The Establishment of Information Management Security under Cloud Computing Environment

2015 ◽  
Vol 713-715 ◽  
pp. 2405-2408 ◽  
Author(s):  
Tao Li

Cloud computing is Internet-based computing model which can share new information resources through virtualization, it can be dynamically according to the user needs to provide computing, storage, network bandwidth, software and other resources and it has great market potential and become the focus of the current IT giants construction of the project. However, just as other new things, there are flaws and loopholes need to continuously improve and enhance the development process in the future of cloud computing. In this paper, the development process of computing services of cloud security incidents is discussed and we analyzes the potential security risks of cloud computing services, security building and then put forward the ideas of security management development under cloud computing environment.

2021 ◽  
Vol 39 (1B) ◽  
pp. 41-52
Author(s):  
Turkan A. Khaleel

The concept of cloud computing has recently changed how hardware, software, and information are handled. However, security challenges and credibility requirements have never changed and may have increased. Protecting cloud computing and providing security for its resources and users is one of the critical challenges. As a result, most users are afraid to use their resources, because many security problems must be met. For example, authentication and reliability are major security constraints and must be provided in a cloud computing environment. There is a wide range of authentication protocols in use, but the researcher has recommended the Kerberos protocol to represent and test it in a complex environment such as a mixed cloud environment. A model has been developed to implement Kerberos authentication in a hybrid cloud computing environment to securely access the cloud computing services provided. This model is represented using the OPNET Modeler 14.5 simulation system. The network efficiency was measured before and after the hacker. Findings presented in this research are supporting the ability of the Kerberos protocol to prevent illegal access to cloud computing services, whether from within the private cloud or the public cloud. While maintaining the efficient performance of the network.


Author(s):  
Sugandh Bhatia ◽  
Jyoteesh Malhotra

The privacy, handling, management and security of information in a cloud environment are complex and tedious tasks to achieve. With minimum investment and reduced cost of operations an organization can avail and apply the benefits of cloud computing into its business. This computing paradigm is based upon a pay as per your usage model. Moreover, security, privacy, compliance, risk management and service level agreement are critical issues in cloud computing environment. In fact, there is dire need of a model which can tackle and handle all the security and privacy issues. Therefore, we suggest a CSPCR model for evaluating the preparation of an organization to handle or to counter the threats, hazards in cloud computing environment. CSPCR discusses rules and regulations which are considered as pre-requisites in migrating or shifting to cloud computing services.


2021 ◽  
Vol 27 (2) ◽  
Author(s):  
H. Hamza ◽  
A.F.D Kana ◽  
M.Y. Tanko ◽  
S. Aliyu

Cloud computing is a model that aims to deliver a reliable, customizable and scalable computing environment for end-users. Cloud computing is one of the most widely used technologies embraced by sectors and academia, offering a versatile and effective way to store and retrieve documents. The performance and efficiency of cloud computing services always depend upon the performance of the execution of user tasks submitted to the cloud system. Scheduling of user tasks plays a significant role in improving the performance of cloud services. Accordingly, many dependent task scheduling algorithms have been proposed to improve the performance of cloud services and resource utilization; however, most of the techniques for determining which task should be scheduled next are inefficient. This research provided an enhanced algorithm for scheduling dependent tasks in cloud that aims at improving the overall performance of the system. The Dependent tasks were represented as a directed acyclic graph (DAG) and the number of dependent tasks and their total running time were used as a heuristic for determining which path should be explored first. Best first search approach based on the defined heuristic was used to traverse the graph to determine which task should be scheduled next. The results of the simulation using WorkflowSim toolkit showed an average improvement of 18% and 19% on waiting time and turnaround time were achieved respectively.


Author(s):  
Lavanya S. ◽  
Susila N. ◽  
Venkatachalam K.

In recent times, the cloud has become a leading technology demanding its functionality in every business. According to research firm IDC and Gartner study, nearly one-third of the worldwide enterprise application market will be SaaS-based by 2018, driving annual SaaS revenue to $50.8 billion, from $22.6 billion in 2013. Downtime is treated as the primary drawback which may affect great deals in businesses. The service unavailability leads to a major disruption affecting the business environment. Hence, utmost care should be taken to scale the availability of services. As cloud computing has plenty of uncertainty with respect to network bandwidth and resources accessibility, delegating the computing resources as services should be scheduled accordingly. This chapter proposes a study on cloud of clouds and its impact on a business enterprise. It is also decided to propose a suitable scheduling algorithm to the cloud of cloud environment so as to trim the downtime problem faced by the cloud computing environment.


