Cloud Security Research Papers - Academia.edu (original) (raw)
— The cloud is no longer in future, it’s here today. The cloud has fundamentally changed the landscape of computing. Governments are facing critical challenge of improving resource utilization, increase service responsiveness, distributed... more
— The cloud is no longer in future, it’s here today. The cloud has fundamentally changed the landscape of computing. Governments are facing critical challenge of improving resource utilization, increase service responsiveness, distributed storage of data, availability of resources at lower cost. In order to fulfil this huge challenge, Governments are fast adopting the new paradigm of computing: Cloud Computing. Governments are moving into Cloud as its adoption presents numerous costs, agility, and operational advantages. In early days of cloud, much of the debate focused on the different merits of Public & Private cloud and the best scenarios, in which a particular model should be adopted. Now there’s a growing realization that Hybrid Cloud is the best model for the government. The paper describes characteristics of each cloud computing deployment models and describes the best scenarios in which a particular model should be adopted based on certain parameters. However, the best scen...
Cloud computing is an emerging IT service paradigm. Instead of developing their own IT departments, business sectors purchase on-demand IT service from external providers in a per-use basis. From business cost perspective, companies are... more
Cloud computing is an emerging IT service paradigm. Instead of developing their own IT departments, business sectors purchase on-demand IT service from external providers in a per-use basis. From business cost perspective, companies are shifting capital expenses (CapExp) on hardware equipments to operational expenses (OpExp). Many companies, especially those startups, found this cloud IT service is economically beneficial. However, this IT service paradigm still requires to overcome some security concerns before it can be fully deployed. One of the main security issues is how to protect client’s data privacy from cloud employees. This paper proposes a PASS scheme for this purpose using Authentication and Secret Sharing.
The rapid development of Internet due to increasing data rates through both broadband cable networks and 4G wireless mobile, make everyone easily connected to the internet. Storages as Services (StaaS) is more popular and many users want... more
The rapid development of Internet due to increasing data rates through both broadband cable networks and 4G wireless mobile, make everyone easily connected to the internet. Storages as Services (StaaS) is more popular and many users want to store their data in one place so that whenever they need they can easily access anywhere, any place and anytime in the cloud. The use of the service makes it vulnerable to use by someone to commit a crime or can do Denial of Service (DoS) on cloud storage services. The criminals can use the cloud storage services to store, upload and download illegal file or document to the cloud storage. In this study, we try to implement a private cloud storage using Seafile on Raspberry Pi and perform simulations in Local Area Network and Wi-Fi environment to analyze forensically to discover or open a criminal act can be traced and proved forensically. Also, we can identify, collect and analyze the artifact of server and client, such as a registry of the deskt...
Cloud Computing reshapes the entire computing paradigm. In general, cloud computing means outsourcing available services and data storage in centralized scenario. In cloud computing task allocation is a major problem because multiple... more
Cloud Computing reshapes the entire computing paradigm. In general, cloud computing means outsourcing available services and data storage in centralized scenario. In cloud computing task allocation is a major problem because multiple numbers of tasks are allocated to multiple numbers of processors for simultaneous processing. From the given list, tasks are queued according to the ascending order based on their duration. This paper is designed to solve the Task Scheduling problem, by using our proposed effective new approach of Backfilling algorithm. Depending upon the task duration, tasks are split into multiple threads for processing. Multiple thread tasks are processed in the basic concept of " gang scheduling " technique. Here we implement new backfilling algorithm concept to minimize the idle processing time of the processors. The existing Simple Backfilling Algorithm (SBA) is used to minimize the ideal time processing. Whereas comparatively Dynamic Cloud Scheduling using Backfilling Algorithm (DCBA) is designed to reduce the ideal time processing than SBA to carry out the process of both LQueue and SQueue simultaneously. At the outset, DCBA reduces the average waiting time. As mentioned the algorithm which is specified in the previous line that contains three level which represent the working speed of the algorithm. The first and second level of DCBA algorithm is comparatively similar to the performance of SBA algorithm. The maximum better performance was given in a queue size (q=1.5) by DCBA algorithm as compare to SBA algorithm. The existing type (Gang Scheduling) consist of two approaches namely Adaptive First Come First Serve (AFCFS) and Largest Job First Served (LJFS) that focus on non-parallel jobs with deadline. When compare to existing gang scheduling algorithm and SBA algorithm the average waiting time of DCBA has slight improvement in the loader level of the key. As the separation of the queue like LQ and SQ the waiting time and average waiting time is reduced comparatively.
