Framework and Assessment Model for Cloud Computing Security

2013 ◽  
Vol 791-793 ◽  
pp. 1739-1742
Author(s):  
Wei Min Wu

In the last few years, cloud computing has grown from a business concept to one of the fastest growing IT industry. It is a fundamental change and represents a movement towards the intensive, large scale specialized calculation model. But as more information and organizations are moved to the cloud, more concerns about security emerge. This paper discusses security issues, requirements and challenges, and provides a Cloud Computing security framework and an ESI assessment model.

Author(s):  
Sambaiah G ◽  
Hyma Birudaraju

In this paper, we discuss security surveillance for Big data, cloud computing, Map Reduce and Hadoop environment. The focal point is on security surveillance in cloud computing that are corresponding with big data. Big data applications are a admirable beneficent to organizations, business, companies and many large scale and small scale industries.We also talk about various attainable solutions for the issues in Hadoop and cloud computing security. Cloud computing security is being blossom at a rapid pace which incorporate with computer security, network security, information security, and data privacy.Cloud computing plays a very crucial role in keep safe data, applications and the related infrastructure with the help of technologies, policies,controls , and big data tools. Moreover, Cloud computing, big data and its applications, advantages are likely to illustrated the most hopeful new boundaries in science.


2018 ◽  
Vol 7 (2.21) ◽  
pp. 355
Author(s):  
P Sheela Gowr ◽  
N Kumar

Cloud computing was a hasting expertise which has innovated to a collection of new explores. A sub-ordinate device for Information services, it has an ability towards encourage development by feeding convenient environments for a choice of forms of development is different sequence. Clouds usually consider being eco-friendly, however keep it has open to the diversity of some security issues to can change together the feeder as well as users of these cloud services. In this issue are principally associated to the protection of the information flow throughout also being store in the cloud, with simple problems along with data ease of use, data right to use and data confidentiality. Data encryption and service authentication scheme has been initiated by the industries to deal with them. In this paper analyse and examine different issues on security beside with the different procedure worn by the industries to solve these effects. 


Author(s):  
Ainul Azila Che Fauzi ◽  
A. Noraziah ◽  
Tutut Herawan ◽  
Noriyani Mohd. Zin

Author(s):  
Natasha Csicsmann ◽  
Victoria McIntyre ◽  
Patrick Shea ◽  
Syed S. Rizvi

Strong authentication and encryption schemes help cloud stakeholders in performing the robust and accurate cloud auditing of a potential service provider. All security-related issues and challenges, therefore, need to be addressed before a ubiquitous adoption of cloud computing. In this chapter, the authors provide an overview of existing biometrics-based security technologies and discuss some of the open research issues that need to be addressed for making biometric technology an effective tool for cloud computing security. Finally, this chapter provides a performance analysis on the use of large-scale biometrics-based authentication systems for different cloud computing platforms.


Author(s):  
Prasanta K. Manohari ◽  
Niranjan K. Ray

Cloud computing is one of the emerging technology in the recent times which has varieties of applications at different fields. It is an Internet dependent technology and it store and maintain the data in a cloud data center. Cloud center usually supports more numbers of user, applications and data. In the same time, it also suffered with numerous challenges. Security is a key requirement for cloud data center. Different security mechanisms are proposed for cloud computing environment. In this chapter, we address the background of cloud computing, security risk, requirements, issues, and some of the security techniques are discussed. We discuss different security issues and focus on some existing solutions.


2014 ◽  
Vol 610 ◽  
pp. 695-698
Author(s):  
Qian Tao ◽  
Bo Pan ◽  
Wen Quan Cui

In recent years, the rapid development of cloud computing brings significant innovation in the whole IT industry. For the local tasks scheduling on each computational node of the top model of weapon network, an open task scheduling framework was introduced a task accept control scheme based on the tasks based on load balancing, quality of service (QoS) and an improved constant bandwidth server algorithm was presented. The result of simulation shows that the scheduling policies can improve the schedule speed when the number of tasks increases and can meet the demand better for the real time requirementsof the tactical training evaluation system for complexity and Large-scale.


Author(s):  
Dina Mohsen Zoughbi ◽  
Nitul Dutta

Cloud computing is the most important technology at the present time, in terms of reducing applications costs and makes them more scalable and flexible. As the cloud currency is based on building virtualization technology, so it can secure a large-scale environment with limited security capacity such as the cloud. Where, Malicious activities lead the attackers to penetrate virtualization technologies that endanger the infrastructure, and then enabling attacker access to other virtual machines which running on the same vulnerable device. The proposed work in this paper is to review and discuss the attacks and intrusions that allow a malicious virtual machine (VM) to penetrate hypervisor, especially the technologies that malicious virtual machines work on, to steal more than their allocated quota from material resources, and the use of side channels to steal data and Passing buffer barriers between virtual machines. This paper is based on the Security Study of Cloud Hypervisors and classification of vulnerabilities, security issues, and possible solutions that virtual machines are exposed to. Therefore, we aim to provide researchers, academics, and industry with a better understanding of all attacks and defense mechanisms to protect cloud security. and work on building a new security architecture in a virtual technology based on hypervisor to protect and ensure the security of the cloud.


Sign in / Sign up

Export Citation Format

Share Document