Better Security and Encryption Within Cloud Computing Systems

2019 ◽  
pp. 812-823
Author(s):  
K. Y. B. Williams ◽  
Jimmy A. G. Griffin

Better security and encryption is necessary with regard to all forms of Cloud Computing, Cloud Infrastructure, and Cloud Storage. Areas that are affected the hardest by security breaches include: retail/e-commerce, communications, transportation, and banking. Illustrated within this article are ways that companies such as Walmart, Verizon, Wells-Fargo, and BWM would be affected by a lapse in security and/or a breach in their Cloud Infrastructure. In this article issues that can magnify these breaches and data loss is discussed as it relates to Cloud Structure and Cloud Services based on known vulnerabilities and lack of product testing. This article concludes with why it is necessary to have Public Policies as part of the governing system on Cloud Computing, Cloud Infrastructure, and Cloud Storage

Author(s):  
K.Y.B. Williams ◽  
Jimmy A.G. Griffin

Better security and encryption is necessary with regard to all forms of Cloud Computing, Cloud Infrastructure, and Cloud Storage. Areas that are affected the hardest by security breaches include: retail/e-commerce, communications, transportation, and banking. Illustrated within this article are ways that companies such as Walmart, Verizon, Wells-Fargo, and BWM would be affected by a lapse in security and/or a breach in their Cloud Infrastructure. In this article issues that can magnify these breaches and data loss is discussed as it relates to Cloud Structure and Cloud Services based on known vulnerabilities and lack of product testing. This article concludes with why it is necessary to have Public Policies as part of the governing system on Cloud Computing, Cloud Infrastructure, and Cloud Storage


2021 ◽  
Vol 11 (19) ◽  
pp. 9005
Author(s):  
Yara Alghofaili ◽  
Albatul Albattah ◽  
Noura Alrajeh ◽  
Murad A. Rassam ◽  
Bander Ali Saleh Al-rimy

Cloud computing is currently becoming a well-known buzzword in which business titans, such as Microsoft, Amazon, and Google, among others, are at the forefront in developing and providing sophisticated cloud computing systems to their users in a cost-effective manner. Security is the biggest concern for cloud computing and is a major obstacle to users adopting cloud computing systems. Maintaining the security of cloud computing is important, especially for the infrastructure. Several research works have been conducted in the cloud infrastructure security area; however, some gaps have not been completely addressed, while new challenges continue to arise. This paper presents a comprehensive survey of the security issues at different cloud infrastructure levels (e.g., application, network, host, and data). It investigates the most prominent issues that may affect the cloud computing business model with regard to infrastructure. It further discusses the current solutions proposed in the literature to mitigate the different security issues at each level. To assist in solving the issues, the challenges that are still unsolved are summarized. Based on the exploration of the current challenges, some cloud features such as flexibility, elasticity and the multi-tenancy are found to pose new challenges at each infrastructure level. More specifically, the multi-tenancy is found to have the most impact at all infrastructure levels, as it can lead to several security problems such as unavailability, abuse, data loss and privacy breach. This survey concludes by giving some recommendations for future research.


Author(s):  
Olexander Melnikov ◽  
◽  
Konstantin Petrov ◽  
Igor Kobzev ◽  
Viktor Kosenko ◽  
...  

The article considers the development and implementation of cloud services in the work of government agencies. The classification of the choice of cloud service providers is offered, which can serve as a basis for decision making. The basics of cloud computing technology are analyzed. The COVID-19 pandemic has identified the benefits of cloud services in remote work Government agencies at all levels need to move to cloud infrastructure. Analyze the prospects of cloud computing in Ukraine as the basis of e-governance in development. This is necessary for the rapid provision of quality services, flexible, large-scale and economical technological base. The transfer of electronic information interaction in the cloud makes it possible to attract a wide range of users with relatively low material costs. Automation of processes and their transfer to the cloud environment make it possible to speed up the process of providing services, as well as provide citizens with minimal time to obtain certain information. The article also lists the risks that exist in the transition to cloud services and the shortcomings that may arise in the process of using them.


