A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
An Invincible Rudimentary Architecture for Data Security in Cloud Environment Using Multi Cloud
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
Because of the popularity of cloud computing, providing security to the stored data is a major concern. ...
Cloud is a distributed access of shared pool of resources that can provide the efficient service on demand basics to cloud user by the service providers. ...
Antonios et al., has listed that policies, models and mechanisms of Access Controls (AC). A policy defined in high level as how and when a user can access a specific resource. ...
doi:10.35940/ijitee.g5457.0981119
fatcat:7r5i6galhnac3c5klsyf243vsu
Secure Cloud Infrastructure: A Survey on Issues, Current Solutions, and Open Challenges
2021
Applied Sciences
Based on the exploration of the current challenges, some cloud features such as flexibility, elasticity and the multi-tenancy are found to pose new challenges at each infrastructure level. ...
This paper presents a comprehensive survey of the security issues at different cloud infrastructure levels (e.g., application, network, host, and data). ...
of
integrity
[36,37]
Prefix Hijacking
Network level
Multi-tenancy and
Elasticity
Affected integrity
and availability
[44]
Reused IP
Addressing
Network level
Multi-tenancy and
Elasticity ...
doi:10.3390/app11199005
fatcat:zxxcwgbscffnzakdrqrqicegq4
Secure Authentication in Cloud Computing using Diffie Hellman and One Time Password
2021
International Journal for Research in Applied Science and Engineering Technology
The user data needs to be protected from unknown parties. Different types of encryption schemes and authentication techniques are used to tackle the issue of cloud security. ...
The encryption schemes are- Homomorphic Encryption and Homogeneous Encryption. ...
Multi-tenancy can be applied to different levels that is, application level, middleware level, operating system, hardware level.
III. ...
doi:10.22214/ijraset.2021.36037
fatcat:cugiaou7a5da5jpdmfw7ijk2bi
A Survey on Security Mechanisms of Leading Cloud Service Providers
2014
International Journal of Computer Applications
Clouding Computing is a virtual pool of resources provided to users as service through a web interface. These resources may include Software, Infrastructure, Storage, Network, Platform etc. ...
challenges posed to data on the cloud computing. 2) Survey cryptographic algorithms that can be used to overcome these challenges. 3) Survey Security designs of 5 leading cloud service providers. 4) Perform a ...
Additionally, FIPS 140-2 Level 1 certified encryption services are available to provide the off-site backups requiring the highest standards of protection [70] . ...
doi:10.5120/17149-7184
fatcat:262geqqsqbet7gofec7wyrn2di
Applying Encryption Algorithm for Data Security in Cloud Storage
[chapter]
2016
Lecture Notes in Electrical Engineering
Encryption is a well known technology for protecting sensitive data. Use of the combination of Public and Private key encryption to hide the sensitive data of users, and cipher text retrieval. ...
It is an Internet-based computing technology, in which software, shared recourses and information, are provided to consumers and devices on-demand, and as per users requirement on a pay per use model. ...
To Establish an Encryption Based System for protecting Sensitive data on the cloud and Structure how owner and storage Service Provider to operate on encrypted Data 3. ...
doi:10.1007/978-981-287-990-5_12
fatcat:vbm6jv6wu5fibiaklovm6r5kxu
A Survey on Various Security Issues and Challenges to Secure Cloud Computing
2018
International Journal of Innovative Research in Computer Science & Technology
Even though there is secure Homomorphic encryption there lays certain security issues and attacks with it. ...
It also provides a broad study on the issues and challenges of security .Growth of cloud computing is mainly decreased due to these concerns and challenges. ...
Naim Ahmad [5] , "Cloud Computing: Technology, Security Issues and Solutions", discussed about the Cloud Security Issues, Multi-level Integrated Security, Service Level Agreements (SLA) and Cloud Computing ...
doi:10.21276/ijircst.2018.6.3.3
fatcat:cus6eb5jfjfm3omnfgvcbi6cjq
Virtual Private Cloud and Authentication: A Review
2018
Asian Journal of Computer Science and Technology
The cloud supports characteristic such as on demand services, resource pooling, elasticity .While authentication plays important role in the security as it protects the data from the unauthorized people ...
Different Types of cloud service models and deployment models make the cloud access to its users. ...
to break levels to get access into a system. ...
doi:10.51983/ajcst-2018.7.2.1862
fatcat:wrz2gie3mfdv7hkkjhwdvmdnti
User-Controlled Security Mechanism in Data-Centric Clouds
2015
2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems
By leasing cloud platforms to run their business, startups can achieve costsaving and scale-up elasticity without being concerned about over-provisioning or under-provisioning for a service. ...
