Research on Security of Agricultural Information Model Based on Cloud Computing

2014 ◽  
Vol 687-691 ◽  
pp. 1970-1973
Author(s):  
Qiu Dong Yu ◽  
Yun Chen Tian ◽  
Xu Feng Hua

In 2007, as a new computing paradigm, Cloud Computing go into people's sight. It is a technology that develop with the parallel computing, distributed computing, utility computing, a new computing paradigm and the emergence of grid computing development. It is also the result of network storage, virtualization and load balancing development. As an Internet-based super computing paradigm, cloud computing allows users to dynamically share the hardware, software, and data resources. In the process of sharing resources, it is inevitable to involve security issues of network transmission. In order to solve the security problems of network data integration cloud computing facing agricultural resources, this study proposes a network security model which can be proved to be much useful in the near future.

Cloud computing is the theoretical basis for future computing. All the global frameworks are now looking up to architecture which is purely based on cloud. Being the core of such a large web of network, it is important to consider the security aspects in a cloud based computing environment. This has resulted in a new research trend on the security issues of cloud. Cloud is a popular paradigm with extreme abilities and benefits for trending ICT environment. On the other end the major concern came in terms of security and privacy while adopting the cloud technology. This article is an effort to cover the challenges in fields like storage, virtualization and communication in cloud .Also it is a try to elaborate relevance of current cryptographic approach in order to increase security of cloud in ICT.


Author(s):  
Pappu Sowmya ◽  
R Kumar

Cloud computing is one of the trending technologies that provide boundless virtualized resources to the internet users as an important services through the internet, while providing the privacy and security. By using these cloud services, internet users get many parallel computing resources at low cost. It predicted that till 2016, revenues from the online business management spent $4 billion for data storage. Cloud is an open source platform structure, so it is having more chances to malicious attacks. Privacy, confidentiality, and security of stored data are primary security challenges in cloud computing. In cloud computing, ‘virtualization’ is one of the techniques dividing memory into different blocks. In most of the existing systems there is only single authority in the system to provide the encrypted keys. To fill the few security issues, this paper proposed a novel authenticated trust security model for secure virtualization system to encrypt the files. The proposed security model achieves the following functions: 1) allotting the VSM(VM Security Monitor) model for each virtual machine; 2) providing secret keys to encrypt and decrypt information by symmetric encryption.The contribution is a proposed architecture that provides a workable security that a cloud service provider can offer to its consumers. Detailed analysis and architecture design presented to elaborate security model.


2013 ◽  
Vol 2013 ◽  
pp. 1-31 ◽  
Author(s):  
Nattakarn Phaphoom ◽  
Xiaofeng Wang ◽  
Pekka Abrahamsson

The cloud computing paradigm has brought the benefits of utility computing to a global scale. It has gained paramount attention in recent years. Companies are seriously considering to adopt this new paradigm and expecting to receive significant benefits. In fact, the concept of cloud computing is not a revolution in terms of technology; it has been established based on the solid ground of virtualization, distributed system, and web services. To comprehend cloud computing, its foundations and technological landscape need to be adequately understood. This paper provides a comprehensive review on the building blocks of cloud computing and relevant technological aspects. It focuses on four key areas including architecture, virtualization, data management, and security issues.


2019 ◽  
pp. 1409-1439
Author(s):  
Niranjali Suresh ◽  
Manish Gupta

Cloud enables computing as a utility by offering convenient, on-demand network access to a centralized pool of configurable computing resources that can be rapidly deployed with great efficiency and minimal management overhead. In order to realize the benefits of the innovative cloud computing paradigm, companies must overcome heightened risks and security threats associated with it. Security and privacy in cloud is complex owing to newer dimensions in problem scope such as multi-tenant architectures and shared infrastructure, elasticity, measured services, viability etc. In this paper, we survey existing literature on cloud security issues and risks which then guides us to provide a section on auditing based to address the identified risks. We also provide a discourse on risk assessment frameworks to highlight benefits using such structured methods for understanding risks. The main contribution of the paper is investigation of current innovations in cloud computing that are targeted towards assisting in effective management of aforementioned risks and security issues. The compilation of discussed solutions has been developed to cater to specific cloud security, compliance and privacy requirements across industries by cloud service providers, software-as-a-service (SaaS) application vendors and advisory firms.