Cloud computing is introducing many huge changes to people's lifestyle and working pattern recently for its multitudinous benefits. However, the security of cloud computing is always the focus of numerous potential cloud customers, and a... more
Cloud computing is introducing many huge changes to people's lifestyle and working pattern recently for its multitudinous benefits. However, the security of cloud computing is always the focus of numerous potential cloud customers, and a big barrier for its widespread applications.Companies have increasingly turned to application service providers (ASPs) or Software as a Service (SaaS) vendors to offer specialized web-based services that will cut costs and provide specific and focused applications to users. The complexity of designing, installing, configuring, deploying, and supporting the system with internal resources can be eliminated with this type of methodology, providing great benefit to organizations. However, these models can present an authentication problem for corporations with a large number of external service providers. This paper describes the implementation of Security Assertion Markup Language (SAML) and its capabilities to provide secure single sign-on (SSO) solutions for externally hosted applications, including security measures for federated identity management systems using multifactor authentication ,which also includes Biometric identification.
Today the IT environment concentrates on Cloud computing where the usage of cloud based applications poses various security threats. Many possible cloud applications fall victim to a tragedy of the generic approach such that a shared... more
Today the IT environment concentrates on Cloud computing where the usage of cloud based applications poses various security threats. Many possible cloud applications fall victim to a tragedy of the generic approach such that a shared cloud service is becoming unstable and insecure based on the commercial demands by IT and other business organization. Companies should develop proper security guidelines for public and private cloud use and utilize an adequate cloud access model. Based on set of features in the three common cloud services, a set of security capabilities is identified which are needed to exercise those characteristic and the cryptographic dealing they entail. Random Number Generators can be used in cloud hosts especially for virtualized machines. Several purpose of Pseudo Random Number Generator (PRNG) exists in cloud which mainly can be used to authenticate users to the information stored on cloud, salts for the passwords or for statistical sampling. ANSI X9.31 is one standard pseudo random number generator used in many standard cryptographic algorithms like AES, RSA that are managed in securing data access in cloud applications. As ANSI X9.31 seed values are not secure they are directly used for generation. With brute force attack the seed values are exposed. On retrieval of seed values the key can be predicted which leads to insecurity of the information stored on the cloud. The proposed obfuscation technique protects from intruders. The proposed technique takes considerable minimum amount of time when compared with the existing method.
The pioneering decentralized access control scheme for susceptible data storage in clouds that supports unidentified authentication. In the proposed scheme, the clouds verify the authenticity of the server without knowing the user’s... more
The pioneering decentralized access control scheme for susceptible data storage in clouds that supports unidentified authentication. In the proposed scheme, the clouds verify the authenticity of the server without knowing the user’s uniqueness before storing data. The proposed design focuses on the full cycle access controlling scheme where in the presented system it was omitted. In order to achieve secure access controlling scheme we proposed fine-gained approach at cloud level , it prevents unauthorized access controlling from users or adversaries effectively our authentication and access control scheme is decentra-lized and strong, unlike other access control schemes designed for clouds which are centralized. The communication, computa-tion overheads are similar to centralized approaches. More over our proposed design proves that our system has secure crypto mechanism towards achieving data integrity and security.
In last two decades continues increase of comput-ational power and recent advance in the web technology cause to provide large amounts of data. That needs large scale data processing mechanism to handle this volume of data. MapReduce is a... more
In last two decades continues increase of comput-ational power and recent advance in the
web technology cause to provide large amounts of data. That needs large scale data
processing mechanism to handle this volume of data. MapReduce is a programming model
for large scale distributed data processing in an efficient and transparent way. Due to its
excellent fault tolerance features, scalability and the ease of use. Currently, there are several
options for using MapReduce in cloud environments, such as using MapReduce as a service,
setting up one’s own MapReduce cluster on cloud instances, or using specialized cloud
MapReduce runtimes that take advantage of cloud infrastructure services. Cloud computing
has recently emerged as a new paradigm that provide computing infrastructure and large
scale data processing mechanism in the network. The cloud is on demand, scalable and high
availability so implement of MapReduce on the top of cloud services cause faster, scalable
and high available MapReduce framework for large scale data processing. In this paper we
explain how to implement MapReduce in the cloud and also have a comparison between
implementations of MapReduce on AzureCloud, Amazon Cloud and Hadoop at the end.
