Handbook of Research on Security Considerations in Cloud Computing - Advances in Information Security, Privacy, and Ethics
Latest Publications


TOTAL DOCUMENTS

18
(FIVE YEARS 0)

H-INDEX

2
(FIVE YEARS 0)

Published By IGI Global

9781466683877, 9781466683884

Author(s):  
Piyush Kumar Shukla ◽  
Madhuvan Dixit

In this chapter, Big Data provide large-volume, complex structure, heterogeneous and irregular growing data sets include multiple and autonomous different resources. In this chapter, With the growing improvement of networking sites, image information storing capacity become big issue too, Big Data concept are most growing expanding in all technical area and knowledge engineering domains, including physical, medical and paramedical sciences. Here a data-driven method consist demand-driven aggregation of information and knowledge mining and analysis, user interest prototyping, security and privacy aspects has been presented.


Author(s):  
Joseph M. Woodside

The future of education lays in the hand of Cloud Computing given the benefits of learning delivery, costs reduction, and innovation. At the same time, the threat of cyber-attacks and security breaches are also mounting for education based organizations and are a prime target given the amount and type of personal information available. This manuscript discusses the cloud security, privacy, and ethical mechanisms required from a teacher, student, and administrator perspective.


Author(s):  
Qurban A Memon

Nowadays data compression and authentication are believed to be vital to image transmission through heterogeneous infrastructure or storage at a centralized place. Though compression and authentication have independently grown to be matured technologies, but currently integration of these technologies is understood to be a key factor in handling tampering in images transmitted through unsecure channels like cloud. In this chapter, an error-resistant approach is investigated to add to low cost image authentication scheme to increase visual quality as well as improve author and user satisfaction. The image authentication includes content based digital signature that is watermarked and later diffused in the whole image before JPEG2000 coding. To tackle manipulations in the image, edge information of the image is examined to offset manipulations in the image transmission through noisy or open and unsecure channels. The edge image is sent along with JPEG2000 coded image to determine corrupted coefficients. The simulation results are conducted on test images for different values of bit error rate to judge confidence in error concealment within the received images.


Author(s):  
Piyush Kumar Shukla ◽  
Gaurav Singh

In this chapter we are focusing on reliability, fault tolerance and quality of service in cloud computing. The flexible and scalable property of dynamically fetching and relinquishing computing resources in a cost-effective and device-independent manner with minimal management effort or service provider interaction the demand for Cloud computing paradigm has increased dramatically in last few years. Though lots of enhancement took place, cloud computing paradigm is still subject to a large number of system failures. As a result, there is an increasing concern among community regarding the reliability and availability of Cloud computing services. Dynamically provisioning of resources allows cloud computing environment to meet casually varying resource and service requirements of cloud customer applications. Quality of Service (QoS) plays an important role in the affective allocation of resources and has been widely investigated in the Cloud Computing paradigm.


Author(s):  
Kashif Munir ◽  
Lawan A. Mohammed

Access control is generally a rule or procedure that allows, denies, restricts or limit access to system's resources. It may, as well, monitor and record all attempts made to access a system. Access Control may also identify users attempting to access unauthorized resources. It is a mechanism which is very much important for protection in computer security. Various access control models are in use, including the most common Mandatory Access Control (MAC), Discretionary Access Control (DAC) and Role Based Access Control (RBAC). All these models are known as identity based access control models. In all these access control models, user (subjects) and resources (objects) are identified by unique names. Identification may be done directly or through roles assigned to the subjects. These access control methods are effective in unchangeable distributed system, where there are only a set of Users with a known set of services. For this reason, we propose a framework which is well suited to many situations in cloud computing where users or applications can be clearly separated according to their job functions. In this chapter, we proposes a role based access control framework with various features including security of sensitive data, authorization policy and secure data from hackers. Our proposed role based access control algorithm provides tailored and fine level of user access control services without adding complexity, and supports access privileges updates dynamically when a user's role is added or updated.


