Security Issues in cloud Computing Research Papers (original) (raw)

2025, International Journal of Computer Science and Information Technology

The SHAMEL Exam is the second important exam in Jordan; accordingly, the preservation of confidentiality and security are the most important priorities of the exam managers. Recently, AL-Balqa Applied University (BAU) in Jordan has... more

The SHAMEL Exam is the second important exam in Jordan; accordingly, the preservation of confidentiality and security are the most important priorities of the exam managers. Recently, AL-Balqa Applied University (BAU) in Jordan has computerized the exam and one of the suggestions was to utilize the cloud computing applications. However, cloud computing entails many security concerns that may have impacts on the exam information security. This research discusses the current use the cloud computing in many life aspects and then concentrate on online exams aspect; also, this research clarifies the tangible and intangible risks associated with cloud computing adoption. Then, the research examined a specific case study related to the subject matter. Finally, this research explores the level of understanding risks and methods may be used to reduce it and help in protecting data from unauthorized persons.

2025, Computer Engineering and Intelligent Systems

The Internet of Things and artificial intelligence have advanced to the point that they have impacted every field of human endeavor with novel and groundbreaking solutions that promise increased data security and productivity. This... more

The Internet of Things and artificial intelligence have advanced to the point that they have impacted every field of human endeavor with novel and groundbreaking solutions that promise increased data security and productivity. This integration has introduced innovative solutions that enhance data security, operational efficiency, and productivity across the agricultural value chain. Implementing AI and IoT technologies has demonstrated substantial returns on investment by improving real-time monitoring capabilities, operational safety protocols, resource optimization, and overall agricultural management processes. The agricultural sector has witnessed comprehensive technological integration throughout its entire value chain, from pre-cultivation land preparation to post-harvest market distribution. Modern smart farming applications encompass various critical areas, including precision crop monitoring systems, automated irrigation management, intelligent harvesting mechanisms, and sophisticated supply chain optimization. These technological implementations are designed to maintain product quality and integrity throughout the agricultural cycle. This technological transformation has produced a new agricultural paradigm, called "smart agriculture," which addresses multiple contemporary challenges. These challenges include managing increasing crop yield demands due to population growth, adapting to climate change impacts, creating sustainable employment opportunities, and ensuring food security. This paper presents a critical analysis of AI and IoT applications in smart agriculture, examining their conceptual frameworks and implementation dimensions, focusing on crop production optimization under adverse climatic conditions, aiming to address food security challenges, promote employment generation, enhance the green economy, and ensure sustainable agricultural productivity.

2025

This comprehensive research investigates the critical challenge of data breaches in Indian healthcare facilities during 2018-2022, analyzing 487 breach incidents across major institutions. Our analysis reveals concerning statistics: 67%... more

This comprehensive research investigates the critical challenge of data breaches in Indian healthcare facilities during 2018-2022, analyzing 487 breach incidents across major institutions. Our analysis reveals concerning statistics: 67% of breaches stemmed from inadequate security protocols, 28% from insider threats, and 5% from sophisticated cyberattacks, with an average detection time of 197 days and mean financial impact of ₹4.2 crores per incident. The study proposes an innovative multi-layered security framework integrating blockchain, AI-driven threat detection, and advanced encryption methods, alongside comprehensive staff training protocols. Pilot implementation across five major hospitals demonstrated significant improvements: 43% reduction in breaches, 76% faster detection times, and 89% enhanced threat prevention. Cost-benefit analysis reveals an average ROI of 287% within the first year of implementation, with participating hospitals reporting enhanced patient trust and regulatory compliance. This research provides actionable insights for healthcare institutions seeking to strengthen their cybersecurity infrastructure.

2025, Increase Pod Density for K8s Worker Nodes

When customers use worker nodes in their EKS cluster that have sufficient CPU and memory to run more pods, but they might be limited by the number of available IP addresses. Each m5.large instance supports up to 3 Elastic Network... more

When customers use worker nodes in their EKS cluster that have sufficient CPU and memory to run more pods, but they might be limited by the number of available IP addresses. Each m5.large instance supports up to 3 Elastic Network Interfaces (ENIs), with each ENI allowing up to 10 IP addresses (1 primary + 9 secondary), resulting in a maximum of 27 secondary IP addresses per node. Since all secondary IP addresses are already in use, no additional pods can be scheduled, despite available compute resources.

2025, International Research Journal of Modernization in Engineering Technology and Science (IRJMETS)

Cloud computing adoption has fundamentally transformed organizational IT infrastructures, introducing complex security challenges particularly in multi-cloud and hybrid environments. This article presents a comprehensive framework for... more

Cloud computing adoption has fundamentally transformed organizational IT infrastructures, introducing complex security challenges particularly in multi-cloud and hybrid environments. This article presents a comprehensive framework for implementing advanced cybersecurity strategies across distributed cloud architectures. Through systematic analysis of current security practices and emerging threats, the article examines critical components including data encryption mechanisms, unified identity and access management approaches, and automated compliance monitoring systems. The article identifies significant challenges in managing security across fragmented cloud environments and proposes a novel approach to policy standardization and threat intelligence sharing. The article presents empirical evidence from multiple case studies demonstrating the effectiveness of automated security controls and cross-cloud threat detection mechanisms. The article introduces a structured methodology for risk assessment and mitigation specifically tailored to multi-cloud architectures, addressing key concerns such as data sovereignty, architectural complexity, and policy inconsistency. The findings provide valuable insights for organizations seeking to maintain robust security postures across diverse cloud environments, while the proposed framework offers practical guidelines for implementing comprehensive security controls in complex distributed architectures. This article contributes to both theoretical understanding and practical implementation of advanced cloud security strategies, offering organizations a structured approach to building resilient multi-cloud security architectures.

2025, Journal IJETRM

The digital world now functions through cloud computing because it provides adaptable data storage and processing solutions with affordable demands. The rising trend of organizational infrastructure migration into cloud systems has led to... more

The digital world now functions through cloud computing because it provides adaptable data storage and processing solutions with affordable demands. The rising trend of organizational infrastructure migration into cloud systems has led to increased security and efficiency concerns together with trust-related worries. The research develops a unified security-performance enhancement for cloud computing by implementing advanced cryptographic methods with optimized system design architecture. The proposed model leverages the strengths of Elliptic Curve Diffie-Hellman (ECDH) for secure key exchange, Advanced Encryption Standard (AES), and Blowfish algorithms for robust and efficient data encryption. A comprehensive multi-layered security framework from the model identifies and protects against assaults on data storage as well as secure data transmission and various security breaches. The performance evaluations involving CloudSim simulation along with controlled cloud environment implementation show that the digital system delivers superior encryption speed and enhanced data integrity functions while optimizing storage compared to RSA-based encryption methods. The hybrid encryption system provides quick computations and ensures advanced access restrictions and full confidentiality protection. Security enhancements implemented in the architecture prevent unauthorized access to systems and make it possible to establish stronger authentication methods for users and enhance secure data processing workflows. The integrated solution solves current cloud security problems in addition to creating a foundation which supports continuous development of protected cloud computing systems.