Cloud computing technology offers the possibility of inter-organizational medical data sharing at a larger scale. The different organizations can maintain their own cloud environment while exchanging healthcare data among them in a... more
Cloud computing technology offers the possibility
of inter-organizational medical data sharing at a larger
scale. The different organizations can maintain their own
cloud environment while exchanging healthcare data among
them in a peer-to-peer(P2P) fashion according to some
defined polices. However, there are many security and
privacy challenges that hamper the adoption of cloud computing
solutions in healthcare domain. Besides, due to the
privacy sensitivity of healthcare data, an organization may
not wish to disclose its identity to others when exchanging
data in the network to avoid different attacks by the
intruders. Hence, anonymously authenticated data exchange
is essential between the different peer organizations. In this
paper we propose an anonymous on-the-fly secure data
Sk. Md. M. Rahman () · M. M. Hassan · A. Alamri
Information Systems Department, College of Computer
and Information Sciences(CCIS), Research Chair of Pervasive
and Mobile Computing, King Saud University, Riyadh, KSA
e-mail: mizan@ksu.edu.sa
M. M. Hassan
e-mail: mmhassan@ksu.edu.sa
A. Alamri
e-mail: atif@ksu.edu.sa
M. A. Hossain · A. Alelaiwi
Software Engineering Department, College of Computer
and Information Sciences(CCIS), King Saud University,
Riyadh, KSA
e-mail: mahossain@ksu.edu.sa
A. Alelaiwi
e-mail: aalelaiwi@ksu.edu.sa
Md. M. Masud
Computer Science Department, Taif University, Taif, KSA
e-mail: mmasud@tu.edu.sa
exchange protocol for such environment based on pairingbased
cryptography. Our proposed solution allows cloud
peers to dynamically generate temporary identities that are
used to produce a session key for each session of data
exchange. The proposed protocol is robust against different
attacks, such as target-oriented, man-in-the middle,
masquerade, and message manipulation attacks.
With the tremendous growth of sensitive information on cloud, cloud security is getting more important than even before. The cloud data and services reside in massively scalable data centers and can be accessed everywhere. The growth of... more
With the tremendous growth of sensitive information on cloud, cloud security is getting more important than even before. The cloud data and services reside in massively scalable data centers and can be accessed everywhere. The growth of the cloud users has unfortunately been accompanied with a growth in malicious activity in the cloud. More and more vulnerabilities are discovered, and nearly every day, new security advisories are published. Millions of users are surfing the Cloud for various purposes, therefore they need highly safe and persistent services. The future of cloud, especially in expanding the range of applications, involves a much deeper degree of privacy, and authentication. We propose a simple data protection model where data is encrypted using Advanced Encryption Standard (AES) before it is launched in the cloud, thus ensuring data confidentiality and security.
Cloud Computing is being projected by the major cloud services provider IT companies such as IBM, Google, Yahoo, Amazon and others as fifth utility where clients will have access for processing those applications and or software projects... more
Cloud Computing is being projected by the major cloud services provider IT companies such as IBM, Google, Yahoo, Amazon and others as fifth utility where clients will have access for processing those applications and or software projects which need very high processing speed for compute intensive and huge data capacity for scientific, engineering research problems and also e-business and data content network applications. These services for different types of clients are provided under DASM-Direct Access Service Management based on virtualization of hardware, software and very high bandwidth Internet (Web 2.0) communication. The paper reviews these developments for Cloud Computing and Hardware/Software configuration of the cloud paradigm. The paper also examines the vital aspects of security risks projected by IT Industry experts, cloud clients. The paper also highlights the cloud provider's response to cloud security risks.
Cloud computing is an Internet-based computing and next stage in evolution of the internet. It has received significant attention in recent years but security issue is one of the major inhibitor in decreasing the growth of cloud... more
Cloud computing is an Internet-based computing and next stage in evolution of the internet. It has received significant attention in recent years but security issue is one of the major inhibitor in decreasing the growth of cloud computing. It essentially shifts the user data and application software to large datacenters i.e, cloud, which is remotely located, at which user does not have any control and the management of data may not be completely secure. However, this sole feature of the cloud computing introduce many security challenges which need to be resolved and understood clearly. One of the most important and leading is security issue that needs to be addressed. Data Security concerns arising because both user data and program are located in provider premises. In this study, an attempt is made to review the research in this field. The results of review are categorized on the basis of type of approach and the type of validation used to validate the approach.
This article contributes to the foundational understanding of the security vulnerabilities and risk towards wireless grid Edgeware technology. Since communication networks and devices are subject to becoming the target of exploitation by... more
This article contributes to the foundational understanding of the security vulnerabilities and risk towards wireless grid Edgeware technology. Since communication networks and devices are subject to becoming the target of exploitation by hackers (e.g., individuals who attempt to gain unauthorised access to computer systems), these individuals are gaining ever-increasing knowledge of the often widely-reported exploitable vulnerabilities in these types of innovative technologies; and thus are able to craft increasingly effective computer network attacks (CNA) against such technologies. This research responds to the overall proposition: what security vulnerability enumerations would contribute to the degradation and risk in using a wireless grid Edgeware application in a virtualised cloud environment? Using supporting research pertaining to cyber-attacks and vulnerabilities towards a wireless cloud (e.g., the integration of a cloud computing and a wireless grid architecture), security vulnerabilities in virtualisation environments and specific vulnerabilities exploited against a wireless grid Edgeware application, this research provides a greater understanding of the practical ways wireless grid Edgeware technology can be attacked and the risk in utilising this technology.