Author(s):  
Piyush Kumar Shukla ◽  
Kirti Raj Bhatele

This Chapter simply contains multimedia - an integrated and interactive presentation of speech, audio, video, graphics and text, has become a major theme in today's information technology that merges the practices of communications, computing and information processing into an interdisciplinary field. The challenge of multimedia communications is to provide services that integrate text, sound, image and video information and to do it in a way that preserves the case of use and interactivity. A brief description of the elements of multimedia systems is presented. User and network requirements are discussed together with the pocket transfer concept. About Multimedia communication standards a general idea is also given. Multimedia transport over ATM and IP networks discussed in brief. The issues pertaining to multimedia digital subscriber lines are outlined together with multimedia over wireless, mobile and broadcasting networks as well as digital TV infrastructure for interactive multimedia services.


Author(s):  
Fatima-Zahra Benjelloun ◽  
Ayoub Ait Lahcen

The value of Big Data is now being recognized by many industries and governments. The efficient mining of Big Data enables to improve the competitive advantage of companies and to add value for many social and economic sectors. In fact, important projects with huge investments were launched by several governments to extract the maximum benefit from Big Data. The private sector has also deployed important efforts to maximize profits and optimize resources. However, Big Data sharing brings new information security and privacy issues. Traditional technologies and methods are no longer appropriate and lack of performance when applied in Big Data context. This chapter presents Big Data security challenges and a state of the art in methods, mechanisms and solutions used to protect data-intensive information systems.


Author(s):  
Abhishek Majumder ◽  
Sudipta Roy ◽  
Satarupa Biswas

Cloud is considered as future of Information Technology. User can utilized the cloud on pay-as-you use basis. But many organizations are stringent about the adoption of cloud computing due to their concern regarding the security of the stored data. Therefore, issues related to security of data in the cloud have become very vital. Data security involves encrypting the data and ensuring that suitable policies are imposed for sharing those data. There are several data security issues which need to be addressed. These issues are: data integrity, data intrusion, service availability, confidentiality and non-repudiation. Many schemes have been proposed for ensuring data security in cloud environment. But the existing schemes lag in fulfilling all these data security issues. In this chapter, a new Third Party Auditor based scheme has been proposed for secured storage and retrieval of client's data to and from the cloud service provider. The scheme has been analysed and compared with some of the existing schemes with respect to the security issues. From the analysis and comparison it can be observed that the proposed scheme performs better than the existing schemes.


Author(s):  
Abhik Chaudhuri

Cloud based services are gaining popularity across the globe and there is a growing interest to adopt the cloud for operational efficiency, green computing initiatives and service agility. However, concerns of security and risks in the Cloud are important constraints to reaping the benefits of Cloud Computing. Controlling the threats and vulnerabilities of Cloud based IT Services are prime necessities with proper policies and guidance from the Business Leadership or Board. While Business is concentrating on cost reduction as a primary enabler for adopting Cloud based Services, there is a growing need for exercising effective Governance and Risk Management to mitigate security risks and to exercise control over data in the Cloud. This chapter discusses how Governance and Risk Management domain (GRM) of Cloud Controls Matrix (CSA CCM) V3 Framework from Cloud Security Alliance (CSA) and the ISO/IEC 38500:2008 standard for IT Governance can be utilized together for an effective Governance and Risk Management of Cloud Services.


Author(s):  
Kashif Munir ◽  
Sellapan Palaniappan

Cloud computing is set of resources and services offered through the internet. Cloud services are delivered from data centers located throughout the world. Enterprises are rapidly adopting cloud services for their businesses, measures need to be developed so that organizations can be assured of security in their businesses and can choose a suitable vendor for their computing needs. In this chapter we identify the most vulnerable security threats/attacks in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing and propose relevant solution directives to strengthen security in the cloud environment. This chapter also discusses secure cloud architecture for organizations to strengthen the security.


Sign in / Sign up

Export Citation Format

Share Document