2025, IJRMETS

This study explores the potential of integrating Large Language Models to strengthen cybersecurity operations. It proposes a comprehensive framework that leverages LLMs to automate threat identification, security log analysis, and... more

This study explores the potential of integrating Large Language Models to strengthen cybersecurity operations. It proposes a comprehensive framework that leverages LLMs to automate threat identification, security log analysis, and facilitate real-time incident response. This framework leverages LLMs' natural language processing and knowledge representation capabilities to enhance threat detection, analysis, and response, enabling security analysts to mitigate cyber threats more effectively. The research investigates how this approach can address the growing complexity and volume of cyber threats faced by modern security environments.

2025

Cybersecurity is crucial for safeguarding IT infrastructure, which consists of hardware, software, networks, and data. A secure infrastructure ensures business continuity, protects sensitive information, and prevents costly breaches.... more

Cybersecurity is crucial for safeguarding IT infrastructure, which consists of hardware, software, networks, and data. A secure infrastructure ensures business continuity, protects sensitive information, and prevents costly breaches. Below is a comprehensive guide covering every aspect of Cybersecurity Essentials in IT Infrastructure.

2024, International Journal of Science and Research

Practices such as remote work also pose new cybersecurity threats that-based on historical office-based operations-the organization may have not previously encountered. Because of remote work, organizations find their networks under... more

Practices such as remote work also pose new cybersecurity threats that-based on historical office-based operations-the organization may have not previously encountered. Because of remote work, organizations find their networks under attack, often in advanced style, and are responsible for phishing, Ransomware, and insider threats because employees work from home on unsecured networks with insecure practices. This paper examines how the Colonial Pipeline ransomware attack illuminates weaknesses in remote access systems by shedding light on the effects of these cyber attacks. Additionally, the research emphasizes the necessity of securing remote access technology, i.e. VPNs and MFA, among other measures, such as ensuring that employees are trained in these security protocols to minimize these risks. The results also show that companies must be more proactive with their security postures to secure corporate data from internal threats while working out of the office.

2024

The advent of cloud computing has transformed the landscape of software development and delivery, particularly in the context of Content Delivery Networks (CDNs). This paper explores the integration of DevOps principles and continuous... more

The advent of cloud computing has transformed the landscape of software development and delivery, particularly in the context of Content Delivery Networks (CDNs). This paper explores the integration of DevOps principles and continuous delivery (CD) practices within cloud-based CDN architectures, aiming to enhance the efficiency and reliability of content distribution. DevOps fosters a collaborative culture between development and operations teams, facilitating faster and more frequent software releases. By implementing continuous delivery, organizations can automate the deployment process, ensuring that updates and features are delivered to end users seamlessly and with minimal downtime. The research highlights the challenges faced by organizations in adopting these methodologies, such as managing distributed systems, ensuring consistent performance across diverse geographic locations, and maintaining security protocols. Additionally, the paper discusses various tools and technologies that support DevOps and CD practices, including containerization, microservices architecture, and orchestration platforms. Case studies of successful implementations in leading CDN providers illustrate the tangible benefits, including reduced time to market, improved scalability, and enhanced user experience. Ultimately, this study underscores the critical role of DevOps and continuous delivery in optimizing cloud-based CDN architectures, advocating for a strategic shift towards these methodologies to meet the growing demands of users for high-quality, reliable content delivery. By leveraging these practices, organizations can achieve greater agility, foster innovation, and maintain a competitive edge in the fast-evolving digital landscape

2024, International Research Journal of Modernization in Engineering Technology and Science

This research article examines the transformative role of artificial intelligence (AI) in cloud computing, focusing on its impact on scalability, resource management, and predictive analytics within distributed systems. As organizations... more

This research article examines the transformative role of artificial intelligence (AI) in cloud computing, focusing
on its impact on scalability, resource management, and predictive analytics within distributed systems. As
organizations increasingly rely on cloud infrastructure, AI technologies have emerged as essential tools for
optimizing performance and efficiency. This study highlights how AI enhances scalability through dynamic
resource allocation and auto-scaling mechanisms, enabling systems to adapt to fluctuating demands seamlessly.
It also explores AI-driven resource management techniques that improve operational efficiency and reduce
costs by leveraging machine learning algorithms for predictive maintenance and anomaly detection.
Furthermore, the article delves into predictive analytics applications, demonstrating how AI can analyze vast
datasets to inform decision-making and enhance system reliability

2024, Journal of Emerging Technologies and Innovative Research

Abstract— Cloud computing are the modern way of staring data and other important resources the company wants to retrieve safely and conveniently. It offers an innovative way of investment especially to start up enterprises and adopt IT... more

Abstract— Cloud computing are the modern way of staring data and other important resources the company wants to retrieve safely and conveniently. It offers an innovative way of investment especially to start up enterprises and adopt IT operations without high upfront costs. Despite its potential, cloud computing is affected by various security issues. These include account highjacking, data breaches, malware injection, data recovery, wicked inside attackers, segregation of data, lack of investigative support, and shared vulnerabilities. The challenges facing cloud computing include security and privacy, application issues, accessibility, continuous evolvement, interoperability issues, service level agreements and data center issues.

2024, International Research Journal of Modernization in Engineering Technology and Science

The rapid adoption of cloud computing has led organizations to leverage multiple cloud platforms to address their diverse business and IT requirements. Managing and integrating these multi-cloud environments presents significant... more

The rapid adoption of cloud computing has led organizations to leverage multiple cloud platforms to address their diverse business and IT requirements. Managing and integrating these multi-cloud environments presents significant challenges, including ensuring seamless data and application portability, maintaining consistent security and governance policies, and orchestrating the deployment and scaling of resources across cloud providers. This paper explores the key strategies and best practices for effective multi-cloud management, enabling organizations to unlock the full potential of their cloud investments while mitigating the complexity of a heterogeneous cloud landscape. The findings suggest that a comprehensive multi-cloud management approach, encompassing cloud integration, orchestration, and governance, is essential for organizations to achieve the flexibility, scalability, and cost-optimization benefits of a multi-cloud architecture.

2024, Dissertation

The advancement in computer technology has revolutionized the way we store, manage and share data. With the increase in the volume of data generated, it has become essential to have a reliable and secure backup solution to protect... more

The advancement in computer technology has revolutionized the way we store, manage and share data. With the increase in the volume of data generated, it has become essential to have a reliable and secure backup solution to protect confidential data from various security threats. This dissertation aims to examine the vulnerabilities associated with local file storage systems and the need for a secure and automated backup device.
In personal computer systems, files are typically stored locally on a hard drive in a hierarchical directory structure. Each file is given a unique name and is stored in a particular directory or subdirectory, which is identified by a path that specifies the location of the file. Files can be accessed and manipulated using a variety of file management tools provided by the operating system. These file management tools include basic operations such as creating, deleting, moving, and copying files, as well as more advanced operations such as searching for specific files based on various criteria. It is important to note that several studies have shown that local file storage systems are vulnerable to various security threats such as malware attacks, data loss, and unauthorized access. According to a survey by Carbonite (2016), a cloud backup service provider, 75% of small businesses experience data loss, and 47% of these losses result from hardware or software failures. Similarly, Symantec Corporation (2016) found that 43% of data breaches involve small businesses. Therefore, there is a need for a secure backup solution that ensures the safety and protection of confidential files.
The proposed solution can provide an additional layer of security against file security. The solution aims to build a sophisticated device that can automatically facilitate a secure backup and deletion mechanism, this device would be accompanied with a file explorer software that helps users quickly encrypt confidential files using the 256bits-Advanced Encryption Standard protocol. The device would then be able to automatically process the files, which involves traversing the tree structure, locating said confidential files, automatically back them up to the cloud and perform secure delete on the file.

