scholarly journals Secure Cloud Computing with Third Party Auditing: A Survey

2014 ◽  
Vol 103 (14) ◽  
pp. 19-24
Author(s):  
Laxmikant Mishra ◽  
Amit Kumar Sharma
2010 ◽  
Vol 4 (2) ◽  
pp. 36-48 ◽  
Author(s):  
Kevin Hamlen ◽  
Murat Kantarcioglu ◽  
Latifur Khan ◽  
Bhavani Thuraisingham

In this paper, the authors discuss security issues for cloud computing and present a layered framework for secure clouds and then focus on two of the layers, i.e., the storage layer and the data layer. In particular, the authors discuss a scheme for secure third party publications of documents in a cloud. Next, the paper will converse secure federated query processing with map Reduce and Hadoop, and discuss the use of secure co-processors for cloud computing. Finally, the authors discuss XACML implementation for Hadoop and discuss their beliefs that building trusted applications from untrusted components will be a major aspect of secure cloud computing.


IJARCCE ◽  
2014 ◽  
pp. 8507-8509
Author(s):  
RAMYA. D ◽  
DR.RAJA. K ◽  
SRINIVASAN. S

Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


2014 ◽  
Vol 13 (7) ◽  
pp. 4625-4632
Author(s):  
Jyh-Shyan Lin ◽  
Kuo-Hsiung Liao ◽  
Chao-Hsing Hsu

Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity to use a cloud service, especially for an international enterprise. In this paper we propose a cloud data storage scheme with some protocols to support group collaboration. A group of users can operate on a set of data collaboratively with dynamic data update supported. Every member of the group can access, update and verify the data independently. The verification can also be authorized to a third-party auditor for convenience.


Animals ◽  
2021 ◽  
Vol 11 (3) ◽  
pp. 830
Author(s):  
Temple Grandin

In the U.S., the most severe animal welfare problems caused by COViD-19 were in the pork industry. Thousands of pigs had to be destroyed on the farm due to reduced slaughter capacity caused by ill workers. In the future, both short-term and long-term remedies will be needed. In the short-term, a portable electrocution unit that uses scientifically validated electrical parameters for inducing instantaneous unconsciousness, would be preferable to some of the poor killing methods. A second alternative would be converting the slaughter houses to carcass production. This would require fewer people to process the same number of pigs. The pandemic revealed the fragility of large centralized supply chains. A more distributed supply chain with smaller abattoirs would be more robust and less prone to disruption, but the cost of pork would be greater. Small abattoirs can coexist with large slaughter facilities if they process pigs for specialized premium markets such as high welfare pork. The pandemic also had a detrimental effect on animal welfare inspection and third party auditing programs run by large meat buyers. Most in-person audits in the slaughter plants were cancelled and audits were done by video. Video audits should never completely replace in-person audits.


Sign in / Sign up

Export Citation Format

Share Document