Current State Survey and Future Opportunities for Trust and Security in Green Cloud Computing

2018 ◽  
pp. 1669-1693
Author(s):  
Amine Haouari ◽  
Zbakh Mostapha ◽  
Samadi Yassir

In this paper, the authors present a state of art survey of cloud computing, highlighting its architectural principles, implementation as well as research directions in this increasingly important domain. They cover the different security issues that has emanated due to the nature of the service delivery models of a cloud computing system. Furthermore, in this survey the researchers highlight the concept of trust in digital environment as well as the use of containers like Docker, the block chain principle, artificial intelligence, last findings in the field of cryptography and other new concepts used in the domain of security and privacy related to cloud computing environments. They provide in the end an overview of the metrics which are mandatory in order to have a green flavor of cloud computing and the strategies that are currently used.

Author(s):  
Amine Haouari ◽  
Zbakh Mostapha ◽  
Samadi Yassir

In this paper, the authors present a state of art survey of cloud computing, highlighting its architectural principles, implementation as well as research directions in this increasingly important domain. They cover the different security issues that has emanated due to the nature of the service delivery models of a cloud computing system. Furthermore, in this survey the researchers highlight the concept of trust in digital environment as well as the use of containers like Docker, the block chain principle, artificial intelligence, last findings in the field of cryptography and other new concepts used in the domain of security and privacy related to cloud computing environments. They provide in the end an overview of the metrics which are mandatory in order to have a green flavor of cloud computing and the strategies that are currently used.


Cloud computing is being heavily used for implementing different kinds of applications. Many of the client applications are being migrated to cloud for the reasons of cost and elasticity. Cloud computing is generally implemented on distributing computing wherein the Physical servers are heavily distributed considering both hardware and software, the connectivity among which is established through Internet. The cloud computing systems as such have many physical servers which contain many resources. The resources can be made to be shared among many users who are the tenants to the cloud computing system. The resources can be virtualized so as to provide shared resources to the clients. Scheduling is one of the most important task of a cloud computing system which is concerned with task scheduling, resource scheduling and scheduling Virtual Machin Migration. It is important to understand the issue of scheduling within a cloud computing system more in-depth so that any improvements with reference to scheduling can be investigated and implemented. For carrying in depth research, an OPEN source based cloud computing system is needed. OPEN STACK is one such OPEN source based cloud computing system that can be considered for experimenting the research findings that are related to cloud computing system. In this paper an overview on the way the Scheduling aspect per say has been implemented within OPEN STACK cloud computing system


Author(s):  
Navin Jambhekar ◽  
Chitra Anil Dhawale

Information security is a prime goal for every individual and organization. The travelling from client to cloud server can be prone to security issues. The big data storages are available through cloud computing system to facilitate mobile client. The information security can be provided to mobile client and cloud technology with the help of integrated parallel and distributed encryption and decryption mechanism. The traditional technologies include the plaintext stored across cloud and can be prone to security issues. The solution provided by applying the encrypted data upload and encrypted search. The clouds can work in collaboration; therefore, the encryption can also be done in collaboration. Some part of encryption handle by client and other part handled by cloud system. This chapter presents the security scenario of different security algorithms and the concept of mobile and cloud computing. This chapter precisely defines the security features of existing cloud and big data system and provides the new framework that helps to improve the data security over cloud computing and big data security system.


Author(s):  
Arumugam So Raman

This paper is documenting the potential of Fog Computing in Education. First, this study explores the difference between cloud computing and Fog Computing. Then the features of computing explained briefly. A tremendous increase in Internet usage among the people does not allow the sustainability to continue depending on Cloud Computing as a centralized web server, due to the truth that Cloud Computing system allows access to internet data as well as therefore making it feasible for users to availability, share along with store information in remote servers. With Fog Computing, multiple users, gadgets such as automobiles, wearable gizmos, sensing units, wise gadgets, an organization can accept one another utilizing their very own Fog facilities. In the educational sector, Fog computing technology boosts educational operations and provides a platform with agility, versus slowing them down or quitting them. Fog computing is a modern technology that is set for high development in the future, as well as will substantially improve day-to-day procedures for many sectors, including education. Finally, security issues and challenges of implementation Fog computing discussed.


Author(s):  
Liwen He ◽  
Feiyi Huang ◽  
Jie Zhang ◽  
Bin Liu ◽  
Chunling Chen ◽  
...  

