Critical Research on Scalability and Security Issues in Virtual Cloud Environments - Advances in Information Security, Privacy, and Ethics
Latest Publications


TOTAL DOCUMENTS

14
(FIVE YEARS 0)

H-INDEX

2
(FIVE YEARS 0)

Published By IGI Global

9781522530299, 9781522530305

Author(s):  
Muneer Bani Yassein ◽  
Mohammed Shatnawi ◽  
Nesreen l-Qasem

Mobile ad hoc networks (MANETs) is a collection of wireless mobile devices that dynamically communicates with each other as a self-configuration without the need of centralized administration or fixed infrastructure. In this paper, we interested to introduce the different broadcast methods based on the probabilistic scheme which is simple implement code with speed broadcast and to reduce a storm broadcast problem effects and to alleviate redundancy through rebroadcast by using different routing protocols such as (AODV, DSR, LAR, PAR) that we interested in MANETs.


Author(s):  
Inderbir Kaur

Cloud computing is an upcoming IT approach that presents various new economic benefits, effective rapid deployment of services to achieve ultimate benefits and goals. Cloud computing reveals an effective connection of internet and computing technologies with personal or business computing that is changing the environment of computing process by providing solutions which are designed, delivered and managed. This model is a remarkable shift from the traditional model of computing. The cloud is an attractive technology solution as it enables to reduce the total cost of ownership and giving “green computing” environment by energy saving concept. Use of Cloud computing technology in different areas provides greater opportunities in the overall development of world, especially India. This chapter throw lights on various dimensions in which cloud computing concept is used . This paper also reviews the potential and opportunities for cloud computing in the healthcare industry, tourism, defence and military applications and various another aspects.


Author(s):  
Makhan Singh ◽  
Sarbjeet Singh

Information dispersal is a technique in which pieces of data are distributed among various nodes such that the data can be reconstituted from any threshold number of these pieces. Information dispersal algorithms employ a method in which a file F needs to be dispersed among n nodes such that any m pieces will be sufficient to reconstruct the whole file F. The size of each piece is |F/m|. We must also ensure that the complete knowledge of any m-1 pieces is insufficient to reconstruct the complete file F. The ideas for accomplishing this have been given in many literatures in the past. A discussion and comparison of some of these is covered in this chapter.


Author(s):  
Reema Abdulraziq ◽  
Muneer Bani Yassein ◽  
Shadi Aljawarneh

Big data refers to the huge amount of data that is being used in commercial, industrial and economic environments. There are three types of big data; structured, unstructured and semi-structured data. When it comes to discussions on big data, three major aspects that can be considered as its main dimensions are the volume, velocity, and variety of the data. This data is collected, analysed and checked for use by the end users. Cloud computing and the Internet of Things (IoT) are used to enable this huge amount of collected data to be stored and connected to the Internet. The time and the cost are reduced by means of these technologies, and in addition, they are able to accommodate this large amount of data regardless of its size. This chapter focuses on how big data, with the emergence of cloud computing and the Internet of Things (IOT), can be used via several applications and technologies.


Author(s):  
Muneer Bani Yassein ◽  
Wail Mardini ◽  
Amnah Al-Abdi

Internet of Things (IoT) is one of the most active and hot topics these days in which most of our everyday objects are connected with each other over internal and external networks. As in any data communication paradigm there are security aspects that should be taken care of. The traditional security mechanisms are usually not applicable in IoT because there are different standards involved, this make the security preservation is one of the main challenges in IoT. According to previous surveys, there are many of security issues in regards to IoT. In this chapter, five issues from the security issues in IoT are discussed; Access Control, Authentication, Privacy, Policy Enforcement, and Trust. After that, major proposed solutions from the literature is listed and compared according to the strength and weakness points for each of them.


Author(s):  
Rohit Kumar

IaaS, PaaS, and SaaS models collectively form the Cloud Computing Infrastructure. The complexity of interrelationship of service models is very high and so security issue becomes essentials and must be developed with utmost care. Distributed DOS attacks are a major concern for different organization engaged in using cloud based services. The denial of service attack and distributed denial of service attacks in particular in cloud paradigms are big threat on a cloud network or platform. These attacks operate by rendering the server and network useless by sending unnecessary service and resource requests. The victims host or network isn't aware of such attacks and keeps providing recourses until they get exhausted. Due to resource exhaustions, the resources requests of genuine users doesn't get fulfilled. Severity of these attacks can lead to huge financial losses if, they are able to bring down servers executing financial services. This chapter presents DOS threats and methods to mitigate them in varied dimensions.


Author(s):  
Shivani Bajaj

Energy Efficiency can be defined as reduction of energy used by a given service or level of activity. In spite of scale and complexity of data centre equipment it can be highly difficult to define the proper activity that could be examined for the efficiency of energy. So there can be four scenarios which may define within the system where the energy is not utilised in an efficient manner. The main goal of Cloud service providers is creation of usage of Cloud computing resources proficiently for efficient cloud computing. Cloud computing has many serious issues such as load manager, security and fault tolerance. This chapter discusses the energy efficient approaches in cloud computing environment. The energy efficiency has become the major concern for the service providers. In this chapter, the major concern is the high lightly of resource allocation challenges and there are some which will be given in the data center energy consumption. The focus is done on the power management task and even the virtualization of saving the energy.


Author(s):  
Shivani Jaswal ◽  
Manisha Malhotra

Cloud computing is a rising paradigm in today's world. In this, users can send his or her request to any CSP, i.e., cloud service provider, of their choice. In return, the CSP reverts him back with that particular service. Now, while communicating from various two locations, the data transferred is not passed through that much amount of security and privacy as expected. So, there are lots of parameters in the environment that are taken care of while sending, receiving or just passing data over the network. This chapter presents various security issues that are underlying in cloud computing. This chapter has illustrated various issues such as Trust, Encryption, Authenticity, Confidentiality and Multi Tenancy. Also, some of the proposed solutions have also been discussed later in the chapter.


Author(s):  
Jameson Mbale

The Copperbelt University Computer Centre runs five physical servers 24/7 throughout the academic year calendar. These machines consumed a lot of resources such as electricity used to run and cool them. In addition, the Computer Centre employed a lot of technicians to run, maintain and service the named servers. All the discussed costs were incurred throughout the year including the idle workload period when there was very little work to be processed. It was against that background the Computer Centres Resource Cloud Elasticity-Scalability (CRECES) was envisaged to only use one physical server during idle workload period. It was at such periods when the Computer Centre carried a rapid elasticity to scale down on the huge server resource utilisation. Similarly, at peak workload time the centre carried a rapid elasticity to scale up by producing many virtual hardware and software resources just from a single server to five virtualised ones. Hence, the capacity of the Centre to scale up and down resources acted as a cost serving measures in utilising the hardware and software resources.


Author(s):  
Samia Chehbi Gamoura

With the democratization of Data management through Big Data and Cloud Computing, and the proliferation of business lines into complex networks, industries are ever more subject to disasters than ever. It is practically impossible to forecast their happening and degree of damages. Consequently, companies try to collaborate in integrating risk management in their information systems against downtimes. This chapter addresses this problem by outlining and discussing insights from the extensive literature review to produce a generic approach for cross-management. A set of prerequisites of disaster planning is also provided with comparative analysis and arguments. The proposed approach is focused on risk assessment methodology based on Fuzzy Cognitive Map. The method is able to aggregate all assessment variables of the whole stakeholders involved in the business network. The key findings of this study aim to assist enterprises in improving risk readiness capability and disaster recovery. Finally, we indicate the open challenges for further researches and an outlook on our future research.


Sign in / Sign up

Export Citation Format

Share Document