2024, IRMETS

The integration of shop floor automation systems with enterprise-level applications has become a critical imperative in the era of smart manufacturing. This paper presents a comprehensive framework for designing and implementing effective... more

The integration of shop floor automation systems with enterprise-level applications has become a critical imperative in the era of smart manufacturing. This paper presents a comprehensive framework for designing and implementing effective integration solutions that bridge the gap between shop floor operations and higherlevel business processes. We propose a multi-layered approach addressing data model alignment, system interoperability, workflow automation, and security. The framework incorporates semantic data integration, real-time communication middleware, microservices-based architecture, and a robust security model. Through theoretical analysis, we evaluate the potential impact of this framework on operational efficiency, quality control, and strategic decision-making. Our findings highlight the transformative potential of integrated shop floorenterprise architectures in driving digital transformation and operational excellence in the manufacturing sector.

2024

The landscape of information technology (IT) is continuously developing, and organizations are increasingly looking to automation as a fundamental approach for maximizing service delivery while simultaneously cutting costs. When it... more

The landscape of information technology (IT) is continuously developing, and organizations are increasingly
looking to automation as a fundamental approach for maximizing service delivery while simultaneously cutting
costs. When it comes to the delivery of information technology services, automation refers to the use of cutting edge technologies like artificial intelligence (AI), machine learning (ML), robotic process automation (RPA), and
cloud computing. These technologies are utilized to simplify processes, reduce the amount of human
interaction, and improve efficiency. Within the context of information technology service delivery, this abstract
investigates the potential for automation to reduce costs, with a particular emphasis on the tactics and tools
that may be used to generate considerable financial gains.
The decrease of operating expenses is one of the key benefits that automation brings to the supply of
information technology services. The execution of operations that are repetitive and time-consuming may be
accomplished with minimum involvement from humans thanks to automation, which in turn reduces the
chance of human mistake and the expenses associated with labor. By automating routine procedures,
businesses are able to reallocate their human resources to tasks that are more strategic and bring more value to
the firm. This results in an increase in both productivity and cost cost effectiveness. In addition, automation
makes it possible to provide services in a more timely and correct manner, which may result in increased client
satisfaction and retention, eventually leading to an increase in income.
The administration of information technology infrastructure is yet another essential area where automation is
responsible for cost reductions. The monitoring, maintenance, and optimization of information technology
infrastructure may be accomplished with higher accuracy and efficiency by automated systems than by human
methods. Automated monitoring technologies, for instance, have the ability to proactively detect and handle
possible problems before they develop into expensive outages or downtime. In addition, automation makes it
possible to enhance the efficiency with which resources are used. For instance, it may automatically scale cloud
resources in response to demand, which helps to reduce expenditures that are not essential. Because of this
dynamic allocation of resources, information technology services are provided in an effective manner, making
the most of the infrastructure that is available, which ultimately results in a reduction in total operational
expenses.
Furthermore, automation is a crucial factor in the enhancement of the scalability and flexibility of information
technology services. When firms have automated procedures in place, they are able to rapidly expand their
information technology services to meet the ever-changing needs of their businesses without having to make
significant extra expenditures in either their infrastructure or their human resources. This scalability is
especially important in the fast-paced business world of today, when organizations are required to be
adaptable and sensitive to changes in the market. By using automation, organizations are able to reach a better
degree of scalability while simultaneously maintaining cost control, so obtaining an advantage relative to their
competitors.
Additionally, automation helps to save costs by improving compliance and security management, which in turn
leads to additional cost savings. Automated systems have the ability to enforce regulations and compliance
requirements that are uniform throughout the whole information technology ecosystem. It is possible for automation in the supply of information technology services to provide long-term financial
advantages via continual development and innovation, in addition to the immediate cost reductions it may
generate. Systems that are automated are able to gather and analyze huge volumes of data, which may provide
useful insights that can be utilized to optimize procedures, improve service quality, and uncover new potential
for cost savings. This method, which is driven by data, gives enterprises the ability to constantly enhance the
delivery of their information technology services, which ultimately results in consistent cost savings and better
operational efficiency over time.vIn conclusion, the adoption of automation in IT service delivery offers
significant cost-saving opportunities for businesses. By automating routine tasks, optimizing IT infrastructure,
enhancing scalability, improving compliance, and driving continuous improvement, organizations can achieve
substantial financial benefits while maintaining high levels of service quality. As automation technologies
continue to advance, the potential for cost savings in IT service delivery will only grow, making it a critical
component of any organization’s cost management strategy.

2024

This paper explores the modernization of legacy data architectures through cloud solutions, focusing on various approaches and their associated benefits. It examines the challenges organizations face with outdated data systems and... more

This paper explores the modernization of legacy data architectures through cloud solutions, focusing on various approaches and their associated benefits. It examines the challenges organizations face with outdated data systems and presents cloud-based strategies such as rehosting, refactoring, replatforming, replacing, and hybrid/multi-cloud approaches. By highlighting the advantages of scalability, cost-effectiveness, performance improvement, and enhanced data management, this study aims to provide insights into how cloud solutions can transform legacy systems and support digital transformation. The paper also addresses potential challenges and considerations in the modernization process, offering practical recommendations for organizations seeking to leverage cloud technologies for improved data architecture.

2024, International Research Journal of Modernization in Engineering Technology and Science

In the fast-paced world of financial services, managing vast amounts of data efficiently and securely is paramount. Hybrid cloud architectures are emerging as a key solution, blending the strengths of on-premises and cloudbased data... more

In the fast-paced world of financial services, managing vast amounts of data efficiently and securely is paramount. Hybrid cloud architectures are emerging as a key solution, blending the strengths of on-premises and cloudbased data lakes. This approach offers flexibility, scalability, and enhanced data management capabilities, essential for handling the diverse and dynamic data environments typical of financial institutions. Hybrid cloud architectures enable organizations to leverage their existing on-premises infrastructure while seamlessly integrating with public cloud services. This dual approach ensures that sensitive financial data can be stored securely on-premises, adhering to regulatory requirements, while less sensitive data can benefit from the scalability and cost-efficiency of the cloud. By using a hybrid model, financial institutions can optimize their data storage and processing strategies, ensuring data is always in the right place for the right purpose. Several design patterns facilitate the effective implementation of hybrid cloud architectures in financial data lakes. These include data partitioning, where data is divided based on sensitivity and usage, and hybrid data processing, which leverages both on-premises and cloud resources to meet varying performance and compliance needs. Additionally, data replication and synchronization patterns ensure consistency and availability across both environments, providing robust disaster recovery and business continuity capabilities. Real-world use cases highlight the practical benefits of hybrid cloud architectures. For instance, financial firms can perform complex risk analysis and fraud detection by leveraging cloud-based analytics platforms, while keeping customer data securely on-premises. Another use case involves the integration of real-time market data from the cloud with historical transaction data stored on-premises, enabling more comprehensive and timely insights for trading and investment strategies.