Author(s):  
Ute Riemann

Business processes are not only variable they are as well dynamic. A key benefit of Business Process Management (BPM) is the ability to adjust business processes accordingly in response to changing market requirements. In parallel to BPM, enterprise cloud computing technology has emerged to provide a more cost effective solution to businesses and services while making use of inexpensive computing solutions, which combines pervasive, internet, and virtualization technologies (). Despite the slow start, the business benefits of cloud computing are as such that the transition of BPM to the cloud is now underway. Cloud services refer to the operation of a virtualized, automated, and service-oriented IT landscape allowing the flexible provision and usage-based invoicing of resources, services, and applications via a network or the internet. The generic term “X-as-a-Service” summarize the business models delivering almost everything as a service. BPM in the cloud is often regarded as a SaaS application. More recently, BPM is being regarded as a PaaS as it facilitates the creation and deployment of applications, in this case business process solutions. The PaaS landscape is the least developed of the four cloud based software delivery models previously discussed. PaaS vendors, such as IBM, Oracle, and Microsoft delivered an application platform with managed cloud infrastructure services however, more recently the PaaS market has begun to evolve to include other middleware capabilities including process management. BPM PaaS is the delivery of BPM technology as a service via a cloud service provider. For the classification as a PaaS a BPM suite requires the following capabilities: the architecture should be multi-tenant, hosting should be off premise and it should offer elasticity and metering by use capabilities. When we refer to BPM in the cloud, what we are really referring to is a combination of BPM PaaS and BPaaS (Business Process as a Service). Business Process as a Service (BPaaS) is a set of pre-defined business processes that allows the execution of customized business processes in the cloud. BPaaS is a complete pre-integrated BPM platform hosted in the cloud and delivered as a service, for the development and execution of general-purpose business process application. Although such a service harbors an economic potential there are remaining questions: Can an individual and company-specific business process supported by a standardized cloud solution, or should we protect process creativity and competitive differentiation by allowing the company to design the processes individually and solely support basic data flows and structures? Does it make sense to take a software solution “out of the box” that handles both data and process in a cloud environment, or would this hinder the creativity of business (process) development leading to a lower quality of processes and consequently to a decrease in the competitive positioning of a company? How to manage the inherent compliance and security topic. Within a completely integrated business application system, all required security aspects can be implemented as a safeguarding with just enough money. Within the cloud, however, advanced standards and identity prove is required to monitor and measure information exchange across the federation. Thereby there seems to be no need for developing new protocols, but a standardized way to collect and evaluate the collected information.


Author(s):  
Вячеслав Вікторович Фролов

The article is devoted to the analysis of modern approaches that ensure the security of cloud services. Since cloud computing is one of the fastest growing areas among information technology, it is extremely important to ensure the safety and reliability of processes occurring in the clouds and to secure the interaction between the client and the provider of cloud services. Given that fears about data loss and their compromise are one of the main reasons that some companies do not transfer their calculations to the clouds. The object of research and analysis of this work are cloud services, which are provided by various cloud service providers. The aim of the study of this work is to compare existing approaches that provide information security for cloud services, as well as offer a new approach based on the principle of diversity. There are many approaches that ensure their safety, using both traditional and cloud-specific. The multi-cloud approach is one of the most promising strategies for improving reliability by reserving cloud resources on the servers of various cloud service providers. It is shown that it is necessary to use diversity to ensure the reliability and safety of critical system components. The principle of diversity is to use a unique version of each resource thanks to a special combination of a cloud computing provider, the geographical location of data centers, cloud service presentation models, and cloud infrastructure deployment models. The differences between cloud providers and which combination of services are preferable to others in terms of productivity are discussed in detail. In addition, best practices for securing cloud resources are reviewed. As a result, this paper concludes that there is a problem of insufficient security and reliability of cloud computing and how to reduce threats in order to avoid a common cause failure and, as a result, loss of confidential data or system downtime using diversity of cloud services.


2021 ◽  
Author(s):  
Olena Ponomaryova ◽  
◽  
Sergy Ponomaryiov ◽  

The current problem of transition to the use of "Cloud Computing" in the process of assessing possible use has been reflected in this study. Assessments of the capabilities of cloud services have been conducted, which are part of a group study of cloud computing as a platform for creating a communication environment in the scientific activities of the Free Economic Zone. The essence of the concept of cloud computing is to provide end users with remote dynamic access to services, computing resources and applications via the Internet. The main possibilities and functions of the information space of scientific communications have been considered. In the process of evaluating the possible use of cloud solutions, the main properties, capabilities and characteristics have also been considered. Web-services based on cloud computing technology in terms of meeting the goals of the scientific community have been analyzed. The most widely used and widely used cloud storage services today that can be used to build a research communication platform are cloud infrastructure providers Google, Amazon and Microsoft. When using the capabilities of these services, favorable conditions are created for the translation of all necessary functions into cyberspace. Today, no more than 37% of domestic organizations actually use cloud technologies to optimize their IT infrastructures, although the COVID-19 pandemic has significantly accelerated this process. Experts claim that Cloud Computing opens access to powerful resources, as well as provides a real opportunity to overcome the technological gap that separates Ukraine from more developed countries. With the successful implementation of such a transition, it is possible to organize a platform of communication environment with new features that meet modern requirements for safety and ease of use in scientific activities. Thus, "cloud computing" is a new approach that reduces the complexity of IT systems, through the use of a wide range of efficient technologies, self-managed and available on demand within the virtual infrastructure, as well as consumed as services.


