A Comprehensive Study of Security in Cloud Computing

2018 ◽  
pp. 27-53
Author(s):  
Prasanta K. Manohari ◽  
Niranjan K. Ray

Cloud computing is one of the emerging technology in the recent times which has varieties of applications at different fields. It is an Internet dependent technology and it store and maintain the data in a cloud data center. Cloud center usually supports more numbers of user, applications and data. In the same time, it also suffered with numerous challenges. Security is a key requirement for cloud data center. Different security mechanisms are proposed for cloud computing environment. In this chapter, we address the background of cloud computing, security risk, requirements, issues, and some of the security techniques are discussed. We discuss different security issues and focus on some existing solutions.

Author(s):  
Prasanta K. Manohari ◽  
Niranjan K. Ray

Cloud computing is one of the emerging technology in the recent times which has varieties of applications at different fields. It is an Internet dependent technology and it store and maintain the data in a cloud data center. Cloud center usually supports more numbers of user, applications and data. In the same time, it also suffered with numerous challenges. Security is a key requirement for cloud data center. Different security mechanisms are proposed for cloud computing environment. In this chapter, we address the background of cloud computing, security risk, requirements, issues, and some of the security techniques are discussed. We discuss different security issues and focus on some existing solutions.


Author(s):  
Sudhansu Shekhar Patra

Energy saving in a Cloud Computing environment is a multidimensional challenge, which can directly decrease the in-use costs and carbon dioxide emission, while raising the system consistency. The process of maximizing the cloud computing resource utilization which brings many benefits such as better use of resources, rationalization of maintenance, IT service customization, QoS and reliable services, etc., is known as task consolidation. This article suggests the energy saving with task consolidation, by minimizing the number of unused resources in a cloud computing environment. In this article, various task consolidation algorithms such as MinIncreaseinEnergy, MaxUtilECTC, NoIdleMachineECTC, and NoIdleMachineMaxUtil are presented aims to optimize energy consumption of cloud data center. The outcomes have shown that the suggested algorithms surpass the existing ECTC and FCFSMaxUtil, MaxMaxUtil algorithms in terms of the CPU utilization and energy consumption.


2018 ◽  
Vol 8 (1) ◽  
pp. 117-142 ◽  
Author(s):  
Sudhansu Shekhar Patra

Energy saving in a Cloud Computing environment is a multidimensional challenge, which can directly decrease the in-use costs and carbon dioxide emission, while raising the system consistency. The process of maximizing the cloud computing resource utilization which brings many benefits such as better use of resources, rationalization of maintenance, IT service customization, QoS and reliable services, etc., is known as task consolidation. This article suggests the energy saving with task consolidation, by minimizing the number of unused resources in a cloud computing environment. In this article, various task consolidation algorithms such as MinIncreaseinEnergy, MaxUtilECTC, NoIdleMachineECTC, and NoIdleMachineMaxUtil are presented aims to optimize energy consumption of cloud data center. The outcomes have shown that the suggested algorithms surpass the existing ECTC and FCFSMaxUtil, MaxMaxUtil algorithms in terms of the CPU utilization and energy consumption.


Author(s):  
Priya Oberoi ◽  
Sumit Mittal ◽  
Rajneesh Kumar Gujral

Security is a critical factor for any of the computing platforms. Cloud computing is a new computing environment but still, its basic technology is the Internet. Thus, Cloud computing environment not only has the threats of its own but it is also prone to security issues of its underlying technology i.e. Internet. In this paper, the authors are proposing a secure routing framework viz. Authenticated Dynamic Routing in Cloud Networks (ADRCN) to mitigate the malicious insider attacks while maintaining the path integrity in the Clouds. Symmetric cryptography with hashing is used to maintain the integrity of the path between the source and destination. The purpose of ADRCN is to maintain the integrity of the path between the client and data center. If malicious insider tries to perform an attack between the client and the data center then it will be detected. This work aims to give a solution for detection and prevention of malicious insider attacks in Cloud-based environments.