2024

The expansion of cloud computing has undergone a substantial transformation in the manner in which companies handle their data, which has resulted in an increasing usage of data warehouses that are hosted in the cloud. These platforms... more

The expansion of cloud computing has undergone a substantial transformation in the manner in which companies handle their data, which has resulted in an increasing usage of data warehouses that are hosted in the cloud. These platforms provide an unrivaled level of scalability, flexibility, and cost-effectiveness, which makes them appealing to enterprises of varying sizes. The transfer from conventional on-premises data warehouses to cloud settings, on the other hand, brings about a variety of issues that need to be handled in order to guarantee a successful deployment and continued maintenance. One of the most significant difficulties is the integration of data. The data that is stored in a cloud environment often comes from a variety of sources, including as on-premises systems, other cloud platforms, and external partners. For the purpose of preserving the consistency and dependability of the data, it is essential to guarantee the smooth integration and synchronization of the data across all of these different sources. In order for organizations to successfully handle this complexity, they need to implement strong data integration tools and procedures. Some examples of these are ETL (Extract, Transform, Load) processes and real-time data streaming. Compliance with regulations and data security are two other key challenges. Data breaches, unauthorized access, and compliance with standards like as GDPR, HIPAA, and CCPA are some of the specific security problems that cloud environments provide, despite the fact that they come with a high level of protection. It is necessary to take a multi-pronged strategy in order to guarantee the safety of data stored in the cloud. This approach should include encryption, access restrictions, frequent audits, and compliance management systems. Additionally, organizations need to be careful about the shared responsibility model, which involves understanding the separation of security duties between the cloud provider and the client. The management of performance is yet another very important area of concern. Keeping queries and analytics running smoothly in the cloud is of the utmost importance as the volume of data continues to increase. The performance of cloud data warehouses must be optimized so that they can manage the processing of enormous amounts of data without sacrificing efficiency. The optimization of data storage formats, indexing algorithms, and the use of cloud-native capabilities like as auto-scaling and serverless computing are often required activities in this context. A continuous activity that involves experience and the appropriate collection of tools, monitoring and tweaking the performance of the data warehouse is a work that must be performed. There are two sides to the coin when it comes to cost management in cloud data warehousing. In spite of the fact that cloud computing provides the opportunity to save money via pay-as-you-go pricing structures, ineffective management might result in expensive charges that were not anticipated. Budgeting, monitoring, and optimizing resource use are all essential components of effective cost management techniques that organizations are required to undertake. Utilizing cost management tools that are offered by cloud suppliers or third-party solutions may be one way to accomplish this goal. These technologies allow for more visibility into expenditure and the identification of possibilities for cost optimization. Managing data warehouses on the cloud presents a number of challenges, one of the most significant being data governance. Because of the enormous quantity of data that is being produced and kept, it is of the utmost importance to guarantee that the data is correct, consistent, and available to those who are permitted to view it. The establishment of rules and processes for the management of metadata, data lineage, and data quality is an

2024, irjmets

In the digital era, Application Programming Interfaces (APIs) are pivotal for enabling seamless integration and functionality across diverse systems. However, the increasing reliance on APIs has concurrently escalated the risks associated... more

In the digital era, Application Programming Interfaces (APIs) are pivotal for enabling seamless integration and functionality across diverse systems. However, the increasing reliance on APIs has concurrently escalated the risks associated with their security. This research paper explores strategies and implementation techniques for securing APIs using Azure API Management (APIM). It delves into the core security features provided by Azure APIM, including authentication, authorization, and threat protection. By examining real-world use cases and industry best practices, the study highlights effective methods for safeguarding APIs against common vulnerabilities such as unauthorized access, data breaches, and denial-of-service attacks. Additionally, the paper provides practical guidance on configuring security policies, monitoring API usage, and integrating Azure APIM with other Azure security services. The findings aim to equip organizations with a comprehensive understanding of how to leverage Azure APIM to enhance API security and maintain robust protection in a complex digital landscape.

2024, International Journal of Engineering Research and Applications (ISSN: 2248-9622)

This research focuses on securing networked Electrocardiogram (ECG) systems by using a quantitative approach to evaluate the effectiveness of various cybersecurity measures. With the increasing reliance on networked medical devices, these... more

This research focuses on securing networked Electrocardiogram (ECG) systems by using a quantitative approach to evaluate the effectiveness of various cybersecurity measures. With the increasing reliance on networked medical devices, these systems have become vulnerable to cyber-attacks that can compromise data integrity, system functionality, and patient safety. The study quantitatively examines the impact of encryption levels, authentication methods, and network segmentation on system security by measuring variables such as attack success rates, data breach occurrences, and unauthorized access attempts. Statistical analysis, including regression and ANOVA, is applied to determine the significance of these measures. The findings aim to provide data-driven insights into enhancing the security of networked ECG systems, ultimately contributing to safer healthcare environments.

2024, International Research Journal of Modernization in Engineering Technology and Science

This paper aims to provide a comprehensive overview of reverse engineering, discussing its various techniques, applications, challenges, and opportunities. By exploring these aspects, we can better appreciate the role of reverse... more

This paper aims to provide a comprehensive overview of reverse engineering, discussing its various techniques, applications, challenges, and opportunities. By exploring these aspects, we can better appreciate the role of reverse engineering in advancing technology and solving complex problems. The primary objective of this paper is to elucidate the process and importance of reverse engineering across different domains. We aim to highlight the techniques used in reverse engineering, its applications in various industries, the challenges faced during the process, and the opportunities it presents for future advancements. Reverse engineering has a wide range of applications. In software development and maintenance, it aids in maintaining legacy systems and ensuring interoperability with modern technologies. It also drives product development and innovation by allowing companies to analyze competitors' products and enhance their own. Additionally, reverse engineering is used in legal and forensic contexts to resolve intellectual property disputes and conduct digital forensics. The process of reverse engineering faces several challenges, including technical, legal, and resource limitations. Technical challenges involve complex obfuscation techniques and evolving technologies that complicate the analysis. Legal and ethical challenges include navigating intellectual property laws and maintaining ethical integrity. Resource and expertise limitations involve the need for specialized tools, skilled personnel, and the significant time and cost involved in the process. Despite the challenges, reverse engineering presents numerous opportunities. Advancements in AI and machine learning have enhanced reverse engineering tools, making them more efficient and accurate.

