated with such activities especially in cloud computing environment. However, there is no perfect-safe way to protect against all cyber attacks, hence, there is need for a proper recovery planning in the event of disaster resulting from these attacks. In this chapter, several means of limiting vulnerabilities and minimizing damages to information systems are discussed.

2018 ◽  
pp. 1318-1333
Author(s):  
Lawan A. Mohammed

Computer crime is now becoming a major international problem, with continual increases in incidents of cracking, hacking, viruses, worms, bacteria and the like having been reported in recent years. As a result of this massive vulnerabilities and new intrusion techniques, the rate of cybercrime has accelerated beyond imagination. In recent years, cloud computing have become ubiquitous, permeating every aspect of our personal and professional lives. Governments and enterprises are now adopting cloud technologies for numerous applications to increase their operational efficiency, improve their responsiveness and competitiveness. It is therefore vital to find ways of reducing and controlling the risk associated with such activities especially in cloud computing environment. However, there is no perfect-safe way to protect against all cyber attacks, hence, there is need for a proper recovery planning in the event of disaster resulting from these attacks. In this chapter, several means of limiting vulnerabilities and minimizing damages to information systems are discussed.


Author(s):  
Darshan Mansukhbhai Tank ◽  
Akshai Aggarwal ◽  
Nirbhay Kumar Chaubey

Cybercrime continues to emerge, with new threats surfacing every year. Every business, regardless of its size, is a potential target of cyber-attack. Cybersecurity in today's connected world is a key component of any establishment. Amidst known security threats in a virtualization environment, side-channel attacks (SCA) target most impressionable data and computations. SCA is flattering major security interests that need to be inspected from a new point of view. As a part of cybersecurity aspects, secured implementation of virtualization infrastructure is very much essential to ensure the overall security of the cloud computing environment. We require the most effective tools for threat detection, response, and reporting to safeguard business and customers from cyber-attacks. The objective of this chapter is to explore virtualization aspects of cybersecurity threats and solutions in the cloud computing environment. The authors also discuss the design of their novel ‘Flush+Flush' cache attack detection approach in a virtualized environment.


Author(s):  
Darshan Mansukhbhai Tank ◽  
Akshai Aggarwal ◽  
Nirbhay Kumar Chaubey

Cybercrime continues to emerge, with new threats surfacing every year. Every business, regardless of its size, is a potential target of cyber-attack. Cybersecurity in today's connected world is a key component of any establishment. Amidst known security threats in a virtualization environment, side-channel attacks (SCA) target most impressionable data and computations. SCA is flattering major security interests that need to be inspected from a new point of view. As a part of cybersecurity aspects, secured implementation of virtualization infrastructure is very much essential to ensure the overall security of the cloud computing environment. We require the most effective tools for threat detection, response, and reporting to safeguard business and customers from cyber-attacks. The objective of this chapter is to explore virtualization aspects of cybersecurity threats and solutions in the cloud computing environment. The authors also discuss the design of their novel ‘Flush+Flush' cache attack detection approach in a virtualized environment.


2018 ◽  
pp. 485-500
Author(s):  
Lawan A. Mohammed ◽  
Kashif Munir

In recent years, cloud computing or on-demand computing technologies and applications have become ubiquitous, permeating every aspect of our personal and professional lives. Governments and enterprises are now adopting cloud technologies for numerous applications to increase their operational efficiency, improve their responsiveness and competitiveness. For these reasons, the requirements for developing cloud applications have increased. Despite having many advantages for IT organizations, cloud has some issues that must be consider during its deployment. The main concerns are security, privacy and trust. These issues arise during the deployment of mostly public cloud infrastructure. In this chapter, security, privacy and trust issues of cloud computing deployment in Saudi Arabia were identified and the solutions to overcome these problems were discussed.


Author(s):  
Lawan A. Mohammed ◽  
Kashif Munir

In recent years, cloud computing or on-demand computing technologies and applications have become ubiquitous, permeating every aspect of our personal and professional lives. Governments and enterprises are now adopting cloud technologies for numerous applications to increase their operational efficiency, improve their responsiveness and competitiveness. For these reasons, the requirements for developing cloud applications have increased. Despite having many advantages for IT organizations, cloud has some issues that must be consider during its deployment. The main concerns are security, privacy and trust. These issues arise during the deployment of mostly public cloud infrastructure. In this chapter, security, privacy and trust issues of cloud computing deployment in Saudi Arabia were identified and the solutions to overcome these problems were discussed.


Author(s):  
. Monika ◽  
Pardeep Kumar ◽  
Sanjay Tyagi

In Cloud computing environment QoS i.e. Quality-of-Service and cost is the key element that to be take care of. As, today in the era of big data, the data must be handled properly while satisfying the request. In such case, while handling request of large data or for scientific applications request, flow of information must be sustained. In this paper, a brief introduction of workflow scheduling is given and also a detailed survey of various scheduling algorithms is performed using various parameter.


Sign in / Sign up

Export Citation Format

Share Document