Organizations and individuals have been moving to the cloud computing technology looking for effective and fast computing services. Confidential information is becoming more vulnerable to leak due to outsource computations to... more
Organizations and individuals have been moving to the cloud computing technology looking for effective and fast computing services. Confidential information is becoming more vulnerable to leak due to outsource computations to third-parties. The issue of data breaches could remove all the benefits organizations might get by moving to the cloud-based services. The main goal of securing information is to provide confidentiality, authenticity, integrity and data privacy. Data encryption is being widely employed to secure data. However, as users need to process data in the cloud, normal encryption schemes are practically inapplicable because they require the transmission of the secret keys to the server side to obtain the original data thus performing the required computation on the plaintext. Fully homomorphic encryption can be considered as an effective process that supports arbitrary computation on the ciphertext without requirement of decryption in the cloud. A genetic algorithm is a search operation based on natural genetic and natural selection. Applying the concept of Genetic Algorithms on cryptosystem provides strong randomness that hardens the attacking process for the ciphertext. In this paper, a method to use Genetic Algorithm to generate keys for the fully homomorphic encryption scheme is described and its effectiveness is examined. Moreover, some simple computations were performed on the encrypted data as well. Results showed that a GA generated key provides more randomness than other conventional methods used to generate public and private keys.
Cloud computing provides IT services to users worldwide, Data centers in Clouds consume large amount of Energy leading to highly effective costs. Therefore green energy computing is solution for decreasing operational costs. This survey... more
Cloud computing provides IT services to users worldwide, Data centers in Clouds consume large amount of Energy leading to highly effective costs. Therefore green energy computing is solution for decreasing operational costs. This survey presents efficient resource allocation and Scheduling algorithm/Techniques analyzed on different network parameters without compromising network performance and SLA constraints. Results are analyzed on different measures, providing a significant cost saving and improvement in Energy Efficiency.
Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business... more
Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacentres (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting companies (e.g., Dropbox, Salesforce). And it examines the business and private ‘clouders’ using these services. The first part of the paper argues that hosting companies, services providers and clouders have mutual informational (epistemic) obligations to provide and seek information about relevant issues such as consumer privacy, reliability of services, data mining and data ownership. The concept of interlucency is developed as an epistemic virtue governing ethically effective communication. The second part considers potential forms of government restrictions on or proscriptions against the development and use of cloud computing technology. Referring to the concept of technology neutrality, it argues that interference with hosting companies and cloud services providers is hardly ever necessary or justified. It is argued, too, however, that businesses using cloud services (e.g., banks, law firms, hospitals etc. storing client data in the cloud) will have to follow rather more stringent regulations.
Cloud computing technology is a relatively new concept of providing scalable and virtualized resources, software and hardware on demand to consumers. It presents a new technology to deliver computing resources as a service. It offers a... more
Cloud computing technology is a relatively new concept of providing scalable and virtualized resources, software and hardware on demand to consumers. It presents a new technology to deliver computing resources as a service. It offers a variety of benefits like services on demand and provisioning and suffers from several weaknesses. In fact, security presents a major obstacle in cloud computing adoption. In this paper, the authors will deal with security problems in cloud computing systems and show how to solve these problems using a quantitative security risk assessment model named Multi-dimensional Mean Failure Cost (M2FC). In fact, they summarize first security issues related to cloud computing environments and then propose a generic framework that analysis and evaluate cloud security problems and then propose appropriate countermeasures to solve these problems.
Cloud Computing is a type of internet based computing which provides services via the internet and accesses the resources within the user enterprise either in a private-own-cloud or on a third-party server On Demand. The model is... more
Cloud Computing is a type of internet based computing which provides services via the internet and accesses the resources within the user enterprise either in a private-own-cloud or on a third-party server On Demand. The model is characterized by three attributes: scalability, pay-per-use, self-services. Many industries such as banking, healthcare, Retail, Education, Manufacturing and business are adopting this cloud technique due to efficiency of services provided by pay-per-use pattern which helps in accessing the networks, storage, servers, services and applications, without physically acquiring them [3]. The circumscribed control over the data may cause various security issues in cloud computing like Data crash, Misuse and reprehensible use of cloud computing, Insecure API, Wicked Insiders, Shared technology issues/multi-tendency nature, Account services and Traffic Hijacking. There are many new technologies, improvements and research proceedings happening every day in order to develop the security and to provide assurance for users [2]. This research paper brings a framework on what cloud computing is, main security risks and issues that are currently present in the field of cloud computing, research challenges, importance in key industries and also the personal hypothesis on future advances in the field of cloud security.
