Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
A Proposed Model for Enhancing Data Storage Security in Cloud Computing Systems
Dr Nashaat el-Khameesy,Hossam Abdel Rahman
Journal of Emerging Trends in Computing and Information Sciences , 2012,
Abstract: The reported recent success of cloud computing has attracted attention for cost effective IT services with many signs for continuing spread out if not dominating in the coming years. However, challenges are being faced by both research and professional communities including quality reliable services, optimized architectures and security. Meanwhile, IT services in Cloud Computing face the overwhelming challenges to ensure the proper physical, logical and personnel security controls, especially when considering the fact that cloud computing moves the application software and databases to the large data canters. Moreover, while moving such large volumes of data and Software, the management of the data and services may not be fully trustworthy. In this paper, the main focus is given to highlight the security aspects of data storage from perspectives of threats and attacks from one side and approaches for solutions from the other side. The paper also proposes an effective and flexible distributedscheme with two salient features, opposing to its predecessors. Our scheme achieves the integration of storage correctness insurance and data error localization
Design and Development of a Novel Symmetric Algorithm for Enhancing Data Security in Cloud Computing  [PDF]
Mohammad Anwar Hossain, Ahsan Ullah, Newaz Ibrahim Khan, Md Feroz Alam
Journal of Information Security (JIS) , 2019, DOI: 10.4236/jis.2019.104012
Abstract: Cloud computing is a kind of computing that depends on shared figuring assets instead of having nearby servers or individual gadgets to deal with applications. Technology is moving to the cloud more and more. It’s not just a trend, the shift away from ancient package models to package as service has steadily gained momentum over the last ten years. Looking forward, the following decade of cloud computing guarantees significantly more approaches to work from anyplace, utilizing cell phones. Cloud computing focused on better performances, better scalability and resource consumption but it also has some security issue with the data stored in it. The proposed algorithm intents to come with some solutions that will reduce the security threats and ensure far better security to the data stored in cloud.
Is Cloud Computing Steganography-proof?  [PDF]
Wojciech Mazurczyk,Krzysztof Szczypiorski
Computer Science , 2011,
Abstract: The paper focuses on characterisation of information hiding possibilities in Cloud Computing. After general introduction to cloud computing and its security we move to brief description of steganography. In particular we introduce classification of steganographic communication scenarios in cloud computing which is based on location of the steganograms receiver. These scenarios as well as the threats that steganographic methods can cause must be taken into account when designing secure cloud computing services.
Security Architecture of Cloud Computing
International Journal of Engineering Science and Technology , 2011,
Abstract: The Cloud Computing offers service over internet with dynamically scalable resources. Cloud Computing services provides benefits to the users in terms of cost and ease of use. Cloud Computing services need to address the security during the transmission of sensitive data and critical applications to shared and public cloud environments. The cloud environments are scaling large for data processing and storage needs. Cloud computing environment have various advantages as well as disadvantages on the data security of service consumers. This paper aims to emphasize the main security issues existing in cloud computing environments. The security issues at various levels of cloud computing environment is identified in this paper and categorized based on cloud computing architecture. This paper focuses on the usage of Cloud services and security issues to build these cross-domain Internet-connected collaborations.
Security Issues on Cloud Computing  [PDF]
Harit Shah,Sharma Shankar Anandane,Shrikanth
Computer Science , 2013,
Abstract: The Cloud Computing concept offers dynamically scalable resources provisioned as a service over the Internet.Economic benefits are the main driver for the Cloud, since it promises the reduction of capital expenditure and operational expenditure.In order for this to become reality, however, there are still some challenges to be solved. Amongst these are security and trust issues, since the user data has to be released to the Cloud and thus leaves the protection sphere of the data owner. Most of the discussions on these topics are mainly driven by arguments related to organisational means. This paper focuses on various security issues arising from the usage of Cloud services and especially by the rapid development of Cloud computing arena. It also discusses basic security model followed by various High Level Security threats in the industry.
World of Cloud Computing & Security  [cached]
Ashish Kumar
International Journal of Cloud Computing and Services Science (IJ-CLOSER) , 2012, DOI: 10.11591/closer.v1i2.399
Abstract: Cloud computing promises to increase the velocity with which application are deployed, increase innovation and lower costs, all while increasing business agility and hence envisioned as the next generation architecture of IT Enterprise. Nature of cloud computing builds an established trend for driving cost out of the delivery of services while increasing the speed and agility with which services are deployed. Cloud Computing incorporates virtualization, on demand deployment, Internet delivery of services and open source software .From another perspective, everything is new because cloud computing changes how we invent, develop, deploy, scale, update, maintain and pay for application and the infrastructure on which they run. Because of these benefits of Cloud Computing, it requires an effective and flexible dynamic security scheme to ensure the correctness of users’ data in the cloud. Quality of service is an important aspect and hence, extensive cloud data security and performance is required. ashish.kumar@bharatividyapeeth.edu
International Journal of Engineering Science and Technology , 2011,
Abstract: It is no secret that cloud computing is becoming more and more popular today and is ever increasing inpopularity with large companies as they share valuable resources in a cost effective way. Due to this increasingdemand for more clouds there is an ever growing threat of security becoming a major issue. This paper shalllook at ways in which security threats can be a danger to cloud computing and how they can be avoided.
Journal of Defense Resources Management , 2012,
Abstract: The term “cloud computing” has been in the spotlights of IT specialists the last years because of its potential to transform this industry. The promised benefits have determined companies to invest great sums of money in researching and developing this domain and great steps have been made towards implementing this technology. Managers have traditionally viewed IT as difficult and expensive and the promise of cloud computing leads many to think that IT will now be easy and cheap. The reality is that cloud computing has simplified some technical aspects of building computer systems, but the myriad challenges facing IT environment still remain. Organizations which consider adopting cloud based services must also understand the many major problems of information policy, including issues of privacy, security, reliability, access, and regulation. The goal of this article is to identify the main security issues and to draw the attention of both decision makers and users to the potential risks of moving data into “the cloud”.
Security Analysis of Cloud Computing  [PDF]
Frederick R. Carlson
Computer Science , 2014,
Abstract: This paper produces a baseline security analysis of the Cloud Computing Operational Environment in terms of threats, vulnerabilities and impacts. An analysis is conducted and the top three threats are identified with recommendations for practitioners. The conclusion of the analysis is that the most serious threats are non-technical and can be solved via management processes rather than technical countermeasures
Data Security of Mobile Cloud Computing on Cloud Server
Mohammad Waseem, Abdullah Lakhan, Irfan Ali Jamali
Open Access Library Journal (OALib Journal) , 2016, DOI: 10.4236/oalib.1102377
Abstract: Mobile Cloud computing is a technology of delivering services, such as software, hardware (virtual as well) and bandwidth over the Internet. Mobile devices are enabled in order to explore, especially Smart phones. The mobile cloud computing technology is growing rapidly among the customers and many companies such as Apple, Google, Facebook and Amazon with rich users. Users can access their data at any time, at any place, even with any device including mobile devices by using the cloud storage services, although these properties offer flexibility and scalability in controlling data, however, at the same time it reminds us with new security threats. These security issues can be resolved by proper handling of data. The cloud server provider can secure the data by applying the encryption and decryption techniques while storing the data over the cloud. In this paper, we proposed some encryption and decryption methods for securing the data over the cloud so that an unauthorized person or machine cannot access the confidential data owing to encrypted form.
Page 1 /100
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.