Cloud Security
Latest Publications


TOTAL DOCUMENTS

108
(FIVE YEARS 108)

H-INDEX

2
(FIVE YEARS 2)

Published By IGI Global

9781522581765, 9781522581772

2019 ◽  
pp. 1952-1983
Author(s):  
Pourya Shamsolmoali ◽  
Masoumeh Zareapoor ◽  
M.Afshar Alam

Distributed Denial of Service (DDoS) attacks have become a serious attack for internet security and Cloud Computing environment. This kind of attacks is the most complex form of DoS (Denial of Service) attacks. This type of attack can simply duplicate its source address, such as spoofing attack, which defending methods do not able to disguises the real location of the attack. Therefore, DDoS attack is the most significant challenge for network. In this chapter we present different aspect of security in Cloud Computing, mostly we concentrated on DDOS Attacks. The Authors illustrated all types of Dos Attacks and discussed the most effective detection methods.


2019 ◽  
pp. 1809-1828
Author(s):  
Juhua Wu ◽  
Fang Ding ◽  
Meng Xu ◽  
Zan Mo ◽  
Anran Jin

This article analyzed decision-making in terms of the adoption of public cloud computing and its determinants in the context of e-government. The authors proposed a theoretical model and related hypotheses after reviewing the literature and combining technology adoption theory with IT decision-making authority theory. Then, they collected samples from 227 public sectors and tested hypotheses using structural equation modeling. The results show that the determinants of the three modes (IaaS, SaaS, and PaaS) of decision-making on adoption are different. The significant determinants of IaaS adoption include technical factors and business factors, those of PaaS adoption include technical factors and management factors, whereas those of SaaS include technical factors, business factors and management factors. The authors also find managerial/controlling power, which characterizes the special nature of Chinese culture, only have a significant influence on the decision-making on adoption of PaaS mode and SaaS mode.


2019 ◽  
pp. 1686-1711
Author(s):  
Vijay L. Hallappanavar ◽  
Mahantesh N. Birje

Cloud computing is a model for enabling everywhere, suitable, on-demand network access. There are a number of challenges to provide cloud computing services and to accomplish this, it is necessary to establish trust across the cloud, between the user and the service provider. It is becoming increasingly complex for cloud users to make distinction among service providers offering similar kinds of services. There must be some mechanisms in the hands of users to determine trustworthiness of service providers so that they can select service providers with confidence and with some degree of assurance that service provider will not behave unpredictably or maliciously. An effective trust management system helps cloud service providers and consumers reap the benefits brought about by cloud computing technologies. Hence the objective of this chapter is to describe existing mechanisms that are used to determine a trust worthiness of a cloud service, various models that are used for calculating a trust value and method to establish trust management system.


2019 ◽  
pp. 1663-1685
Author(s):  
Winfred Yaokumah ◽  
Rebecca Adwoa Amponsah

The growth in cloud computing adoption is phenomenal in organizations worldwide due mainly to its potential to increase productivity and enhance efficiency in business operations. However, cloud adoption is very low in many organizations in the developing countries. To gain insights into organizations' behavioral intention and usage behavior of cloud computing, based on the Extended Unified Technology Acceptance and Use Theory, the current study investigated the effects of technological, organizational, and environmental factors on cloud adoption in organizations. Using samples from five industry sectors and by employing the Structural Equation Model, the study found that facilitating conditions, habit, performance expectancy, and price value had positive and significant effect on behavioral intention to use cloud computing. But, effort expectancy, social influence, lack of motivation, and inadequate security were found to be barriers to cloud adoption. These findings could contribute toward better formulation of planning guidelines for successful adoption of cloud computing.


2019 ◽  
pp. 1393-1407
Author(s):  
R. Deepthi Crestose Rebekah ◽  
Dhanaraj Cheelu ◽  
M. Rajasekhara Babu

Cloud computing is one of the most exciting technologies due to its ability to increase flexibility and scalability for computer processes, while reducing cost associated with computing. It is important to share the data securely, efficiently, and flexibly in cloud storage. Existing data protection mechanisms such as symmetric encryption techniques are unsuccessful in preventing data sharing securely. This article suggests Key aggregate cryptosystem which produce constant size ciphertexts in order to delegate decryption rights for any set of ciphertexts. The uniqueness is that one can aggregate any number of secret keys and make them as compact as a single key. This compact aggregate key can be easily sent to others with very limited secure storage.