In this work, we employ a key access control management scheme which effortlessly transitions any organization-like security policy to state of the art cloud level security. Offering a very flexible, secure, and hierarchical key access... more
In this work, we employ a key access control management scheme which effortlessly transitions any organization-like security policy to state of the art cloud level security. Offering a very flexible, secure, and hierarchical key access mechanism for institutions that deal with mission-critical data. The scheme also minimizes concerns about moving critical data to the public cloud and ensures only the users with sufficient permission from equal or higher privileged members can access the key by the use of topological ordering of a directed graph which includes self-loop. The main overheads such as public and private storage needs are restricted to a level that is tolerable, and the derivation of key is computationally fast and efficient. From a security perspective, the proposed scheme would be resistant to collaboration attacks and would provide key in distinguishability security. Since the key isn't stored anywhere so, the problem of a data breach is eliminated.
— The ever-increasing amount of personal or sensitive data stored in a cloud data storage needs to be protected, since losing it is a very serious problem. As their popularity increases, cloud storage is becoming an option for user in... more
— The ever-increasing amount of personal or sensitive data stored in a cloud data storage needs to be protected, since losing it is a very serious problem. As their popularity increases, cloud storage is becoming an option for user in keeping their data online, it poses a lot of security threats and the challenges of protecting their data from being hacked. Recent successful attacks on cloud storage provider has implemented many security controls as a security measure, such as two (2)-factor authentication. The study aims to determine the effectiveness of the said authentication method based on the algorithm used, discuss its potential benefits and weaknesses, and provide other security measures.
Cloud computing is a rapidly evolving information technology (IT) phenomenon. Rather than procure, deploy and manage a physical IT infrastructure to host their software applications, organizations are increasingly deploying their... more
Cloud computing is a rapidly evolving information technology (IT) phenomenon. Rather than procure, deploy and manage a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. This development has significant implications for digital forensic investigators, equipment vendors, law enforcement, as well as corporate compliance and audit departments (among others). Much of digital forensic practice assumes careful control and management of IT assets (particularly data storage) during the conduct of an investigation. This paper summarises the key aspects of cloud computing and analyses how established digital forensic procedures will be invalidated in this new environment. Several new research challenges addressing this changing context are also identified and discussed.
This paper presents a multi-platform, open-source application that aims to protect data stored and shared in existing cloud storage services. The access to the cryptographic material used to protect data is implemented using the... more
This paper presents a multi-platform, open-source application that aims to protect data stored and shared in existing cloud storage services. The access to the cryptographic material used to protect data is implemented using the identification and authentication functionalities of national electronic identity (eID) tokens. All peer to peer dialogs to exchange cryptographic material is implemented using the cloud storage facilities. Furthermore, we have included a set of mechanisms to prevent files from being permanently lost or damaged due to concurrent modification, deletion and malicious tampering. We have implemented a prototype in Java that is agnostic relatively to cloud storage providers; it only manages local folders, one of them being the local image of a cloud folder. We have successfully tested our prototype in Windows, Mac OS X and Linux, with Dropbox, OneDrive, Google Drive and SugarSync.
Cloud computing has formed the conceptual and infrastructural basis for tomorrow’s computing. The global computing infrastructure is rapidly moving towards cloud based architecture. While it is important to take advantages of could base... more
Cloud computing has formed the conceptual and infrastructural basis for tomorrow’s computing. The global computing infrastructure is rapidly moving towards cloud based architecture. While it is important to take advantages of could base computing by means of deploying it in diversified sectors, the security aspects in a cloud based computing environment remains at the core of interest. Cloud based services and service providers are being evolved which has resulted in a new business trend based on cloud technology. With the introduction of numerous cloud based services and geographically dispersed cloud service providers, sensitive information of different entities are normally stored in remote servers and locations with the possibilities of being exposed to unwanted parties in situations where the cloud servers storing those information are compromised. If security is not robust and consistent, the flexibility and advantages that cloud computing has to offer will have little credibi...
Cloud computing is an emerging area of computer technology that benefits form the processing power and the computing resources of many connected, geographically distanced computers connected via Internet. Cloud computing eliminates the... more
Cloud computing is an emerging area of computer technology that benefits form the processing power and the computing resources of many connected, geographically distanced computers connected via Internet. Cloud computing eliminates the need of having a complete infrastructure of hardware and software to meet users requirements and applications. It can be thought of or considered as a complete or a partial outsourcing of hardware and software resources. To access cloud applications, a good Internet connection and a standard Internet browser are required. Cloud computing has its own drawback from the security point of view; this paper aims to address most of these threats and their possible solutions.
