Cloud Security Engineering Concept and Vision

2018 ◽  
pp. 93-101 ◽  
Author(s):  
Shadi Aljawarneh

The research community found that a software system should be evolved once every few months to ensure it is adapted to the real-world environment. The system evolution requires regularly amendments that append, delete, or alter features. It also migrates or converts the software system from one operating platform to another. These amendments may result in requirements/ specifications that were satisfied in a previous release of a software system not being satisfied in the subsequent versions. As a result, software evolutionary changes violate security requirements, and then a system may become vulnerable to different kinds of attacks. In this paper, concepts and visions are presented to avoid/minimize the Cloud security issues.

Author(s):  
Shadi Aljawarneh

The research community found that a software system should be evolved once every few months to ensure it is adapted to the real-world environment. The system evolution requires regularly amendments that append, delete, or alter features. It also migrates or converts the software system from one operating platform to another. These amendments may result in requirements/ specifications that were satisfied in a previous release of a software system not being satisfied in the subsequent versions. As a result, software evolutionary changes violate security requirements, and then a system may become vulnerable to different kinds of attacks. In this paper, concepts and visions are presented to avoid/minimize the Cloud security issues.


Author(s):  
Baldev Singh

Cloud computing is one of the emerged technologies in the past decade. Tremendous growth is noticed in the usage and implementation of Cloud computing. Although cloud spectrum is widely popular still there are lot of challenges and issues to be addressed for its optimal usage. Vulnerabilities and threats to the cloud services leads to attacks and exploitation of resources as well as data breaches and privacy violations that need to be addressed at the cloud customer satisfaction level. This paper highlights different cloud security issues and their security requirements. The review aspects and findings of the paper can be used as a reference for further appropriate and effective implementation from the suggested practically viable cloud security solution in an independent manner or using as a hybrid technique.


Software-Defined Network (SDN) is regarded as one of the most significant areas for future networking. SDN architecture is a revolutionary new concept that offers more mobility, a high degree of automation and shorter delivery time by pushing the conventional network to be software-based. SDN architecture dynamically separates the control plane from the network data (forwarding) plane, providing a centralized view of the network as a whole and making it easier to manage and monitor the resources of the network. Furthermore, the SDN's initial design, with its centralized control point, does not accurately perceive the security requirements, which poses additional challenges to security issues. Security and authentication scheme in SDN is being surveyed in this paper providing advances in this field to both the research community and the industry. Then start with a list of identified threats to security and SDN breaches. The article analyzes previously outlined security and authentication solutions for SDN. The challenges in securing the network from the attacker are discussed and the holistic security approach required for SDN is described. It will identify future directions for research that will be key to providing network security in SDN.


2011 ◽  
Vol 225-226 ◽  
pp. 706-709 ◽  
Author(s):  
Shu Guo Yang

Cloud computing is regarded as one of the most enticing technologies and potential silver bullet in the IT industry. Because of open condition and general-purpose nature of cloud, security issue is becoming a bottle neck of rapid development and broad application of cloud computing. Firstly, this paper addresses cloud customers’ significant concerns about and requirements of cloud security. Secondly, cloud security risks and threats posed by the pervasive and ad hoc nature of the cloud are comprehensively analyzed. Finally, some effective and dependable security mechanisms are proposed to lower cloud security risks and meet security requirements of cloud customers. Especially, a novel scheme for integrity and copyright protection of customers’ works in the cloud is presented based on digital watermarking and digital signature.


2018 ◽  
pp. 659-672
Author(s):  
Shadi Aljawarneh ◽  
Muneer Bani Yassein

In this article, perspectives from Cloud computing practitioners are shown in order to address clients concerns and bring about awareness of the measures that put in place to ensure software security of the client services running in the Cloud. In addition, the authors have investigated the impacts of a number of the existing approaches and techniques to put a systematic survey of the current software security issues in the Cloud environment. Based on such perspectives and survey, a generic framework conceptually is designed to outline the possible current solutions of software security issues in the Cloud and to present a preferred software security approach to investigate the Cloud research community. As a potential enhancement on the proposed Cloud software security framework, the concepts of fuzzy systems might be used to solve a large numbers of issues in the Cloud security on different framework levels.


Author(s):  
Armstrong Nhlabatsi ◽  
Bashar Nuseibeh ◽  
Yijun Yu

Long-lived software systems often undergo evolution over an extended period. Evolution of these systems is inevitable as they need to continue to satisfy changing business needs, new regulations and standards, and introduction of novel technologies. Such evolution may involve changes that add, remove, or modify features; or that migrate the system from one operating platform to another. These changes may result in requirements that were satisfied in a previous release of a system not being satisfied in subsequent versions. When evolutionary changes violate security requirements, a system may be left vulnerable to attacks. In this paper we review current approaches to security requirements engineering and conclude that they lack explicit support for managing the effects of software evolution. We then suggest that a cross fertilisation of the areas of software evolution and security engineering would address the problem of maintaining compliance to security requirements of software systems as they evolve.


Author(s):  
Shadi A. Aljawarneh ◽  
Muneer O. Bani Yassein

In this article, perspectives from Cloud computing practitioners are shown in order to address clients concerns and bring about awareness of the measures that put in place to ensure software security of the client services running in the Cloud. In addition, the authors have investigated the impacts of a number of the existing approaches and techniques to put a systematic survey of the current software security issues in the Cloud environment. Based on such perspectives and survey, a generic framework conceptually is designed to outline the possible current solutions of software security issues in the Cloud and to present a preferred software security approach to investigate the Cloud research community. As a potential enhancement on the proposed Cloud software security framework, the concepts of fuzzy systems might be used to solve a large numbers of issues in the Cloud security on different framework levels.


2022 ◽  
Vol 1216 (1) ◽  
pp. 012001
Author(s):  
G R Tsochev ◽  
R I Trifonov

Abstract Cloud computing is a new technology that is undergoing tremendous development today. People who use it are not able to separate the reasonable from the unreasonable arguments that come with the security requirements in the cloud. The claim that cloud computing is hereditarily insecure is as absurd as the claim that cloud computing does not create new security problems. Cloud computing is a way to dynamically increase resources without the need for in-depth knowledge of a brand new infrastructure, without training new workers or designing new software solutions. The article aims to analyse the different cloud security issues and models of cloud architectures. Some of the main problems with security in virtualization, concerns about storing data in the cloud and the assessment of risk tolerance in cloud computing are presented. Legal and regulatory issues for the protection of personal data are addressed.


2014 ◽  
Vol 1 (1) ◽  
pp. 1-5
Author(s):  
Poonam Rawat ◽  
◽  
Neha Rawat ◽  
Shikha Singh ◽  
Awantika . ◽  
...  

Author(s):  
Sahar Alatawi ◽  
Areej Alhasani ◽  
Shahad Alfaidi ◽  
Moudi Albalawi ◽  
Saad M Almutairi

Sign in / Sign up

Export Citation Format

Share Document