The proposed mechanism allows customers to take the initiative to protect their own data. We believe this flexibility could prove to be a major improvement in cloud security if implemented well. ...
We believe that a good design would offer a choice of security level and mechanisms [28] . That is, the users have the ability to customize their desired security level and mechanism on demand. ...
doi:10.1109/hpcc-css-icess.2015.157
dblp:conf/hpcc/LiuW0C15
fatcat:tjlzpht4v5cedibcuf5wc2pjtm
A Review on Security Issues and their Impact on Hybrid Cloud Computing Environment
2019
International Journal of Advanced Computer Science and Applications
In order to key benefit with hybrid cloud model, there are different security issues that have been shown to address. ...
The evolution of cloud infrastructures toward hybrid cloud models enables innovative business outcomes, twin turbo drivers by the requirement of greater IT agility and overall cost-containment pressures ...
In this paper addresses different methods for data protection includes Single Encryption, Multitenancy and Multi level Virtualization, Authentication model including several scenarios. Rao et al. ...
doi:10.14569/ijacsa.2019.0100346
fatcat:pwgaeyddhzfv5ekxabneql5qwm
A survey of cryptographic approaches to securing big-data analytics in the cloud
2014
2014 IEEE High Performance Extreme Computing Conference (HPEC)
We then survey three cryptographic techniques -homomorphic encryption, verifiable computation, and multi-party computation -that can be used to achieve these goals. ...
We introduce a cloud computing model that captures a rich class of big-data use-cases and allows reasoning about relevant threats and security goals. ...
A. Homomorphic Encryption Suppose that to lower operating costs, the NIH were to store and process its data on a public cloud, such as the Amazon Elastic Compute Cloud (EC2) [5] . ...
doi:10.1109/hpec.2014.7040943
dblp:conf/hpec/YakoubovGSSY14
fatcat:jinnrastevhkzn5y4plfkh7baq
"Security Issues and Solutions in Cloud Computing"
2017
IOSR Journal of Computer Engineering
models, and four deployment models [4]. ...
NIST Definition-Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications ...
How do you protect user authentication information? 2. How are User Files stored? What level of encryption? 3. Is the system multi-tenant? 4. How is account information stored? 5. ...
doi:10.9790/0661-1902046772
fatcat:bib5krs6n5cvbml4l7v4fjrmyi
Tenant - Vendor and Third-Party Agreements for the Cloud: Considerations for Security Provision
2016
International Journal of Software Engineering and Its Applications
With the expanding hybrid cloud model offering better services and convenience there are also a number of security problems associated with cloud standardization, multi-tenancy third party privity/sub-contracting ...
This paper focuses on Hybrid Cloud Computing security in the context of a Tenant-Vendor-Third-Party environment and service level agreements. ...
There should be an additional level of security to encrypt the data, so it is protected incase of any Distributed Denial-of-Service Attacks (DDoS) attacks or malicious attacks within the multi-tenancy ...
doi:10.14257/ijseia.2016.10.12.37
fatcat:tukb32cuazdjljtngra3ukc3xi
An Exhaustive Review on Security Issues in Cloud Computing
2019
KSII Transactions on Internet and Information Systems
However, security, privacy and integrity of data is a major concern. ...
Cloud computing has become a buzzword in relation to Grid & Utility computing. It provides on demand services to customers and customers will pay for what they get. ...
• PaaS [Platform as a service] PaaS is at the middle level of the model. It provides tools, framework & programs. ...
doi:10.3837/tiis.2019.06.025
fatcat:d2lidmgohvashh6vbqchkvekti
Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations
[chapter]
2018
Lecture Notes in Computer Science
As a result, we achieve elasticity, high performance, and high security at the same time. ...
Compared to the standard approach based on access control lists, our encryption as a service approach allows us to use cheap standard cloud storage in the public cloud and to mitigate a single point of ...
Protection from insiders can be achieved by client-side encryption, e. g. Cryptomator, 4 or encryption as a service, e. g. ...
doi:10.1007/978-3-319-75650-9_1
fatcat:ldxf53pfjfhpdmua6kxqo4hbyi
Review of solutions for securing end user data over cloud applications
2016
International Journal of Advanced Computer Research
There is an urgent need of solutions for end user data protection and privacy during the times when migrating from one cloud service provider to another. ...
By using solution paths such as digital keys, multi factor authentication and cloud aware applications. This paper identifies end users data security issues when using cloud computing services. ...
[9] addresses research on cloud computing, data security model based on multi dimensions. A complete data security three layer defence model based on multi dimension is proposed. ...
doi:10.19101/ijacr.2016.626005
fatcat:ojhtghld5fba7cuauahnhebhni
« Previous
Showing results 1 — 15 out of 3,915 results