Advanced Persistent Threat is a specific design to survive until it reaches the target and creates backdoor for future Intrusion. The objective of this paper is, to design and implementation of a defense in depth system to protect social... more
Advanced Persistent Threat is a specific design to survive until it reaches the target and creates backdoor for future
Intrusion. The objective of this paper is, to design and implementation of a defense in depth system to protect social cloud
against risks, threats and attacks. In this paper we discussed the policies and procedures of vulnerability management
and intrusion detection system. We also focused on the steps involved in defense in depth system a layered architecture
for prevention and protection from malicious users, masquerader and intruders. Where each layer restricts the intruder
with deployed activities such as security monitoring, malicious site filtering, patches to remedy vulnerabilities, analysis of
audit log files, Intrusion detection and prevention system and storage media management for protecting the cloud from
advanced persistent threat. The different intrusion techniques using social engineering methods such as spear phishing or
whale phishing are also discussed. A mathematical approach is given to secure the cloud computing using computational
intelligence which is aimed to defense the attacks using Perron-Frobenius theorem and methods for public social network.
In this paper we focused on the Defense in Depth model for a security layered strategy. We also discussed on the issues
an audit communication or challenge to the cloud server data security. Defense System is the process of monitoring for
and identifying unauthorized system access or manipulation and protecting the data from intruders. A clear description
is given regarding the steps involved in the Advanced Persistent Attack and the measures or steps involved in Advanced
Persistent Attack Defense System. The impact of security and privacy on cloud performance is calculated using cloud-sim
tool, which supports simulating and modeling a large scale cloud infrastructure. An Experiment on intelligence based
defense system using cloud analyst and simulator is given along with the result and conclusion.
Cloud computing is the current IT buzzword synonymous with outsourced data center management and agile solution architecture. It has the potential to improve scalability of large enterprise network delivery of services and the capability... more
Cloud computing is the current IT buzzword synonymous with outsourced data center management and agile solution architecture. It has the potential to improve scalability of large enterprise network delivery of services and the capability to revolutionize how data is delivered as a service. At its core, cloud computing is not a new technology but rather a new approach to distributed shared pooling of IT infrastructure linked together to offer centralized IT services on demand. The study results determined that management’s perception of security, cost-effectiveness and IT compliance factors significantly influence their decisions to adopt cloud computing. The results of multiple linear regression analysis testing in this
study showed that managements’ perception of cost effectiveness is more significantly correlated to their decision to adopt cloud computing than it is to security.
In the world of cloud computing, millions of people are using cloud computing for the purpose of business, education and socialization. Examples of cloud applications are: Google Drive for storage, Facebook for social networks, etc. Cloud... more
In the world of cloud computing, millions of people are using cloud computing for the purpose of business, education and socialization. Examples of cloud applications are: Google Drive for storage, Facebook for social networks, etc. Cloud users use the cloud computing infrastructure thinking that these services are easy and safe to use. However, there are security and performance issues to be addressed. This paper discusses how cloud users and cloud providers address performance and security issues. In this research, we have used business process modelling and simulation to explore the performance characteristics and security concerns in the service development life cycle. The results show that Business Process Modelling Notations (BPMN) simulation is effective for the study of cloud security process in detail before actual implementation. The total simulation duration time was 51 days and 9 hours 40 minutes but the results are displayed in 7 seconds only.
Cloud computing is growing significantly day by day, and has created a shift in the IT industry. It brings several advantages to consumers by delivering computing as a service, such as self-service, on-demand, broad network access, rapid... more
Cloud computing is growing significantly day by day, and has created a shift in the IT industry. It brings several advantages to consumers by delivering computing as a service, such as self-service, on-demand, broad network access, rapid elasticity, resource pooling, and measured service. On the other hand, organizations have many fears when deciding to migrate to cloud computing, due to the many risks they are exposed to by the cloud environment. Risk management is an appropriate method to identify, assess, and manage risks. The traditional risk management frameworks do not fit cloud computing well due to its complex environment and the assumption by those frameworks that the assets are owned and fully managed by the organization itself. The aim of this paper is to propose a new security risk management framework for the cloud computing environment. The framework focuses on the two main issues that affect the effectiveness of risk management: loss of control and the multi-tenant architecture of cloud computing. The proposed framework has been evaluated on a hypothetical cloud computing provider to present the step by step progress of the proposed framework.
