A Cloud Architecture for Service Security Management

2013 ◽  
Vol 416-417 ◽  
pp. 1413-1417
Author(s):  
Wen Zhe Jiao ◽  
Xiao Xue Ye

Cloud computing is revolutionizing how resources and services are used and managed, but the revolution comes with new security problems. This paper identifies current security issues in cloud computing environments. To manage service security, we propose a new architecture based on Service Level Agreements (SLAs). To ensure the integrity of data service and relieve the security concerns of users, we implement a new data auditing algorithm in this architecture. Furthermore, we present four-layer cryptography analysis to ensure data security.

Web Services ◽  
2019 ◽  
pp. 769-787
Author(s):  
Ajay Rawat ◽  
Shivani Gambhir

Cloud computing lacks control over physical and logical aspects of the system, which imposes profound changes in security and privacy procedure; hence, it needs a high level of security. Currently, many researchers and developments are being done to provide client service-level agreements regarding security issues. These researchers are attracted towards biometrics and its security applications, since it is based on biometric traits, thus providing a high level of security. Due to biometrics' benefits and cloud advantages, the collaboration of cloud and biometrics have open up wide areas this field. This chapter discusses some case studies of integration of biometrics and cloud computing.


Author(s):  
Marcus Tanque

Converging Cloud computing with Internet of Things transformed organizations' traditional technologies. This chapter examines the intersection of cloud computing and internet of things in consort with how these solutions often interact on the internet. Vendors develop CloudIoT capabilities to support organizations' day-to-day operations. IoT is a combined platform encompassing physical and virtual nodes. IoT objects comprise device-to-device data sharing, machine-to-machine provisioning, sensors, actuators, and processors. These systems may be deployed as hardware components and applications software. This chapter also emphasizes data security, reliability, resource provisioning, service-level agreement, quality of service, IoT, privacy, and device integration. This chapter also highlights operational benefits and/or security issues affecting CC and IoT technologies.


Author(s):  
Ajay Rawat ◽  
Shivani Gambhir

Cloud computing lacks control over physical and logical aspects of the system, which imposes profound changes in security and privacy procedure; hence, it needs a high level of security. Currently, many researchers and developments are being done to provide client service-level agreements regarding security issues. These researchers are attracted towards biometrics and its security applications, since it is based on biometric traits, thus providing a high level of security. Due to biometrics' benefits and cloud advantages, the collaboration of cloud and biometrics have open up wide areas this field. This chapter discusses some case studies of integration of biometrics and cloud computing.


Biometrics ◽  
2017 ◽  
pp. 1-19
Author(s):  
Ajay Rawat ◽  
Shivani Gambhir

Cloud computing lacks control over physical and logical aspects of the system, which imposes profound changes in security and privacy procedure; hence, it needs a high level of security. Currently, many researchers and developments are being done to provide client service-level agreements regarding security issues. These researchers are attracted towards biometrics and its security applications, since it is based on biometric traits, thus providing a high level of security. Due to biometrics' benefits and cloud advantages, the collaboration of cloud and biometrics have open up wide areas this field. This chapter discusses some case studies of integration of biometrics and cloud computing.


Author(s):  
Nikoletta Mavrogeorgi ◽  
Spyridon V. Gogouvitis ◽  
Athanasios Voulodimos ◽  
Vasilios Alexandrou

The need for online storage and backup of data constantly increases. Many domains, such as media, enterprises, healthcare, and telecommunications need to store large amounts of data and access them rapidly any time and from any geographic location. Storage Cloud environments satisfy these requirements and can therefore provide an adequate solution for these needs. Customers of Cloud environments do not need to own any hardware for storing their data or handle management tasks, such as backups, replication levels, etc. In order for customers to be willing to move their data to Cloud solutions, proper Service Level Agreements (SLAs) should be offered and guaranteed. SLA is a contract between the customer and the service provider, where the terms and conditions of the offered service are agreed upon. In this chapter, the authors present existing SLA schemas and SLA management mechanisms and compare various features that Cloud providers support with existing SLAs. Finally, they address the problem of managing SLAs in cloud computing environments exploiting the content term that concerns the stored objects, in order to provide more efficient capabilities to the customer.


2012 ◽  
Vol 198-199 ◽  
pp. 435-438
Author(s):  
You Chan Zhu ◽  
Peng Liu ◽  
Jun Ting Wang

This paper first analyzes the security issues that are hidden in the public Cloud Computing environments, then puts forward to the corresponding solutions of various security issues, and lastly summarizes the importance of choosing suitable cloud service for enterprises.


2017 ◽  
Vol 7 (1.5) ◽  
pp. 253
Author(s):  
N. Srinivasu ◽  
O. Sree Priyanka ◽  
M. Prudhvi ◽  
G. Meghana

Cloud Security was provided for the services such as storage, network, applications and software through internet. The Security was given at each layer (Saas, Paas, and Iaas), in each layer, there are some security threats which became the major problem in cloud computing. In Saas, the security issues are mainly present in Web Application services and this issue can be overcome by web application scanners and service level agreement(SLA). In Paas, the major problem is Data Transmission. During transmission of data, some data may be lost or modified. The PaaS environment accomplishes proficiency to some extent through duplication of information. The duplication of information makes high accessibility of information for engineers and clients. However, data is never fully deleted instead the pointers to the data are deleted. In order to overcome this problem the techniques that used are encryption[12], data backup. In Iaas the security threat that occurs in is virtualization and the techniques that are used to overcome the threats are Dynamic Security Provisioning(DSC), operational security procedure, for which Cloud Software is available in the market, for e.g. Eucalyptus, Nimbus 6.


Author(s):  
Mohamed M. Ould Deye ◽  
Mamadou Thiongane ◽  
Mbaye Sene

Auto-scaling is one of the most important features in Cloud computing. This feature promises cloud computing customers the ability to best adapt the capacity of their systems to the load they are facing while maintaining the Quality of Service (QoS). This adaptation will be done automatically by increasing or decreasing the amount of resources being leveraged against the workload’s resource demands. There are two types and several techniques of auto-scaling proposed in the literature. However, regardless the type or technique of auto-scaling used, over-provisioning or under-provisioning problem is often observed. In this paper, we model the auto-scaling mechanism with the Stochastic Well-formed coloured Nets (SWN). The simulation of the SWN model allows us to find the state of the system (the number of requests to be dispatched, the idle times of the started resources) from which the auto-scaling mechanism must be operated in order to minimize the amount of used resources without violating the service-level agreements (SLA).


Sign in / Sign up

Export Citation Format

Share Document