Role of Security Mechanisms in the Building Blocks of the Cloud Infrastructure

Author(s):  
Kowsigan Mohan ◽  
P. Balasubramanie Palanisamy ◽  
G.R. Kanagachidambaresan ◽  
Siddharth Rajesh ◽  
Sneha Narendran

This chapter describes how security plays a vital role in cloud computing, as the name itself specifies the data can be stored from any place and can be owned by anyone. Even though the cloud offers many benefits such as flexibility, scalability and agility, security issues are still backlog the cloud infrastructure. Much research is being done on cloud security equal to the scheduling problems in the cloud environment. The customers under the cloud providers are very concerned about their data, which has been stored in the cloud environment. In this regard, it is essential for a cloud provider to implement some powerful tools for security, to provide a secure cloud infrastructure to the customers. Generally speaking, there are some foundational needs to be attained and some actions to be combined to ensure data security in both cloud, as well as, non-cloud infrastructure. This book chapter concentrates only on the security issues, security measures, security mechanisms, and security tools of the cloud environment.

2019 ◽  
pp. 31-53
Author(s):  
Kowsigan Mohan ◽  
P. Balasubramanie Palanisamy ◽  
G.R. Kanagachidambaresan ◽  
Siddharth Rajesh ◽  
Sneha Narendran

This chapter describes how security plays a vital role in cloud computing, as the name itself specifies the data can be stored from any place and can be owned by anyone. Even though the cloud offers many benefits such as flexibility, scalability and agility, security issues are still backlog the cloud infrastructure. Much research is being done on cloud security equal to the scheduling problems in the cloud environment. The customers under the cloud providers are very concerned about their data, which has been stored in the cloud environment. In this regard, it is essential for a cloud provider to implement some powerful tools for security, to provide a secure cloud infrastructure to the customers. Generally speaking, there are some foundational needs to be attained and some actions to be combined to ensure data security in both cloud, as well as, non-cloud infrastructure. This book chapter concentrates only on the security issues, security measures, security mechanisms, and security tools of the cloud environment.


Author(s):  
Heru Susanto ◽  
Leu Fang Yie ◽  
Didi Rosiyadi ◽  
Akbari Indra Basuki ◽  
Desi Setiana

Digital ecosystems have grown rapidly over the years, and governments are investing in digital provision for their processes and services. Despite the advantages of distributed technologies, there are many security issues as well that result in breaches of data privacy with serious impact including legal and reputational implications. To deal with such threats, government agencies need to thoughtfully improve their security defences to protect data and systems by using automation and artificial intelligence (AI), as well as easing the data security measures including early warning of threats and detection. This study provides a comprehensive view of AI and automaton to highlight challenges and issues concerning data security and suggests steps to combat the issues. The authors demonstrate the role of AI-driven security tools and automation to mitigate the impact of data breaches to also propose recommendations for government agencies to enhance their data security protection.


2019 ◽  
Vol 113 (3) ◽  
pp. 176-182 ◽  
Author(s):  
Priyadarshini Chakrabarti ◽  
Hannah M Lucas ◽  
Ramesh R Sagili

Abstract Although poor nutrition is cited as one of the crucial factors in global pollinator decline, the requirements and role of several important nutrients (especially micronutrients) in honey bees are not well understood. Micronutrients, viz. phytosterols, play a physiologically vital role in insects as precursors of important molting hormones and building blocks of cellular membranes. There is a gap in comprehensive understanding of the impacts of dietary sterols on honey bee physiology. In the present study, we investigated the role of 24-methylenecholesterol—a key phytosterol—in honey bee nutritional physiology. Artificial diets with varying concentrations of 24-methylenecholesterol (0%, 0.1%. 0.25%, 0.5%, 0.75%, and 1% dry diet weight) were formulated and fed to honey bees in a laboratory cage experiment. Survival, diet consumption, head protein content, and abdominal lipid contents were significantly higher in dietary sterol-supplemented bees. Our findings provide additional insights regarding the role of this important sterol in honey bee nutritional physiology. The insights gleaned from this study could also advance the understanding of sterol metabolism and regulation in other bee species that are dependent on pollen for sterols, and assist in formulation of a more complete artificial diet for honey bees (Apis mellifera Linnaeus, 1758) (Hymenoptera: Apidae).


Author(s):  
Paramjeet Kaur

Cloud computing is a new computing model which is widely emerging technology in the recent years is adopted by most of the IT companies and other organizations. Cloud computing enables individuals and organizations to gain access to huge computing resources without capital investment. Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Cloud computing is the internet depend technology which is providing the services to user, small and large organization on demand. Cloud computing stored the user data and maintain in the data canter of cloud provider like Amazon, Oracle, Google, Microsoft etc. However, the cloud environment is considered untrusted as it is accessed through Internet. Therefore people have security concerns on data stored in cloud environment. The major concern of cloud environment is security during upload the data on cloud server.


2022 ◽  
pp. 191-213
Author(s):  
Heru Susanto ◽  
Leu Fang Yie ◽  
Didi Rosiyadi ◽  
Akbari Indra Basuki ◽  
Desi Setiana

Digital ecosystems have grown rapidly over the years, and governments are investing in digital provision for their processes and services. Despite the advantages of distributed technologies, there are many security issues as well that result in breaches of data privacy with serious impact including legal and reputational implications. To deal with such threats, government agencies need to thoughtfully improve their security defences to protect data and systems by using automation and artificial intelligence (AI), as well as easing the data security measures including early warning of threats and detection. This study provides a comprehensive view of AI and automaton to highlight challenges and issues concerning data security and suggests steps to combat the issues. The authors demonstrate the role of AI-driven security tools and automation to mitigate the impact of data breaches to also propose recommendations for government agencies to enhance their data security protection.