This paper addresses how to construct a RBAC-compatible attribute-based encryption (ABE) for secure cloud storage, which provides a user-friendly and easy-to-manage security mechanism without user intervention. Similar to role hierarchy... more
This paper addresses how to construct a RBAC-compatible attribute-based encryption (ABE) for secure cloud storage, which provides a user-friendly and easy-to-manage security mechanism without user intervention. Similar to role hierarchy in RBAC, attribute lattice introduced into ABE is used to define a seniority relation among all values of an attribute, whereby a user holding the senior attribute values acquires permissions of their juniors. Based on these notations, we present a new ABE scheme called Attribute-Based Encryption with Attribute Lattice (ABE-AL) that provides an efficient approach to implement comparison operations between attribute values on a poset derived from attribute lattice. By using bilinear groups of composite order, we propose a practical construction of ABE-AL based on forward and backward derivation functions. Compared with prior solutions, our scheme offers a compact policy representation solution, which can significantly reduce the size of privatekeys and ciphertexts. Furthermore, our solution provides a richer expressive power of access policies to facilitate flexible access control for ABE scheme.
Cloud computing provides a flexible and convenient way for data sharing, which brings various benefits for both the society and individuals. But there exists a natural resistance for users to directly outsource the shared data to the... more
Cloud computing provides a flexible and convenient way for data sharing, which brings various benefits for both the society and individuals. But there exists a natural resistance for users to directly outsource the shared data to the cloud server since the data often contain valuable information.
In a computing context, cybersecurity is undergoing massive shifts in technology and its operations in recent days, and data science is driving the change. Extracting security incident patterns or insights from cybersecurity data and... more
In a computing context, cybersecurity is undergoing massive shifts in technology and its operations in recent days, and data science is driving the change. Extracting security incident patterns or insights from cybersecurity data and building corresponding data-driven model, is the key to make a security system automated and intelligent. To understand and analyze the actual phenomena with data, various scientific methods, machine learning techniques, processes, and systems are used, which is commonly known as data science. In this paper, I have briefly described the data science its evolution its applications in cloud security and how cybersecurity data science came in existence what kind of advantages are given by CSDS and its steps like, where the data is being gathered from relevant cybersecurity sources, and the analytics complement the latest data-driven patterns for providing more effective security solutions. The concept of cybersecurity data science allows making the computing process more actionable and intelligent as compared to traditional ones in the domain of cybersecurity. After that I have described the various upcoming challenges that can emerge after the frequent applications of cybersecurity data science(CSDS), how machine learning and deep learning are applicable in it and types of algorithms that can be applicable in it. So, the overall paper is not only focuses on the origins of Data Science but it also describes its modern uses for the relevant cyber security field and data driven intelligent decision making system can protect our system from known and unknown cyber attacks.
In the last decade, cloud computing has been incorporated in various industries, from Health to Military, which has been meticulously guided by exploring related technologies in the industry and academia alike. The individual and... more
In the last decade, cloud computing has been incorporated in various industries, from Health to Military, which has been meticulously guided by exploring related technologies in the industry and academia alike. The individual and enterprise computing model have shifted from on-site infrastructure to remote data centres which is accessible via internet and managed by cloud service providers. However, this paradigm shift in computing introduces security concerns to individuals and enterprises. To increase cloud deployment, these security concerns need to be thoroughly reviewed and addressed. This paper reviews the cloud security issues and concerns , while addressing various key topics like vulnerabilities, threats and mitigations, and cloud models.
Secure data access and effective data sharing in public cloud is an problem to solve. This paper focuses on the secure data sharing and storage. It will provide high security and efficiency. In this mechanism, group members can... more
Secure data access and effective data sharing in public cloud is an problem to solve. This paper focuses on the secure data sharing and storage. It will provide high security and efficiency. In this mechanism, group members can communicate with each other anonymously. Group members will use a common conference key to share and store data securely on cloud. Note that: An elliptic curve cryptography is utilized for secured key generation.
- by IJIRMPS International Journal and +2
- •
- Cryptography, Cloud, Cloud Security
Web servers which provide customer services are usually connected to highly sensitive information contained backend databases. The incrementing bar of deploying such web applications initiated in ranging the corresponding bar of number... more
Web servers which provide customer services are usually connected to highly sensitive information contained backend databases. The incrementing bar of deploying such web applications initiated in ranging the corresponding bar of number of attacks that target such applications. SQL Injection Attacks come about when data provided by external user are directly included in SQL query but is not properly validated. The paper proposes a novel detection & a prevention mechanism of SQL Injection Attacks using three-tier system. As the methodology is concerned over static, dynamic & runtime detection and prevention mechanism which also filters out the malicious queries and inspires the system to be well prepared for the secure working environment, regardless of being concerned over the database server only. The cloud proposes the services like SaaS, IaaS, PaaS, DaaS, EaaS. As previous solutions are achieved for the database queries for DaaS service only, but this paper enhances the scope of other services as well. It adapts to maintain security of the whole system even when it is for any of the cloud platforms. The solution includes detection & filtration that reduces attacks to 80% in comparison to other algorithms.