2013 ◽  
Vol 347-350 ◽  
pp. 3312-3316
Author(s):  
Hong Jun Chen ◽  
Xue Qin Wu

The positive factors of the cloud computing: the great commercial value, the cheap and convenient use, has been recognized widely. But there are many risks on security. These security risks will greatly restrict the development of cloud computing. Cloud security risks such as: the cloud platform is easily vulnerable, cloud resources is easily abused, the cloud platform data is accessed by unauthorized user or the data is missing, the violations in the network is difficult to trace and survey, and the service providers replacement will affect the migration of the users data and services. So we research the virtualization technology, data backup and disaster recovery technology, encryption technology of data storage and transmission, the authentication technology of service providers and users, risk assessment, and legal constraints and safety training. Our research is strived to obtain a secure cloud computing environment.


2015 ◽  
Vol 9 (1and2) ◽  
Author(s):  
Akshay Mehta ◽  
Dr. Sanjay Kumar Dubey

Cloud Computing has emerged very fast in the IT industry. It is based on virtualization technology and provides internet based computing which provides resource pooling, services sharing and on demand access. Its evolution has reduced must of the cost of enterprises as well as of the other industries working with a huge data. With cloud computing emerging at a much faster rate, the situation may soon be changed. But, despite the fact that it provides a number of facilities to the service providers, it has quite a number of issues related to it. The most important issue related to cloud is its security. From the consumer’s perspective, cloud computing security concerns, especially data security and privacy protection issues, remain the primary inhibitor of cloud computing services. Security is the reason that hinders many enterprises to enter into cloud. So this paper gives a detail of the security risks related to cloud and the possible measures which the enterprises need to ensure before entering Cloud Computing.


2013 ◽  
Vol 284-287 ◽  
pp. 3502-3506 ◽  
Author(s):  
Shu Ching Wang ◽  
Wen Pin Liao ◽  
Kuo Qin Yan ◽  
Shun Sheng Wang ◽  
Szu Hao Tsai

Nowadays, network bandwidth and hardware technology are developing rapidly, resulting in the vigorous development of the Internet. However, cloud computing, an Internet-based development in which dynamically scalable and often virtualized resources are provided as a service over the Internet has become a significant issue. According to the characteristics of cloud computing, there are a lot of applications and data centers in the cloud-computing environment, hence, the issues of information and communication security and authentication must to be considered. However, the most of the studies on the security and authentication require large amounts of computing resource; therefore not suitable for the cloud-computing environment. In this paper, a lightweight computing protocol, Lightweight Authentication Protocol (LAP), is proposed to enhance the security of cloud computing environment and provide the authentication of service.


Author(s):  
Salete Oro Boff ◽  
Patrícia Tavares Ferreira Kaufmann

Resumo: O presente artigo tem como finalidade abordar aspectos positivos e negativos da Revolução da Informação no contexto de globalização. Para o enfrentamento desse tema, o trabalho verifica a nova faceta da democracia perante o ambiente cloud computing aliado à “terceira via” como alternativa de democracia no cenário das novas tecnologias da informação e da comunicação. O estudo é de natureza bibliográfica, baseado na utilização de documentação indireta, que permite dar suporte ao texto e suas possíveis conclusões.Palavras-chave: Globalização; Cloud computing; Democracia; “A terceira via”. Abstract: This paper has the purpose of addressing positive and negative aspects of the Information Revolution in the context of globalization. To deal with this issue, the present paper verifies the new face of democracy in relation to the cloud computing environment combined with “the third way" democracy as an alternative in the scenario of new information technologies and communication. The study is of bibliographic nature and is based on the use of indirect documentation, which makes it possible to support text and its possible conclusions.Keywords: Globalization; Cloud computing; Democracy; “The third way”. 


Sign in / Sign up

Export Citation Format

Share Document