Cloud computing brings efficiency improvement on resource utilization nd other benefits such as on-demand service provisioning, location independence and biquitous access, elastic resource pooling, pay as usage pricing mode, etc. However, t also introduces new security issues because the data management and ownership re separated, and the management is operated on a virtualized platform. In this paper,  novel dynamic secure interconnection (DSI) mechanism is proposed to isolate he cloud computing system into a couple of dynamic virtual trust zones with different ecurity policies implemented for different customers so as to enhance security. xperimental results are presented to demonstrate the feasibility and effectiveness of he DSI mechanism.


Author(s):  
Rosangela Melo ◽  
Vicente Sobrinho ◽  
Ivanildo Filho ◽  
Fábio Feliciano ◽  
Paulo Maciel

Cloud computing offer IT services to the users worldwide based on pay-as-you-go model. Furthermore, architectures and services that are provided by cloud computing system must have high availability, scalability, security and furthermore be fault tolerant. Plan these environments is not an easy task, it is necessary to ensure that undesirable situations or errors do not occur or can be minimized. The use of Sensitivity Analysis combined with the use of modeling hierarchy and the study of models for representing redundancy mechanisms arise in order to investigate the possible changes that these systems suffer and identify their shortcomings and propose improvements solutions for the planning of these systems. The use of redundancy techniques has been used to improve availability. In this work the redundancy mechanisms is a solution to improve the performance of environments in cloud computing.


2019 ◽  
pp. 639-656
Author(s):  
Navin Jambhekar ◽  
Chitra Anil Dhawale

Information security is a prime goal for every individual and organization. The travelling from client to cloud server can be prone to security issues. The big data storages are available through cloud computing system to facilitate mobile client. The information security can be provided to mobile client and cloud technology with the help of integrated parallel and distributed encryption and decryption mechanism. The traditional technologies include the plaintext stored across cloud and can be prone to security issues. The solution provided by applying the encrypted data upload and encrypted search. The clouds can work in collaboration; therefore, the encryption can also be done in collaboration. Some part of encryption handle by client and other part handled by cloud system. This chapter presents the security scenario of different security algorithms and the concept of mobile and cloud computing. This chapter precisely defines the security features of existing cloud and big data system and provides the new framework that helps to improve the data security over cloud computing and big data security system.


2013 ◽  
Vol 846-847 ◽  
pp. 1600-1603
Author(s):  
Ao Qiu Pei ◽  
Min Yang ◽  
Yan Bin Tang

Cloud computing based on a large number of distributed computer gathers a wide variety of computing resources data and builds huge virtual resources space and provides information technology resources for the majority of computer users through the Internet. Security issues is one of the core elements which constrains the depth development of cloud computing. It also is the hot issue of research in this field. This paper first analyzes the architecture and threat signatures of cloud computing system and data application model based on the data of cloud computing and data security threat characteristics. It builds a data security implementation model under cloud computing. Based on this, it builds information security model of cloud computing strategy and analyzes configuration program of the model in the cloud computing.


2014 ◽  
Vol 543-547 ◽  
pp. 3632-3635
Author(s):  
Hui Juan Xie ◽  
Wei She ◽  
Chang Hao Han

Cloud computing system preserves the security and privacy of a user's data by replicating data among several clouds and by using the secret sharing approach. It uses the database management system DBMS (data source) to manage and control the operations between the clients and them ulti-clouds inside a cloud service provider [1]. Generally speaking, The Shamir's threshold scheme is suitable for the shares in the cloud computing. The Shamir's threshold scheme as a secret sharing scheme will attract more attention in the cloud computing in future.


2013 ◽  
Vol 760-762 ◽  
pp. 959-965
Author(s):  
Xin Wan ◽  
Xiao Yin Liu ◽  
Xiang Lin Kong

Cloud computing has become a very attractive paradigm because of its economic and operational benefits. However, most enterprise executives hesitate to use cloud computing system due to the security and privacy challenges. We recognize that it is very important that enterprises assess the security risk before transforming their traditional information services into the cloud. In this paper, we discuss the existing information security risk assessment solutions and approaches, analysis the security challenges of the cloud computing. We propose a useful information security risk assessment and management framework for cloud computing environments and discuss the specific implement of framework.


Sign in / Sign up

Export Citation Format

Share Document