2024, INFORMATION SYSTEMS ARCHITECTURE AND POTENTIAL VULNERABILITIES A case study of National Bank

Given the relentless rise in cyber-attacks affecting various organisations and the looming threats posed by hijackers leveraging Distributed Denial of Service (DDoS), malware infection, and security breaches to disrupt and defraud... more

Given the relentless rise in cyber-attacks affecting various organisations and the looming threats posed by hijackers leveraging Distributed Denial of Service (DDoS), malware infection, and security breaches to disrupt and defraud financial institutions globally, the role of the Chief Information Systems Officer in addressing this issue is of paramount importance. The recent cyber-attacks on major American financial institutions, allegedly orchestrated by organisations from the Middle East, could have been averted with a more proactive approach. It is crucial to meticulously plan integrated threat management and implement a unified solution, focusing on threats and risks that could adversely affect the organisation. This comprehensive threat management platform is designed to shield an enterprise from all potential threats, enabling it to monitor and manage them effectively.

2024, IRJMETS Publication

In the fast-paced world of financial services, managing vast amounts of data efficiently and securely is paramount. Hybrid cloud architectures are emerging as a key solution, blending the strengths of on-premises and cloudbased data... more

In the fast-paced world of financial services, managing vast amounts of data efficiently and securely is paramount. Hybrid cloud architectures are emerging as a key solution, blending the strengths of on-premises and cloudbased data lakes. This approach offers flexibility, scalability, and enhanced data management capabilities, essential for handling the diverse and dynamic data environments typical of financial institutions. Hybrid cloud architectures enable organizations to leverage their existing on-premises infrastructure while seamlessly integrating with public cloud services. This dual approach ensures that sensitive financial data can be stored securely on-premises, adhering to regulatory requirements, while less sensitive data can benefit from the scalability and cost-efficiency of the cloud. By using a hybrid model, financial institutions can optimize their data storage and processing strategies, ensuring data is always in the right place for the right purpose. Several design patterns facilitate the effective implementation of hybrid cloud architectures in financial data lakes. These include data partitioning, where data is divided based on sensitivity and usage, and hybrid data processing, which leverages both on-premises and cloud resources to meet varying performance and compliance needs. Additionally, data replication and synchronization patterns ensure consistency and availability across both environments, providing robust disaster recovery and business continuity capabilities. Real-world use cases highlight the practical benefits of hybrid cloud architectures. For instance, financial firms can perform complex risk analysis and fraud detection by leveraging cloud-based analytics platforms, while keeping customer data securely on-premises. Another use case involves the integration of real-time market data from the cloud with historical transaction data stored on-premises, enabling more comprehensive and timely insights for trading and investment strategies.

2024

Seamless data migration is crucial for modern enterprises striving to stay competitive and efficient in today's digital landscape. As businesses increasingly move their operations to the cloud and adopt containerization technologies like... more

Seamless data migration is crucial for modern enterprises striving to stay competitive and efficient in today's digital landscape. As businesses increasingly move their operations to the cloud and adopt containerization technologies like Kubernetes, ensuring a smooth transition of data becomes a top priority. Data migration, when done right, minimizes downtime, mitigates risks, and enhances performance, ultimately leading to improved business agility and innovation. In this context, cloud environments and Kubernetes pods emerge as pivotal areas of focus. Cloud environments offer scalability, flexibility, and cost-efficiency, making them an attractive option for businesses looking to optimize their IT infrastructure. However, migrating data to the cloud requires careful planning and execution to avoid disruptions and data loss. It involves understanding the unique characteristics of different cloud providers, selecting appropriate migration tools, and ensuring data security and compliance. Kubernetes, on the other hand, revolutionizes how applications are deployed and managed by providing a platform for automating the deployment, scaling, and operations of application containers. Migrating data to Kubernetes pods involves addressing the complexities of container orchestration, managing persistent storage, and ensuring seamless integration with existing systems. Properly configuring Kubernetes clusters, implementing robust backup and recovery strategies, and monitoring the migration process are essential steps to achieve a seamless transition.

2024, IRJMETS Publication

In today's digital age, businesses are increasingly moving to the cloud to leverage its flexibility, cost-efficiency, and scalability. This article dives into the essentials of architecting cloud solutions using Amazon Web Services (AWS),... more

In today's digital age, businesses are increasingly moving to the cloud to leverage its flexibility, cost-efficiency, and scalability. This article dives into the essentials of architecting cloud solutions using Amazon Web Services (AWS), with a sharp focus on creating systems that are both scalable and secure. We start by exploring the core services AWS offers, such as EC2 for computing power, S3 for storage, and RDS for managed databases. These services are the building blocks that enable businesses to construct robust cloud architectures. The beauty of AWS lies in its ability to scale resources up or down based on demand, ensuring that businesses only pay for what they use. This elasticity is critical for managing costs and meeting varying workloads without compromising performance. Security, a top concern for any business, is another focal point of our discussion. AWS provides a suite of security features, including Identity and Access Management (IAM), encryption options, and compliance certifications. We delve into best practices for securing AWS environments, such as setting up multi-factor authentication, leveraging security groups, and regularly auditing access logs. These measures help protect sensitive data and maintain the integrity of systems against potential threats. Real-world examples illustrate how companies have successfully implemented AWS solutions to achieve scalability and security. From startups to large enterprises, AWS has enabled them to innovate quickly while maintaining a secure environment. The article also touches on the importance of monitoring and automation. Tools like AWS CloudWatch and CloudFormation allow for continuous monitoring and automated infrastructure management, ensuring systems remain efficient and resilient.

2024, Security Services

As data centers continue to evolve, so too do the cybersecurity threats that target them. It's imperative for security professionals to stay informed of the latest threats and innovations in security technology to protect these vital... more

As data centers continue to evolve, so too do the cybersecurity threats that target them. It's imperative for security professionals to stay informed of the latest threats and innovations in security technology to protect these vital assets effectively.

2024, Book Chapter

Software industries frequently use cloud computing techniques, in contrast to, conventional local hosting and on premise software for data storage, processing, and collaboration. This is mainly attributed to their simplicity and... more

Software industries frequently use cloud computing techniques, in contrast to, conventional local hosting and on premise software for data storage, processing, and collaboration. This is mainly attributed to their simplicity and collaboration. As a result, platforms and associated applications become extremely sensitive and vulnerable to online threats. In particular, when cloud computing is used in the Internet of Thing (IoT) networks. Therefore, in this chapter, we first, briefly discuss security challenges/ issues involved in this integration and next propose a model/ framework for mitigating these challenges effectively.

2024

The use of artificial intelligence (AI) and cloud computing has transformed the delivery of customized banking and insurance services in the ever-changing financial environment of today. In order to provide customized product... more

The use of artificial intelligence (AI) and cloud computing has transformed the delivery of customized banking and insurance services in the ever-changing financial environment of today. In order to provide customized product recommendations for the banking and insurance industries, this article suggests a unique architecture that makes use of cloud-enhanced AI approaches. Through the use of cloud infrastructure's scalability and flexibility in conjunction with AI algorithms' superior analytics capabilities, financial institutions may provide customized solutions that address the unique demands and preferences of their clientele. Through continuous learning and adaptation, the system iteratively refines its recommendations based on evolving customer behaviors, market trends, and regulatory requirements. Furthermore, this framework ensures compliance with stringent data privacy and security standards, safeguarding sensitive customer information throughout the recommendation process. By adhering to industry best practices and regulatory guidelines, financial institutions can build trust and enhance customer confidence in the personalized services offered. In conclusion, the integration of cloud-enhanced AI presents a transformative opportunity for financial institutions to deliver hyper-personalized banking and insurance products. By harnessing the power of cloud infrastructure and AI algorithms, organizations can unlock new levels of efficiency, innovation, and customer satisfaction in the rapidly evolving digital economy.