2019 ◽  
pp. 211-225
Author(s):  
Mouna Jouini ◽  
Latifa Ben Arfa Rabai

Cloud computing technology is a relatively new concept of offering reliable and virtualized resources, software and hardware on demand to users. It presents a new technology to deliver computing resources as a service. It allows several benefits for example services on demand, provisioning, shared resources and pay per use and suffers from several challenges. In fact, security presents a major obstacle in cloud computing adoption. In this paper, the authors will deal with security problems in cloud computing systems and estimate security breaches using a quantitative security risk assessment model. Finally, the authors use this quantitative model to solve these problems in cloud environments.


2018 ◽  
Vol 16 (1) ◽  
pp. 1-16 ◽  
Author(s):  
Mbarek Marwan ◽  
Ali Kartit ◽  
Hassan Ouahmane

Nowadays, modern healthcare providers create massive medical images every day because of the recent progress in imaging tools. This is generally due to the increasing number of patients demanding medical services. This has resulted in a continuous demand of a large storage space. Unfortunately, healthcare domains still use local data centers for storing medical data and managing business processes. This has significant negative impacts on operating costs associated with licensing fees and maintenance. To overcome these challenges, healthcare organizations are interested in adopting cloud storage rather than on-premise hosted solutions. This is mainly justified by the scalability, cost savings and availability of cloud services. The primary objective of this model is to outsource data and delegate IT computations to an external party. The latter delivers needed storage systems via the Internet to fulfill client's demands. Even though this model provides significant cost advantages, using cloud storage raises security challenges. To this aim, this article describes several solutions which were proposed to ensure data protection. The existing implementations suffer from many limitations. The authors propose a framework to secure the storage of medical images over cloud computing. In this regard, they use multi-region segmentation and watermarking techniques to maintain both confidentiality and integrity. In addition, they rely on an ABAC model to ensure access control to cloud storage. This solution mainly includes four functions, i.e., (1) split data for privacy protection, (2) authentication for medical dataset accessing, (3) integrity checking, and (4) access control to enforce security measures. Hence, the proposal is an appropriate solution to meet privacy requirements.


2016 ◽  
Vol 2 (1) ◽  
Author(s):  
Anastasia Panori ◽  
Agustín González-Quel ◽  
Miguel Tavares ◽  
Dimitris Simitopoulos ◽  
Julián Arroyo

During the last decade, there has been an increased interest on cloud computing and especially on the adoption of public cloud services. The process of developing cloud-based public services or migrating existing ones to the Cloud is considered to be of particular interest—as it may require the selection of the most suitable applications as well as their transformation to fit in the new cloud environment. This paper aims at presenting the main findings of a migration process regarding smart city applications to a cloud infrastructure. First, it summarises the methodology along with the main steps followed by the cities of Agueda (Portugal), Thessaloniki (Greece) and Valladolid (Spain) in order to implement this migration process within the framework of the STORM CLOUDS project. Furthermore, it illustrates some crucial results regarding monitoring and validation aspects during the empirical application that was conducted via these pilots. These findings should be received as a helpful experience for future efforts designed by cities or other organisations that are willing to move their applications to the Cloud.


The cloud computing has utilization of pervasive or distributed models on demand access to highly configurable computing devices for fast provision and less management efforts. The complex architecture, multitenant and virtual environment in cloud infrastructure asks for risks identification and mitigation. The cloud computing model business needs reassurances so it’s prime consideration for testing the cloud services. This research primarily identifies various risks, threats, testing models and vulnerabilities in cloud computing environment. This research has implemented the risk assessment and cloud readiness for PaaS environment by scanning its code with a software vendor. The research makes an emphasis on risk minimization strategies and trust evaluation in cloud computing environment.


Sign in / Sign up

Export Citation Format

Share Document