scholarly journals Cloud Security and Privacy Metamodel - Metamodel for Security and Privacy Knowledge in Cloud Services

Author(s):  
Tian Xia ◽  
Hironori Washizaki ◽  
Takehisa Kato ◽  
Haruhiko Kaiya ◽  
Shinpei Ogata ◽  
...  
Author(s):  
Tian Xia ◽  
Hironori Washizaki ◽  
Yoshiaki Fukazawa ◽  
Takehisa Kato ◽  
Haruhiko Kaiya ◽  
...  

Requirements for cloud services include security and privacy. Although many security patterns, privacy patterns, and non-pattern-based knowledge have been reported, knowing which pattern or combination of patterns to use in a specific scenario is challenging due to the sheer volume of options and the layered cloud stack. To deal with security and privacy in cloud services, this study proposes the Cloud Security and Privacy Metamodel (CSPM). CSPM uses a consistent approach to classify and support existing security and privacy patterns. In addition, CSPM is used to develop a security and privacy awareness process to develop cloud systems. The effectiveness and practicality of CSPM is demonstrated via several case studies.


2017 ◽  
Vol 5 (2) ◽  
pp. 97-106
Author(s):  
VNS Surendra Chimakurthi

Many firms are seeing the benefits of moving to the cloud. For the sake of their customers' data, cloud service providers are required by law to maintain the highest levels of data security and privacy. Most cloud service providers employ a patchwork of security and privacy safeguards while industry standards are being created. The upshot is that customers of cloud services are unsure whether or not the security protections supplied by these services are enough to meet their specific security and compliance requirements. In this article, we have discussed the many threats cloud users face and emphasized the compliance frameworks and security processes that should be in place to minimize the risk. To categorize cloud security measures, risks, and compliance requirements, we developed an ontology. We needed to design software to identify the high-level policy rules that must be applied in response to each danger as part of this initiative. Additionally, the program provides a list of cloud service providers that now satisfy specific security requirements. Even if they aren't familiar with the underlying technology, cloud users may utilize our system to build up their security policy and identify compatible providers.


Author(s):  
Tian Xia ◽  
Hironori Washizaki ◽  
Yoshiaki Fukazawa ◽  
Haruhiko Kaiya ◽  
Shinpei Ogata ◽  
...  

Security and privacy in cloud systems are critical. To address security and privacy concerns, many security patterns, privacy patterns, and non-pattern-based knowledge have been reported. However, knowing which pattern or combination of patterns to use in a specific scenario is challenging due to the sheer volume of options and the layered cloud stack. To deal with security and privacy in cloud services, this study proposes the cloud security and privacy metamodel (CSPM). CSPM uses a consistent approach to classify and handle existing security and privacy patterns. In addition, CSPM is used to develop a security and privacy awareness process to develop cloud systems. The effectiveness and practicality of CSPM is demonstrated via several case studies.


2020 ◽  
Author(s):  
Arpit B ◽  
Prasad K. D ◽  
Mandhar D ◽  
Abhi A. S

Nowadays Fog Computing has become a vast research area in the domain of cloud computing. Due to its ability of extending the cloud services towards the edge of the network, reduced service latency and improved Quality of Services, which provides better user experience. However, the qualities of Fog Computing emerge new security and protection challenges. The Current security and protection estimations for cloud computing cannot be straightforwardly applied to the fog computing because of its portability and heterogeneity. So these issues in fog computing arises new research challenges and opportunities. This survey features about existing security concerns for fog computing and new proposed system to tackle some of the issues in fog computing related to security and privacy, thereby enhancing the cloud security.


Because of diverse benefits such as counting services on demand, decreasing costs, computing resources configuration, flexibility, services scalability, etc. over internet, Cloud Computing has become and is becoming widely and hugely accepted technology to provide services. On the other hand, privacy and security of a cloud has become an issue as this technology is tremendously emerging in the world. Many researches are being done and even some proposed various models to identify and overcome the privacy and security issues. In this review, for the cloud providers to use during different stages of cloud services, a layered cloud security and privacy model (CSPM) will be provided. The CSPM model allows to overcome cloud security issues and thus, providing safe and protected services. Lastly, countermeasures and security threats will be presented.


2019 ◽  
Vol 2019 ◽  
pp. 1-10 ◽  
Author(s):  
Daniel Ayala-Ruiz ◽  
Alejandro Castillo Atoche ◽  
Erica Ruiz-Ibarra ◽  
Edith Osorio de la Rosa ◽  
Javier Vázquez Castillo

Long power wide area networks (LPWAN) systems play an important role in monitoring environmental conditions for smart cities applications. With the development of Internet of Things (IoT), wireless sensor networks (WSN), and energy harvesting devices, ultra-low power sensor nodes (SNs) are able to collect and monitor the information for environmental protection, urban planning, and risk prevention. This paper presents a WSN of self-powered IoT SNs energetically autonomous using Plant Microbial Fuel Cells (PMFCs). An energy harvesting device has been adapted with the PMFC to enable a batteryless operation of the SN providing power supply to the sensor network. The low-power communication feature of the SN network is used to monitor the environmental data with a dynamic power management strategy successfully designed for the PMFC-based LoRa sensor node. Environmental data of ozone (O3) and carbon dioxide (CO2) are monitored in real time through a web application providing IoT cloud services with security and privacy protocols.


Author(s):  
Ravish G K ◽  
Thippeswamy K

In the current situation of the pandemic, global organizations are turning to online functionality to ensure survival and sustainability. The future, even though uncertain, holds great promise for the education system being online. Cloud services for education are the center of this research work as they require security and privacy. The sensitive information about the users and the institutions need to be protected from all interested third parties. since the data delivery on any of the online systems is always time sensitive, the have to be fast. In previous works some of the algorithms were explored and statistical inference based decision was presented. In this work a machine learning system is designed to make that decision based on data type and time requirements.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Amr M. Sauber ◽  
Passent M. El-Kafrawy ◽  
Amr F. Shawish ◽  
Mohamed A. Amin ◽  
Ismail M. Hagag

The main goal of any data storage model on the cloud is accessing data in an easy way without risking its security. A security consideration is a major aspect in any cloud data storage model to provide safety and efficiency. In this paper, we propose a secure data protection model over the cloud. The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents the threats and attacks that affect data residing in the cloud. Our proposed model provides the benefits and effectiveness of security in cloud computing such as enhancement of the encryption of data in the cloud. It provides security and scalability of data sharing for users on the cloud computing. Our model achieves the security functions over cloud computing such as identification and authentication, authorization, and encryption. Also, this model protects the system from any fake data owner who enters malicious information that may destroy the main goal of cloud services. We develop the one-time password (OTP) as a logging technique and uploading technique to protect users and data owners from any fake unauthorized access to the cloud. We implement our model using a simulation of the model called Next Generation Secure Cloud Server (NG-Cloud). These results increase the security protection techniques for end user and data owner from fake user and fake data owner in the cloud.


Sign in / Sign up

Export Citation Format

Share Document