scholarly journals CLOUD COMPUTING APPLICATIONS AND SECURITY ISSUES: AN ANALYTICAL SURVEY

Author(s):  
ARATI KOTHARI

Cloud computing, a rapidly developing information technology has becoming a well-known the whole world. Cloud computing is Internet-based computing, whereby shared resources, software and information, are provided to computers and devices on-demand, like the electricity grid. Cloud computing is the product of the fusion of traditional computing technology and network technology like grid computing, distributed computing parallel computing and so on. Companies, such as Amazon, Google, Microsoft and so on, accelerate their paces in developing Cloud Computing systems and enhancing their services to provide for a larger amount of users. However, security and privacy issues present a strong barrier for users to adapt into Cloud Computing systems. It is a new technology that satisfies a user’s requirement for computing resources like networks, storage, servers, services and applications, without physically acquiring them. It reduces the overhead of the organization of marinating the large system but it has associated risks and threats also which include – security, data leakage, insecure interface and sharing of resources and inside attacks.

2021 ◽  
Author(s):  
Ramla Humayun

Review on Cloud-Computing and the security and privacy issues related with it.


Author(s):  
Mouna Jouini ◽  
Latifa Ben Arfa Rabai

Cloud computing technology is a relatively new concept of offering reliable and virtualized resources, software and hardware on demand to users. It presents a new technology to deliver computing resources as a service. It allows several benefits for example services on demand, provisioning, shared resources and pay per use and suffers from several challenges. In fact, security presents a major obstacle in cloud computing adoption. In this paper, the authors will deal with security problems in cloud computing systems and estimate security breaches using a quantitative security risk assessment model. Finally, the authors use this quantitative model to solve these problems in cloud environments.


2019 ◽  
Vol 8 (4) ◽  
pp. 3440-3443

Cloud computing is attaining a pace for resolving complex computing problems. It is basically an abstracted layer of technology which has three service models: Infrastructure as a Service (IaaS), (Software as a Service) SaaS and (Platform as a Service) PaaS, which provide infrastructure, software and a platform to end-user. On the contrary, there are lots of issues which include energy efficiency, cloud integrity, data recovery, backup, etc. Security and privacy issues like data confidentiality and integrity are the most critical ones. This paper highlights the security issues related to data stored and data access from back end (service provider). It collates each and every application related to cloud and available techniques to resolve some issues. Very less research work has been done on applications and security issues of cloud computing together. This article is an analysis of cloud computing applications and security issues as it is used to a great extent. In future this paper will help research community to grab information regarding applications and techniques to resolve the issues related to Cloud computing.


Author(s):  
D. N. Kartheek ◽  
Bharath Bhushan

The inherent features of internet of things (IoT) devices, like limited computational power and storage, lead to a novel platform to efficiently process data. Fog computing came into picture to bridge the gap between IoT devices and data centres. The main purpose of fog computing is to speed up the computing processing. Cloud computing is not feasible for many IoT applications; therefore, fog computing is a perfect alternative. Fog computing is suitable for many IoT services as it has many extensive benefits such as reduced latency, decreased bandwidth, and enhanced security. However, the characteristics of fog raise new security and privacy issues. The existing security and privacy measures of cloud computing cannot be directly applied to fog computing. This chapter gives an overview of current security and privacy concerns, especially for the fog computing. This survey mainly focuses on ongoing research, security challenges, and trends in security and privacy issues for fog computing.


2021 ◽  
Author(s):  
Ramla Humayun

Review on Cloud-Computing and the security and privacy issues related with it.


2015 ◽  
pp. 1527-1547
Author(s):  
Miodrag J. Mihaljević ◽  
Hideki Imai

The main security and privacy issues of cloud computing as well as the related implications are addressed, and a general framework for achieving the goals is summarized. This chapter basically considers scientific and educational employment of a cloud as a particular instance of a public cloud and its security, and as a potentially specific issue, a request for a heavy minimization of the costs implied by security is pointed out. Consequently, the problem of minimization of the overheads implied by security/privacy mechanisms is addressed. The main security requirements are given as well as the main recommendations, providing a framework for the security management. As a particular issue, data protection is considered and significance of data access control and encryption are discussed. Accordingly, an illustrative approach for achieving lightweight and provable secure encryption is shown. The considered encryption is based on joint employment of cryptographic and coding methods.


Author(s):  
Miodrag J. Mihaljević ◽  
Hideki Imai

The main security and privacy issues of cloud computing as well as the related implications are addressed, and a general framework for achieving the goals is summarized. This chapter basically considers scientific and educational employment of a cloud as a particular instance of a public cloud and its security, and as a potentially specific issue, a request for a heavy minimization of the costs implied by security is pointed out. Consequently, the problem of minimization of the overheads implied by security/privacy mechanisms is addressed. The main security requirements are given as well as the main recommendations, providing a framework for the security management. As a particular issue, data protection is considered and significance of data access control and encryption are discussed. Accordingly, an illustrative approach for achieving lightweight and provable secure encryption is shown. The considered encryption is based on joint employment of cryptographic and coding methods.


Author(s):  
Heru Susanto ◽  
Mohammad Nabil Almunawar

Cloud computing services have grown rapidly over the years. Government agencies are also interested in cloud-based provision for their E-government processes. Despite the advantages of cloud-related technologies, there are many security issues as well that fall into several categories of breaches with serious impacts. All these breaches have serious legal and reputational implications. Therefore, governments need to ensure that inherent security threats can be neutralized to ensure that data or information stored in the cloud are well protected. It is imperative for cloud-based e-government (CB-eGov) to use an information security management system (ISMS) to effectively manage CB-eGov. The purpose of this chapter is to discuss how cloud computing can be incorporated in an e-government implementation to improve its efficiency without compromising information security. As such, the government needs to take special care in ensuring security, privacy, and confidentiality of information stored in the cloud.


2019 ◽  
pp. 1869-1897
Author(s):  
Heru Susanto ◽  
Mohammad Nabil Almunawar

Cloud computing services have grown rapidly over the years. Government agencies are also interested in cloud-based provision for their E-government processes. Despite the advantages of cloud-related technologies, there are many security issues as well that fall into several categories of breaches with serious impacts. All these breaches have serious legal and reputational implications. Therefore, governments need to ensure that inherent security threats can be neutralized to ensure that data or information stored in the cloud are well protected. It is imperative for cloud-based e-government (CB-eGov) to use an information security management system (ISMS) to effectively manage CB-eGov. The purpose of this chapter is to discuss how cloud computing can be incorporated in an e-government implementation to improve its efficiency without compromising information security. As such, the government needs to take special care in ensuring security, privacy, and confidentiality of information stored in the cloud.


Sensors ◽  
2021 ◽  
Vol 21 (24) ◽  
pp. 8226
Author(s):  
Ahmed M. Alwakeel

With the advancement of different technologies such as 5G networks and IoT the use of different cloud computing technologies became essential. Cloud computing allowed intensive data processing and warehousing solution. Two different new cloud technologies that inherit some of the traditional cloud computing paradigm are fog computing and edge computing that is aims to simplify some of the complexity of cloud computing and leverage the computing capabilities within the local network in order to preform computation tasks rather than carrying it to the cloud. This makes this technology fits with the properties of IoT systems. However, using such technology introduces several new security and privacy challenges that could be huge obstacle against implementing these technologies. In this paper, we survey some of the main security and privacy challenges that faces fog and edge computing illustrating how these security issues could affect the work and implementation of edge and fog computing. Moreover, we present several countermeasures to mitigate the effect of these security issues.


Sign in / Sign up

Export Citation Format

Share Document