2019 ◽  
pp. 1379-1392 ◽  
Author(s):  
Halima E. Samra ◽  
Alice S. Li ◽  
Ben Soh ◽  
Mohammed A. AlZain

Cloud-based technologies play a significant role in the technology-enhanced learning domain. The adoption of cloud technologies in the educational environment has a positive impact on the learning process by offering new tools and services to improve and support the learning life cycle, including interactivity. In specific fields, such as clinical skills training, that involve computer-intensive training scenarios, there is an increased demand to deliver training services to a larger number of learners, therefore the need for cloud services. However, to date there has been a lack of a formalized framework relating to the use of cloud computing for on-demand interactive e-training resources. This paper is to formalize a theoretical framework for an interactive e-training system particularly for clinical skills training, taking into consideration e-training system requirements and with a focus on applying cloud technologies to ensure the dynamic scalability of services and computing power while maintaining QoS and security


2019 ◽  
pp. 1241-1272
Author(s):  
Amir Manzoor

Cloud computing brings key advantages to the governments facing conflicting IT challenges. However, the cloud paradigm is still fragmented and concerns over data privacy and regulatory issues presents significant barriers to its adoption. Cloud computing is expected to provide new ways to run IT in public sector. At the same time, it presents significant challenges for governments, and to make the most of cloud, public sector organizations need to make some important decisions. Governments planning to migrate to the cloud are actively moving to harness digital services but with different focus, reasons, and strategy. However, the degree of cloud adoption by the public sector around the globe varies significantly. Most governments are piloting cloud computing but there are huge differences between each country. This chapter explores the state of the art of cloud computing applications in the public sector; various implications and specific recommendation are also provided.


2019 ◽  
pp. 1213-1240
Author(s):  
Abhinav Prakash ◽  
Dharma Prakash Agarwal

The issues related to network data security were identified shortly after the inception of the first wired network. Initial protocols relied heavily on obscurity as the main tool for security provisions. Hacking into a wired network requires physically tapping into the wire link on which the data is being transferred. Both these factors seemed to work hand in hand and made secured communication somewhat possible using simple protocols. Then came the wireless network which radically changed the field and associated environment. How do you secure something that freely travels through the air as a medium? Furthermore, wireless technology empowered devices to be mobile, making it harder for security protocols to identify and locate a malicious device in the network while making it easier for hackers to access different parts of the network while moving around. Quite often, the discussion centered on the question: Is it even possible to provide complete security in a wireless network? It can be debated that wireless networks and perfect data security are mutually exclusive. Availability of latest wideband wireless technologies have diminished predominantly large gap between the network capacities of a wireless network versus a wired one. Regardless, the physical medium limitation still exists for a wired network. Hence, security is a way more complicated and harder goal to achieve for a wireless network (Imai, Rahman, & Kobara, 2006). So, it can be safely assumed that a security protocol that is robust for a wireless network will provide at least equal if not better level of security in a similar wired network. Henceforth, we will talk about security essentially in a wireless network and readers should assume it to be equally applicable to a wired network.


2019 ◽  
pp. 889-902
Author(s):  
Mohammed A. AlZain ◽  
Alice S. Li ◽  
Ben Soh ◽  
Mehedi Masud

One of the main challenges in cloud computing is to build a healthy and efficient storage for securely managing and preserving data. This means a cloud service provider needs to make sure that its clients' outsourced data are stored securely and, data queries and retrievals are executed correctly and privately. On the other hand, it may also mean businesses are willing to outsource their data to a third party only if they trust their data are not accessible and visible to the service provider and other non-authorized parties. However, one of the major obstacles faced here for ensuring data reliability and security is Byzantine faults. While Byzantine fault tolerance (BFT) has received growing attention from the academic research community, the research done is generally from the distributed computing point of view, and hence finds little practical use in cloud computing. To that end, the focus of this paper is to discuss how these faults can be tolerated with the authors' proposed conceptualization of Byzantine data faults and fault-tolerant architecture in cloud data management.


2019 ◽  
pp. 760-769
Author(s):  
Kashif Munir

There's a big change happening in the world of databases. The industry is buzzing about Database-as-a-Service (DBaaS), a cloud offering that allows companies to rent access to these managed digital data warehouses. Database-as-a-service (DBaaS) is a cloud computing service model that provides users with some form of access to a database without the need for setting up physical hardware, installing software or configuring for performance. Since consumers host data on the Mobile Cloud, DBaaS providers should be able to guarantee data owners that their data would be protected from all potential security threats. Protecting application data for large-scale web and mobile apps can be complex; especially with distributed and NoSQL databases. Data centers are no longer confined to the enterprise perimeter. More and more enterprises take their data to the Mobile Cloud, but forget to adjust their security management practices when doing so. Unauthorized access to data resources, misuse of data stored on third party platform, data confidentiality, integrity and availability are some of the major security challenges that ail this nascent Cloud service model, which hinders the wide-scale adoption of DBaaS. In this chapter, I propose a security model for Mobile Cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. This will help Cloud community to get an insight into state-of-the-art progress in terms of secure strategies, their deficiencies and possible future directions.


Sign in / Sign up

Export Citation Format

Share Document