2019 ◽  
pp. 1124-1156
Author(s):  
Alshaimaa Abo-alian ◽  
Nagwa. L. Badr ◽  
Mohamed F. Tolba

Cloud computing is an emerging computing paradigm that is rapidly gaining attention as an alternative to other traditional hosted application models. The cloud environment provides on-demand, elastic and scalable services, moreover, it can provide these services at lower costs. However, this new paradigm poses new security issues and threats because cloud service providers are not in the same trust domain of cloud customers. Furthermore, data owners cannot control the underlying cloud environment. Therefore, new security practices are required to guarantee the availability, integrity, privacy and confidentiality of the outsourced data. This paper highlights the main security challenges of the cloud storage service and introduces some solutions to address those challenges. The proposed solutions present a way to protect the data integrity, privacy and confidentiality by integrating data auditing and access control methods.


2013 ◽  
Vol 846-847 ◽  
pp. 1600-1603
Author(s):  
Ao Qiu Pei ◽  
Min Yang ◽  
Yan Bin Tang

Cloud computing based on a large number of distributed computer gathers a wide variety of computing resources data and builds huge virtual resources space and provides information technology resources for the majority of computer users through the Internet. Security issues is one of the core elements which constrains the depth development of cloud computing. It also is the hot issue of research in this field. This paper first analyzes the architecture and threat signatures of cloud computing system and data application model based on the data of cloud computing and data security threat characteristics. It builds a data security implementation model under cloud computing. Based on this, it builds information security model of cloud computing strategy and analyzes configuration program of the model in the cloud computing.


2014 ◽  
Vol 556-562 ◽  
pp. 6196-6198
Author(s):  
Ying Rui Ma

Cloud computing is a fast-developing Internet computing paradigm. It includes large numbers of IT resources, forms a large virtual resources pool, and offers the remote Internet users on-demand IT services. The easy, cheap and elastic resources in cloud are pulling increasing attentions of the enterprises and users. It is becoming the attention of the academia, industrial sectors and governments. However, the security problem is confining its popularization and development.


Author(s):  
Niranjali Suresh ◽  
Manish Gupta

Cloud enables computing as a utility by offering convenient, on-demand network access to a centralized pool of configurable computing resources that can be rapidly deployed with great efficiency and minimal management overhead. In order to realize the benefits of the innovative cloud computing paradigm, companies must overcome heightened risks and security threats associated with it. Security and privacy in cloud is complex owing to newer dimensions in problem scope such as multi-tenant architectures and shared infrastructure, elasticity, measured services, viability etc. In this paper, we survey existing literature on cloud security issues and risks which then guides us to provide a section on auditing based to address the identified risks. We also provide a discourse on risk assessment frameworks to highlight benefits using such structured methods for understanding risks. The main contribution of the paper is investigation of current innovations in cloud computing that are targeted towards assisting in effective management of aforementioned risks and security issues. The compilation of discussed solutions has been developed to cater to specific cloud security, compliance and privacy requirements across industries by cloud service providers, software-as-a-service (SaaS) application vendors and advisory firms.


Author(s):  
Vighnesh Srinivasa Balaji

In recent times, the number of internet of things (IoT) devices/sensors increased tremendously. To support the computational demand of real-time latency-sensitive applications of largely geo-distributed IoT devices/sensors, a new computing paradigm named fog computing has been introduced. In this chapter, the authors will introduce fog computing, its difference in comparison to cloud computing, and issues related to fog. Among the three issues (i.e. service, structural, and security issues), this chapter scrutinizes and comprehensively discusses the service and structural issues also providing the service level objectives of the fog. They next provide various algorithms for computing in fog, the challenges faced, and future research directions. Among the various uses of fog, two scenarios are put to use.


Sign in / Sign up

Export Citation Format

Share Document