2020 ◽  
Author(s):  
Tatjana Skrbic ◽  
Amos Maritan ◽  
Achille Giacometti ◽  
George D. Rose ◽  
Jayanth R. Banavar

The native state structures of globular proteins are stable and well-packed indicating that self-interactions are favored over protein-solvent interactions under folding conditions. We use this as a guiding principle to derive the geometry of the building blocks of protein structures, alpha-helices and strands assembled into beta-sheets, with no adjustable parameters, no amino acid sequence information, and no chemistry. There is an almost perfect fit between the dictates of mathematics and physics and the rules of quantum chemistry. Our theory establishes an energy landscape that channels protein evolution by providing sequence-independent platforms for elaborating sequence-dependent functional diversity. Our work highlights the vital role of discreteness in life and has implications for the creation of artificial life and on the nature of life elsewhere in the cosmos.


2021 ◽  
Author(s):  
PATHAKAMURI SRINIVAS ◽  
B.V. Ramana Reddy ◽  
A.P. Siva Kumar

Abstract The study of PaaS platform security enhancement has occupied scholars from a number of disciplines, in previous works has so many security issues like Security problems can be a big barrier to cloud computing. System servers require trustworthy security measures to different data domains according to the system servers own operating mechanism. Problem is constructed by filtering out those cloud providers not conforming to high-level security requirements. By including low-level security requirements to be used for filtering the cloud provider space and formulating the optimisation function. To overcome all the above drawbacks our proposed work mainly focused on the security of Platform-as-a-Service (PaaS) as well as the most critical security issues that were documented regarding PaaS infrastructure. This work has two main aspects: First, suitable access control on user personal data, VMs and platform services and Second planning and adapting application deployments based on security requirements. In Fuzzy based access control to information sources is mainly realised by exploiting the CDO security feature. In Security feature code was modified to map the class and packet filter for any specific permission to our own class. If the Identity Provider (IdP) has included public security information on the two main parts in the small token on which Trust based Signature elements are placed, i.e., the whole token or the assertions included, this public key is used to validate the respective signature. The experimental results will show that our proposed method outperforms the traditional methods. Our proposed methodology was implemented in the platform of JAVA.


Author(s):  
R. Gomathyjayam ◽  
R. Thilakavathi

Security plays a vital role in today’s mobile world. There are security issues like sniffing of data while accessing information through open channel. Proper security measures can help to deal with the common security threats faced by mobile phone users such as data protection, privacy, application and personal information security. Cryptographic techniques play an important role in protecting communication links and data, since access to data can be limited to those who hold the proper key. This paper discusses a method to securely access information in a network by an android mobile application using AES cryptographic technique. The paper describes a new key sharing algorithm, based on the symmetric key management, for faster and efficient encryption of data that is suitable for use in a mobile device.


Molecules ◽  
2020 ◽  
Vol 25 (3) ◽  
pp. 571
Author(s):  
Priyadarshini Chakrabarti ◽  
Hannah M. Lucas ◽  
Ramesh R. Sagili

Poor nutrition is an important factor in global bee population declines. A significant gap in knowledge persists regarding the role of various nutrients (especially micronutrients) in honey bees. Sterols are essential micronutrients in insect diets and play a physiologically vital role as precursors of important molting hormones and building blocks of cellular membranes. Sterol requirements and metabolism in honey bees are poorly understood. Among all pollen sterols, 24-methylenecholesterol is considered the key phytosterol required by honey bees. Nurse bees assimilate this sterol from dietary sources and store it in their tissues as endogenous sterol, to be transferred to the growing larvae through brood food. This study examined the duration of replacement of such endogenous sterols in honey bees. The dietary 13C-labeled isotopomer of 24-methylenecholesterol added to artificial bee diet showed differential, progressive in vivo assimilation across various honey bee tissues. Significantly higher survival, diet consumption, head protein content and abdominal lipid content were observed in the dietary sterol-supplemented group than in the control group. These findings provide novel insights into phytosterol utilization and temporal pattern of endogenous 24-methylenecholesterol replacement in honey bees.


Author(s):  
Muhammad Idrees ◽  
Ashfaq Rehman ◽  
Manzoor Ahmad Naazer

The Afghan people suffered a lot from war on terror, security issues, and political and economic instability since US invasion in 2001. Pakistan being an important neighbouring country of Afghanistan can play a vital role in bringing amity and stability through facilitating peace process. Both the US administration and Afghan government demand Pakistan to influence and bring the Taliban to the table talks. In this context, this study aims to explore Pakistan’s role in the ongoing peace process that has so far created an understanding among the stakeholders that a peaceful and stable Afghanistan is in the interest of the region. The study finds that there are greater issues to be dealt with carefully e.g., the governance system of the country, the constitution, and a viable power-sharing formula to be acceptable to all the stakeholders. Any successful peace deal needs a strong commitment on the part of all the stakeholders. Peace is the need of the hour not only for Afghanistan but for the whole region as well. Pakistan needs to continue her support to the Afghanistan’s stability and play its due role in the peace negotiations in the greater regional interests.


Sign in / Sign up

Export Citation Format

Share Document