Cloud computing is commonly used to represent any work done on a computer, mobile or any device, where the data and possibly the application being used do not reside on the device but rather on an unspecified device elsewhere on the... more
Cloud computing is commonly used to represent any work done on a computer, mobile or any device, where the data and possibly the application being used do not reside on the device but rather on an unspecified device elsewhere on the Internet. The basic premise of cloud computing is that consumers (individuals, industry, government, academia and so on) pay for IT services from cloud service providers (CSP). Services offered in cloud computing are generally based on three standard models (Infrastructure-as s service, Platform-as a service, and Software as a Service) defined by the National Institute of Standards and Technology (NIST). The reason for cloud existence is to resolve managing problems being faced for data that were excessively stored, either mandatory capacity was limited due to the infrastructure of the business, or large capacity that led to a wasted capital. Apart from those major factors such as the initial capital, capitals and the service-fix cost, the sophisticated effort for the patching, the managing and the upgrading of the internal infrastructure is a huge obstacle for firm‘s development and mobility. For many firms where client and cultural competency have not got the strength to manage large data center environments and infrastructure, it would be wise to upload their files or data backups to another machine via internet, in order to concentrate more on the organizations primary objectives.
This document provides detailed but basic information that someone wanting to enter the Cybersecurity Career Field can use to become familiar with the multiple aspects of Cybersecurity. Likewise, most Cybersecurity professionals can use... more
This document provides detailed but basic information that someone wanting to enter the Cybersecurity Career Field can use to become familiar with the multiple aspects of Cybersecurity. Likewise, most Cybersecurity professionals can use it to review and refresh themselves on the core components of Cybersecurity.
Cloud computing is an Internet-based computing and next stage in evolution of the internet. It has received significant attention in recent years but security issue is one of the major inhibitor in decreasing the growth of cloud... more
Cloud computing is an Internet-based computing and next stage in evolution of the internet. It has received significant attention in recent years but security issue is one of the major inhibitor in decreasing the growth of cloud computing. It essentially shifts the user data and application software to large datacenters i.e, cloud, which is remotely located, at which user does not have any control and the management of data may not be completely secure. However, this sole feature of the cloud computing introduce many security challenges which need to be resolved and understood clearly. One of the most important and leading is security issue that needs to be addressed. Data Security concerns arising because both user data and program are located in provider premises. In this study, an attempt is made to review the research in this field. The results of review are categorized on the basis of type of approach and the type of validation used to validate the approach.
Over the past few years, emergence of Cloud Computing has notably made an evolution in the IT industry by putting forward an 'everything as a service' idea .Cloud Computing is of growing interest to companies throughout the world, but... more
Over the past few years, emergence of Cloud Computing has notably made an evolution in the IT industry by putting forward an 'everything as a service' idea .Cloud Computing is of growing interest to companies throughout the world, but there are many barriers associated with its adoption which should be eliminated. This paper aims to investigate Cloud Computing and discusses the drivers and inhibitors of its adoption. Moreover, an attempt has been made to identify the key stakeholders of Cloud Computing and outline the current security challenges. A SWOT analysis which consists of strengths, weaknesses, opportunities and threats has also carried out in which Cloud Computing adoption for SMEs (Small and Medium-sized Enterprises) is evaluated. Finally, the paper concludes with some further research areas in the field of Cloud Computing.
Cloud computing security issues are being reported in newspapers, television, and on the Internet, on a daily basis. Furthermore, in 2013, Edward Snowden alleged backdoors were placed in a number of encryption systems by the National... more
Cloud computing security issues are being reported in newspapers, television, and on the Internet, on a daily basis. Furthermore, in 2013, Edward Snowden alleged backdoors were placed in a number of encryption systems by the National Security Agency causing confidence in public encryption to drop even further. Our solution allows the end-user to add a layer of unbreakable security by encrypting the data locally with a random number generator prior to uploading data to the Cloud. The prototype one-time pad generator is impervious to cryptanalysis because it generates unbreakable random binary sequences from chaos sources initiated from a natural noise. Specialised one-to-Cloud applications for this device means key distribution problems do not exist, even when used at different locations. A JavaScript application maximised the encryptor key entropy using a von Neumann algorithm and modulotwo arithmetic, where the key passed the National Institute of Standards and Technology statistic...
- by Paul Tobin and +1
- •
- Engineering, Digital Circuits, Electrical and Electronics, Entropy
Cloud computing is one among today’s hottest research areas thanks to its ability to scale back costs related to computing while increasing scalability and adaptability for computing services. Cloud computing is Internet based computing... more
Cloud computing is one among today’s hottest research areas thanks to its ability to scale back costs related to
computing while increasing scalability and adaptability for computing services. Cloud computing is Internet based
computing thanks to shared resources, software and knowledge are provided to consumers on demand dynamically.