2014 ◽  
Vol 1008-1009 ◽  
pp. 1513-1516
Author(s):  
Hai Na Song ◽  
Xiao Qing Zhang ◽  
Zhong Tang He

Cloud computing environment is regarded as a kind of multi-tenant computing mode. With virtulization as a support technology, cloud computing realizes the integration of multiple workloads in one server through the package and seperation of virtual machines. Aiming at the contradiction between the heterogeneous applications and uniform shared resource pool, using the idea of bin packing, the multidimensional resource scheduling problem is analyzed in this paper. We carry out some example analysis in one-dimensional resource scheduling, two-dimensional resource schduling and three-dimensional resource scheduling. The results shows that the resource utilization of cloud data centers will be improved greatly when the resource sheduling is conducted after reorganizing rationally the heterogeneous demands.


2021 ◽  
Vol 9 (1) ◽  
pp. 41-50
Author(s):  
Ruhul Amin ◽  
Siddhartha Vadlamudi

Cloud data migration is the process of moving data, localhost applications, services, and data to the distributed cloud processing framework. The success of this data migration measure is relying upon a few viewpoints like planning and impact analysis of existing enterprise systems. Quite possibly the most widely recognized process is moving locally stored data in a public cloud computing environment. Cloud migration comes along with both challenges and advantages, so there are different academic research and technical applications on data migration to the cloud that will be discussed throughout this paper. By breaking down the research achievement and application status, we divide the existing migration techniques into three strategies as indicated by the cloud service models essentially. Various processes should be considered for different migration techniques, and various tasks will be included accordingly. The similarities and differences between the migration strategies are examined, and the challenges and future work about data migration to the cloud are proposed. This paper, through a research survey, recognizes the key benefits and challenges of migrating data into the cloud. There are different cloud migration procedures and models recommended to assess the presentation, identifying security requirements, choosing a cloud provider, calculating the expense, and making any essential organizational changes. The results of this research paper can give a roadmap for data migration and can help decision-makers towards a secure and productive migration to a cloud computing environment.


2016 ◽  
pp. 1053-1066 ◽  
Author(s):  
Nitin Nagar ◽  
Ugrasen Suman

Cloud computing is comprised of major demand from the every group of organization because of easy availability and cost effectiveness. The responsibilities of cloud service providers will become increasing more due to the great progression in every cloud computing deployment model (public, private and hybrid) and service models (SaaS, PaaS and IaaS). In this perspective, cloud computing faces multiple challenges, especially in cloud computing security at all levels (e.g., host, network, application and data levels). Authentication is the constantly the biggest concerned for IT industries to adopt cloud computing environment. The availability, performance, key logger attack, malicious insiders, outsider attacks and service disruptions explore (service hijacking) issues are the key research challenges in the cloud computing authentication level. In this aspect, traditional user name and password is not enough as a single factor (first factor). This paper has proposed a secure cloud computing framework which uses first factor as a crypt user name and password with the ATM pin as a second factor called M-pin. The proposed work focuses on a solution to the threats that are the major issues in the cloud adoption.


2016 ◽  
pp. 221-247 ◽  
Author(s):  
Zhaolong Gou ◽  
Shingo Yamaguchi ◽  
B. B. Gupta

Cloud computing is a system, where the resources of a data center are shared using virtualization technology, such that it provides elastic, on demand and instant services to its customers and charges them based on the resources they use. In this chapter, we will discuss recent developments in cloud computing, various security issues and challenges associated with Cloud computing environment, various existing solutions provided for dealing with these security threats and will provide a comparative analysis these approaches. This will provide better understanding of the various security problems associated with the cloud, current solution space, and future research scope to deal with such attacks in better way.


2018 ◽  
Vol 24 (1) ◽  
pp. 739-743 ◽  
Author(s):  
Ganthan Narayana Samy ◽  
Bharanidharan Shanmugam ◽  
Nurazean Maarop ◽  
Pritheega Magalingam ◽  
Sundresan Perumal ◽  
...  

2016 ◽  
Vol 87 ◽  
pp. 246-251 ◽  
Author(s):  
B. Hari Krishna ◽  
S. Kiran ◽  
G. Murali ◽  
R. Pradeep Kumar Reddy

Sign in / Sign up

Export Citation Format

Share Document