2024

Secure cloud architectures are pivotal for the successful implementation of AI-enhanced banking and insurance services in today's digital landscape. As financial institutions increasingly leverage artificial intelligence (AI) to improve... more

Secure cloud architectures are pivotal for the successful implementation of AI-enhanced banking and insurance services in today's digital landscape. As financial institutions increasingly leverage artificial intelligence (AI) to improve operational efficiency, enhance customer experiences, and mitigate risks, ensuring the security and resilience of cloud-based infrastructures becomes paramount. This paper explores the critical role of secure cloud architectures in enabling AI-driven innovations within the banking and insurance sectors. It examines key considerations such as data privacy, encryption, access control, and regulatory compliance to safeguard sensitive financial information and maintain customer trust. Additionally, the paper discusses emerging trends and best practices in cloud security, highlighting the importance of collaboration between industry stakeholders, regulators, and technology providers to address evolving cybersecurity challenges effectively. By adopting robust and scalable cloud architectures, banks and insurance companies can unlock the full potential of AI technologies while mitigating security risks and maintaining regulatory compliance in an increasingly digital and interconnected world.

2024, International Research Journal of Modernization in Engineering Technology and Science

This article investigates the full pathway for deploying a modern Warehouse Management System (WMS) and its revolutionary effect on warehouse operations. Beginning with a thorough needs assessment and requirement analysis, the technique... more

This article investigates the full pathway for deploying a modern Warehouse Management System (WMS) and its revolutionary effect on warehouse operations. Beginning with a thorough needs assessment and requirement analysis, the technique includes vendor selection, system integration, customisation, data migration, pilot testing, and complete training. The findings show considerable gains in inventory accuracy, order fulfillment timelines, and operational efficiency, all thanks to real-time data visibility and advanced analytics. A WMS's financial and operational benefits include increased customer satisfaction and significant cost reductions. Despite hurdles such as staff opposition and integration complications, strategic planning and thorough training effectively addressed these issues. Case examples from the retail, manufacturing, and ecommerce industries demonstrate the broad applicability and beneficial effects of WMS deployment. Looking ahead, incorporating technology such as artificial intelligence, machine learning, and the Internet of Things promises to accelerate progress. This article indicates that a contemporary WMS is critical for optimizing warehouse operations and establishing a competitive advantage in a changing market scenario.

2024, IRJCS:: AM Publications,India

In the ever-evolving landscape of digital infrastructure, the adoption of cloud computing has ushered in unparalleled opportunities for innovation but has also introduced complex challenges in securing sensitive data. This research,... more

In the ever-evolving landscape of digital infrastructure, the adoption of cloud computing has ushered in unparalleled opportunities for innovation but has also introduced complex challenges in securing sensitive data. This research, titled "Beyond the Firewall: Understanding and Mitigating Cloud Security Challenges," embarks on a comprehensive exploration of the multifaceted dimensions surrounding cloud security. The study delves into the intricacies of cloud security, transcending traditional boundaries set by firewalls. From elucidating the dynamics of shared responsibility models to dissecting the nuances of identity and access management, the research unravels the complexities inherent in safeguarding data within the expansive digital cosmos. It addresses elusive threats like data breaches and underscores the critical importance of adaptive strategies to navigate the ever-changing threat landscape. This research goes beyond theoretical discourse, offering actionable insights for organizations seeking to fortify their cyber defenses. It emphasizes the need for a paradigm shift in understanding security challenges in the cloud era and advocates for a proactive approach to mitigate potential risks. By illuminating the path "Beyond the Firewall," this study aims to empower stakeholders with practical knowledge, enabling them to establish robust security frameworks that resonate with the dynamic nature of modern digital ecosystems. Join us on this expedition into the heart of cloud security challenges, as we decipher the complexities and chart a course towards a more resilient and secure digital future.

2024

Denial of service (DOS) and distributed denial of service (DDOS) have become major threats in a computer network. The function of a DDOS attack is fundamental to make the system not to respond any requests or providing services. Detection... more

Denial of service (DOS) and distributed denial of service (DDOS) have become major threats in a computer network. The function of a DDOS attack is fundamental to make the system not to respond any requests or providing services. Detection and prevention of DOS/DDOS is a tedious process. In the earlier days, it can be prevented by using the puzzle-solving technique. In puzzle-solving technique first, the server generates some puzzles and it sends to the client. Then the client solves the puzzle and it sends it to the server then the server confirms that the client able to obtain the service from the server. In this type of puzzle-solving technique attackers can merely reply to the server it cannot be identified in this puzzle-solving technique and Graphics Processing Unit (GPU)-inflation DoS doesn't work and it publish puzzle function in advance. It can be enhanced or overcome by using software puzzle-solving technique it dynamically generates puzzle function. This technique expl...

2023

The Python programming language has various module libraries for network scanning of hosts. In this paper the performance and implementation of a modified script for Linux based operating systems using a linear algorithm for network port... more

The Python programming language has various module libraries for network scanning of hosts. In this paper the performance and implementation of a modified script for Linux based operating systems using a linear algorithm for network port scanning is presented.

2023, International Research Journal of Modernization in Engineering Technology and ScienceVolume:05/Issue:12

An increasing number of organizations are adopting cloud technologies, often in conjunction with existing data center (DC) facilities. This hybrid approach, blending traditional and cloud environments, necessitates a dual focus on... more

An increasing number of organizations are adopting cloud technologies, often in conjunction with existing data center (DC) facilities. This hybrid approach, blending traditional and cloud environments, necessitates a dual focus on maintaining traditional security measures while also protecting cloud-based operations with compatible tools. Current literature typically addresses the security aspects of these environments separately, overlooking the nuances of a combined cybersecurity setup. This gap is particularly evident in the ongoing evolution of cyber defense maturity in parallel environments. This paper introduces a novel and practical hybrid model designed to assess and enhance organizational cyber maturity across both traditional environment and cloud environment operating in tandem. By applying this unified model, organizations can set improvement targets for cyber defense maturity, tailor responses to emerging digital threats, and simultaneously safeguard the integrity of their traditional systems. The procedure is fundamentally fluid, entailing ongoing enhancement of cybersecurity practices and consistently revising maturity goals to match the changing needs of the business and the organization's shifting landscape.

2023, International Research Journal of Modernization in Engineering Technology and Science, Volume:05/Issue:10

In today's digital age with cloud computing at its forefront, the importance of robust security frameworks, especially the Shared Responsibility Model (SRM) in cloud security, is increasingly recognized. Literature has focused on... more

In today's digital age with cloud computing at its forefront, the importance of robust security frameworks, especially the Shared Responsibility Model (SRM) in cloud security, is increasingly recognized. Literature has focused on technical and legal aspects of SRM deployment leaving its strategic integration through Cloud Security Maturity Model (CSMM) underexplored. This research meticulously explores the escalating necessity for employing a CSMM amidst organizations, strategically integrating the deployment of a SRM during their cloud adoption journey. It delves into the nuances of two primary CSMMs: the vendor-specific "AWS Security Maturity Model" and the vendor-neutral "CSA Cloud Security Maturity Model". A detailed comparative analysis reveals the intricacies, benefits, and challenges inherent in each model, offering practical insights for diverse organizational security needs. By blending theoretical and pragmatical perspectives, this study provides actionable recommendations for organizations to customize their cloud security approach. The manifesto not only augments scholarly discussions on cloud security maturity but also equips organizations with a strategic blueprint for tailoring their cloud security initiatives in an ever-evolving digital landscape.

2023, International Journal of Engineering Research and Applications

We live in the era of gigantic complexity. With the daze elevation in technology, the IT infrastructure has remoulded to the core. However, in the fullness of time the epoch of cloud computing is now arising also acknowledged as on-demand... more

We live in the era of gigantic complexity. With the daze elevation in technology, the IT infrastructure has remoulded to the core. However, in the fullness of time the epoch of cloud computing is now arising also acknowledged as on-demand computing. It provides marketability, fidelity, coherence, high-performance and adequately low-lying cost conceivable way out as compared to dyed-in-the-wool infrastructure .Aloft the internet, it is the technology yielded in the form of service and these services are furnished with the hardware system in the data centres .This paper gives the meticulous outlining for cloud and focuses on the primarily outlook of Cloud Computing. In the long run, this paper comes to light to render the service modal, types of cloud computing : IaaS , PaaS, SaaS , ways of cloud computing as well as advantages and disadvantages of Cloud Computing. The future of this technology is at top of ladder. It is the next generation and can be of tremendous value to the worldwide companies.

2023, IGI Global eBooks

Cloud computing is a new paradigm model that offers different services to its customers. The increasing number of users for cloud services i.e. software, platform or infrastructure is one of the major reasons for security threats for... more

Cloud computing is a new paradigm model that offers different services to its customers. The increasing number of users for cloud services i.e. software, platform or infrastructure is one of the major reasons for security threats for customers' data. Some major security issues are highlighted in data storage service in the literature. Data of thousands of users are stored on a single centralized place where the possibility of data threat is high. There are many techniques discussed in the literature to keep data secure in the cloud, such as data encryption, private cloud and multiple clouds concepts. Data encryption is used to encrypt the data or change the format of the data into the unreadable format that unauthorized users could not understand even if they succeed to get access of the data. Data encryption is very expensive technique, it takes time to encrypt and decrypt the data. Deciding the security approach for data security without understanding the security needs of the data is a technically not a valid approach. It is a basic requirement that one should understand the security level of data before applying data encryption security approach. To discover the data security level of the data, the authors used machine learning approach in the cloud. In this paper, a data classification approach is proposed for the cloud and is implemented in a virtual machine named as Master Virtual Machine (Vmm). Other Vms are the slave virtual machines which will receive from Vmm the classified information for further processing in cloud. In this study the authors used three (3) virtual machines, one master Vmm and two slaves Vms. The master Vmm is responsible for finding the classes of the data based on its confidentiality level. The data is classified into two classes, confidential (sensitive) and nonconfidential (non-sensitive/public) data using K-NN algorithm. After classification phase, the security phase (encryption phase) shall encrypt only the confidential (sensitive) data. The confidentiality based data classification is using K-NN in cloud virtual environment as the method to encrypt efficiently the only confidential data. The proposed approach is efficient and memory space friendly and these are the major findings of this work.

2023, International journal of engineering research and technology

If all of the top levels of security fail, the final and most critical tier, data security, must not fail [1]. By breaching this layer of defence, the CIA's triad principles of confidentiality, integrity, and availability are undermined.... more

If all of the top levels of security fail, the final and most critical tier, data security, must not fail [1]. By breaching this layer of defence, the CIA's triad principles of confidentiality, integrity, and availability are undermined. However, increasing security reduces the performance of the system and usability. This paper addresses the fundamentals of cloud computing as well as its key challenge: security. This paper examines a variety of cryptographic methods used by major cloud providers. It proposes an alternative algorithm for encrypting data in transit from the user to the cloud in order to ensure data security and defend against Man-in-the-Middle (MitM) attacks like sniffing. The paper concludes by urging further study into the proposed cryptography algorithm in order to ensure data protection and privacy in all three data states.

2023, International Journal of Computer Science and Information Technology

The SHAMEL Exam is the second important exam in Jordan; accordingly, the preservation of confidentiality and security are the most important priorities of the exam managers. Recently, AL-Balqa Applied University (BAU) in Jordan has... more

The SHAMEL Exam is the second important exam in Jordan; accordingly, the preservation of confidentiality and security are the most important priorities of the exam managers. Recently, AL-Balqa Applied University (BAU) in Jordan has computerized the exam and one of the suggestions was to utilize the cloud computing applications. However, cloud computing entails many security concerns that may have impacts on the exam information security. This research discusses the current use the cloud computing in many life aspects and then concentrate on online exams aspect; also, this research clarifies the tangible and intangible risks associated with cloud computing adoption. Then, the research examined a specific case study related to the subject matter. Finally, this research explores the level of understanding risks and methods may be used to reduce it and help in protecting data from unauthorized persons.

2023, The Indonesian Journal of Electrical Engineering and Computer Science (IJEECS)

In addition to security advantages like implementing defense in depth and complying with compliance standards, current bastion services are simple to deploy and fit into the DevOps culture. Bastions continue to be the most dependable and... more

In addition to security advantages like implementing defense in depth and complying with compliance standards, current bastion services are simple to deploy and fit into the DevOps culture. Bastions continue to be the most dependable and secure options for secure access to cloud infrastructures because they offer administrative simplicity without surrendering compliance and security. In this paper, an experimental set up was conducted to measure the cycle time it takes to provision resources using manual point-and-click graphical user interface (GUI) in Amazon web services (AWS) and time it takes for codified infrastructure to make application programming interface (API) calls using terraform. It also focuses on the design and deployment of Bastion host on AWS and terraform, and the comparison between the two with respect to various parameters.

2023, International Journal of Emerging Trends in Engineering Research

The main function of the transaction processing system (TPS) in the business world is to handle data transactions. Hence, it is crucial to secure the database, we discuss the problem of database threats in a transaction processing system... more

The main function of the transaction processing system (TPS) in the business world is to handle data transactions. Hence, it is crucial to secure the database, we discuss the problem of database threats in a transaction processing system in this article. A transaction process system (TPS) refers to an information processing system for business transactions that collects, modifies, and retrieves all transaction data. Database security denotes the safeguarding of database management systems using a variety of strategies against malicious cyberattacks, unlicensed access, and illegitimate use. The elements that need to be protected by database security systems include the data that has to be stored, the database where it is stored, and the database management system used to administer the data. It involves safeguarding the system from harm, infiltration, and exploitation. Additionally, it safeguards any database-related applications. The aim of this study is to explore possible database...

2023

Data security and access control is one of the most challenging ongoing research work in cloud computing, due to users outsourcing their sensitive data to cloud providers. The various existing solutions that use pure cryptographic... more

Data security and access control is one of the most challenging ongoing research work in cloud computing, due to users outsourcing their sensitive data to cloud providers. The various existing solutions that use pure cryptographic techniques to mitigate these security and access control problems suffer from heavy computational overhead on the data owner as well as the cloud service provider for key distribution and management. Cloud storage moves the user's data to large data centers, that are remotely located, on which user does not have any control. This unique feature of the cloud poses many new security challenges which need to be clearly understood and resolved.

2023, International Journal of Computer Network and Information Security

Main objective of this research work is to improve the checkpoint efficiency for integrated multilevel checkpointing algorithms and prevent checkpointing from becoming the bottleneck of cloud data centers. In order to find an efficient... more

Main objective of this research work is to improve the checkpoint efficiency for integrated multilevel checkpointing algorithms and prevent checkpointing from becoming the bottleneck of cloud data centers. In order to find an efficient checkpoint interval, checkpointing overheads has also considered in this paper. Traditional checkpointing methods stores persistently snapshots of the present job state and use them for resuming the execution at a later time. The attention of this research is strategies for deciding when and whether a checkpoint should be taken and evaluating them in regard to minimizing the induced monetary costs. By varying rerun time of checkpoints performance comparisons are which will be used to evaluate optimal checkpoint interval. The purposed fail-over strategy will work on application layer and provide highly availability for Platform as a Service (PaaS) feature of cloud computing.

2023, Computer Engineering and Intelligent Systems

In today's highly interconnected world, network security has become a critical aspect of protecting organizations from cyber-attacks. The increasing sophistication of attackers and their ability to exploit software and firmware... more

In today's highly interconnected world, network security has become a critical aspect of protecting organizations from cyber-attacks. The increasing sophistication of attackers and their ability to exploit software and firmware vulnerabilities pose significant dangers to the security of networks. However, many organizations often neglect the essential steps required to secure their networks, leading to an increased risk of security breaches. In this research article, we aim to address this issue by investigating network security concepts, potential dangers, and practical defense strategies. We begin by exploring the different types of cyber-attacks and their sources, highlighting the various ways attackers exploit network vulnerabilities. We also examine the reasons why organizations often overlook network security and the consequences of not prioritizing it. To better understand the complexity of network security, we categorize the different security concerns using the CIA (confidentiality, integrity, and availability) triangle. This approach allows us to identify the various areas of vulnerability and their potential impact on network security. Next, we focus on the most crucial basic concepts and steps involved in various network security operations. We outline the best practices and practical approaches organizations can take to improve their network security, including implementing security policies and procedures, using encryption and authentication methods, and conducting regular security assessments. By highlighting the importance of network security and providing practical guidance on how organizations can defend against cyber-attacks, we hope to raise awareness and help prevent security breaches.

2023

Data security and access control is one of the most challenging ongoing research work in cloud computing, due to users outsourcing their sensitive data to cloud providers. The various existing solutions that use pure cryptographic... more

Data security and access control is one of the most challenging ongoing research work in cloud computing, due to users outsourcing their sensitive data to cloud providers. The various existing solutions that use pure cryptographic techniques to mitigate these security and access control problems suffer from heavy computational overhead on the data owner as well as the cloud service provider for key distribution and management. Cloud storage moves the user's data to large data centers, that are remotely located, on which user does not have any control. This unique feature of the cloud poses many new security challenges which need to be clearly understood and resolved.

2022

Cloud computing is emerging software technology based on the network and it is a technique that provide to access data from server. It describes extremely scalable computing assets provided as an external service via the internet on a... more

Cloud computing is emerging software technology based on the network and it is a technique that provide to access data from server. It describes extremely scalable computing assets provided as an external service via the internet on a pay- as- you-go basis. As we all know about cloud computing so there are many factors which we have to focus on. ―Security‖ is one of the major topic in cloud computing or we can say security of customer‘s sensitive information. With the increase in popularity of cloud data storage, efficiently proving the integrity of the data stored at an untrusted server has become significant. A cloud storage system, consisting of a group of storage servers, provides long storage services over net. Storing information in third party‘s cloud system causes serious concern over information confidentiality. General coding schemes protect information confidentiality, however also limit the functionality of the storage system as a result of a couple of operations are sup...

2022

Cloud computing is a distributed computing environment that provides on demand services to the users for deploying their computational needs in a virtualized environment without the knowledge of technical infrastructure. Due to... more

Cloud computing is a distributed computing environment that provides on demand services to the users for deploying their computational needs in a virtualized environment without the knowledge of technical infrastructure. Due to reliability, scalability, high performance and low band width most of the organizations are running their applications in cloud. The cloud service providers provide the services to the registered cloud users on payment basic across the glove. The cloud services are basically categorized as SaaS, PaaS, and IaaS. The services are available to the users depending on cloud deployment and the SLA (service level agreements) between the service providers and the users. Providing security to the users and trust into cloud environment is the responsibility of the cloud service providers. The main objective of this paper is to provide a clear idea about the cloud service models and outline the security issues in the service models.

2022, International Journal of Computer Network and Information Security

This paper presents a methodology for providing high availability to the demands of cloud's clients. To attain this objective, failover stratagems for cloud computing using integrated checkpointing algorithms are purposed in this paper.... more

This paper presents a methodology for providing high availability to the demands of cloud's clients. To attain this objective, failover stratagems for cloud computing using integrated checkpointing algorithms are purposed in this paper. Purposed strategy integrate checkpointing feature with load balancing algorithms and also make multilevel checkpoint to decrease checkpointing overheads. For implementation of purposed failover strategies, a cloud simulation environment is developed, which has the ability to provide high availability to clients in case of failure/recovery of service nodes. \\The primary objective of this research work is to improve the checkpoint efficiency and prevent checkpointing from becoming the bottleneck of cloud data centers. In order to find an efficient checkpoint interval, checkpointing overheads has also considered in this paper. By varying rerun time of checkpoints comparison tables are made which can be used to find optimal checkpoint interval. The purposed failover strategy will work on application layer and provide highly availability for Platform as a Service (PaaS) feature of cloud computing.

2022, International Journal of Information Engineering and Electronic Business

This paper presents an methodology for providing high availability to the demands of cloud"s clients. To succeed this objective, failover approaches for cloud computing using combined checkpointing procedures with load balancing... more

This paper presents an methodology for providing high availability to the demands of cloud"s clients. To succeed this objective, failover approaches for cloud computing using combined checkpointing procedures with load balancing algorithms are purposed in this paper. Purposed methodology assimilate checkpointing feature with load balancing algorithms and also make multilevel barrier to diminution checkpointing overheads. For execution of purposed failover approaches, a cloud simulation environment is established, which the ability to provide high availability to clients in case of disaster/recovery of service nodes. Also in this paper comparison of developed simulator is made with existing approaches. The purposed failover strategy will work on application layer and provide highly availability for Platform as a Service (PaaS) feature of cloud computing.