Filters








3,915 Hits in 4.1 sec

An Invincible Rudimentary Architecture for Data Security in Cloud Environment Using Multi Cloud

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Because of the popularity of cloud computing, providing security to the stored data is a major concern.  ...  Cloud is a distributed access of shared pool of resources that can provide the efficient service on demand basics to cloud user by the service providers.  ...  Antonios et al., has listed that policies, models and mechanisms of Access Controls (AC). A policy defined in high level as how and when a user can access a specific resource.  ... 
doi:10.35940/ijitee.g5457.0981119 fatcat:7r5i6galhnac3c5klsyf243vsu

Secure Cloud Infrastructure: A Survey on Issues, Current Solutions, and Open Challenges

Yara Alghofaili, Albatul Albattah, Noura Alrajeh, Murad A. Rassam, Bander Ali Saleh Al-rimy
2021 Applied Sciences  
Based on the exploration of the current challenges, some cloud features such as flexibility, elasticity and the multi-tenancy are found to pose new challenges at each infrastructure level.  ...  This paper presents a comprehensive survey of the security issues at different cloud infrastructure levels (e.g., application, network, host, and data).  ...  of integrity [36,37] Prefix Hijacking Network level Multi-tenancy and Elasticity Affected integrity and availability [44] Reused IP Addressing Network level Multi-tenancy and Elasticity  ... 
doi:10.3390/app11199005 fatcat:zxxcwgbscffnzakdrqrqicegq4

Secure Authentication in Cloud Computing using Diffie Hellman and One Time Password

Avleen Kour
2021 International Journal for Research in Applied Science and Engineering Technology  
The user data needs to be protected from unknown parties. Different types of encryption schemes and authentication techniques are used to tackle the issue of cloud security.  ...  The encryption schemes are- Homomorphic Encryption and Homogeneous Encryption.  ...  Multi-tenancy can be applied to different levels that is, application level, middleware level, operating system, hardware level. III.  ... 
doi:10.22214/ijraset.2021.36037 fatcat:cugiaou7a5da5jpdmfw7ijk2bi

A Survey on Security Mechanisms of Leading Cloud Service Providers

Deepak Panth, Dhananjay Mehta, Rituparna Shelgaonkar
2014 International Journal of Computer Applications  
Clouding Computing is a virtual pool of resources provided to users as service through a web interface. These resources may include Software, Infrastructure, Storage, Network, Platform etc.  ...  challenges posed to data on the cloud computing. 2) Survey cryptographic algorithms that can be used to overcome these challenges. 3) Survey Security designs of 5 leading cloud service providers. 4) Perform a  ...  Additionally, FIPS 140-2 Level 1 certified encryption services are available to provide the off-site backups requiring the highest standards of protection [70] .  ... 
doi:10.5120/17149-7184 fatcat:262geqqsqbet7gofec7wyrn2di

Applying Encryption Algorithm for Data Security in Cloud Storage [chapter]

Zaid Kartit, Ali Azougaghe, H. Kamal Idrissi, M. El Marraki, M. Hedabou, M. Belkasmi, A. Kartit
2016 Lecture Notes in Electrical Engineering  
Encryption is a well known technology for protecting sensitive data. Use of the combination of Public and Private key encryption to hide the sensitive data of users, and cipher text retrieval.  ...  It is an Internet-based computing technology, in which software, shared recourses and information, are provided to consumers and devices on-demand, and as per users requirement on a pay per use model.  ...  To Establish an Encryption Based System for protecting Sensitive data on the cloud and Structure how owner and storage Service Provider to operate on encrypted Data 3.  ... 
doi:10.1007/978-981-287-990-5_12 fatcat:vbm6jv6wu5fibiaklovm6r5kxu

A Survey on Various Security Issues and Challenges to Secure Cloud Computing

Rohini H. Joshi, Divya P. Rathi, Asma Khan, Medha Jain
2018 International Journal of Innovative Research in Computer Science & Technology  
Even though there is secure Homomorphic encryption there lays certain security issues and attacks with it.  ...  It also provides a broad study on the issues and challenges of security .Growth of cloud computing is mainly decreased due to these concerns and challenges.  ...  Naim Ahmad [5] , "Cloud Computing: Technology, Security Issues and Solutions", discussed about the Cloud Security Issues, Multi-level Integrated Security, Service Level Agreements (SLA) and Cloud Computing  ... 
doi:10.21276/ijircst.2018.6.3.3 fatcat:cus6eb5jfjfm3omnfgvcbi6cjq

Virtual Private Cloud and Authentication: A Review

Gaurav Deep, Rajni Mohana, Paramroop Kaur
2018 Asian Journal of Computer Science and Technology  
The cloud supports characteristic such as on demand services, resource pooling, elasticity .While authentication plays important role in the security as it protects the data from the unauthorized people  ...  Different Types of cloud service models and deployment models make the cloud access to its users.  ...  to break levels to get access into a system.  ... 
doi:10.51983/ajcst-2018.7.2.1862 fatcat:wrz2gie3mfdv7hkkjhwdvmdnti

User-Controlled Security Mechanism in Data-Centric Clouds

Qin Liu, Guojun Wang, Jie Wu, Wei Chang
2015 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems  
By leasing cloud platforms to run their business, startups can achieve costsaving and scale-up elasticity without being concerned about over-provisioning or under-provisioning for a service.  ...  The proposed mechanism allows customers to take the initiative to protect their own data. We believe this flexibility could prove to be a major improvement in cloud security if implemented well.  ...  We believe that a good design would offer a choice of security level and mechanisms [28] . That is, the users have the ability to customize their desired security level and mechanism on demand.  ... 
doi:10.1109/hpcc-css-icess.2015.157 dblp:conf/hpcc/LiuW0C15 fatcat:tjlzpht4v5cedibcuf5wc2pjtm

A Review on Security Issues and their Impact on Hybrid Cloud Computing Environment

Mohsin Raza, Ayesha Imtiaz, Umar Shoaib
2019 International Journal of Advanced Computer Science and Applications  
In order to key benefit with hybrid cloud model, there are different security issues that have been shown to address.  ...  The evolution of cloud infrastructures toward hybrid cloud models enables innovative business outcomes, twin turbo drivers by the requirement of greater IT agility and overall cost-containment pressures  ...  In this paper addresses different methods for data protection includes Single Encryption, Multitenancy and Multi level Virtualization, Authentication model including several scenarios. Rao et al.  ... 
doi:10.14569/ijacsa.2019.0100346 fatcat:pwgaeyddhzfv5ekxabneql5qwm

A survey of cryptographic approaches to securing big-data analytics in the cloud

Sophia Yakoubov, Vijay Gadepally, Nabil Schear, Emily Shen, Arkady Yerukhimovich
2014 2014 IEEE High Performance Extreme Computing Conference (HPEC)  
We then survey three cryptographic techniques -homomorphic encryption, verifiable computation, and multi-party computation -that can be used to achieve these goals.  ...  We introduce a cloud computing model that captures a rich class of big-data use-cases and allows reasoning about relevant threats and security goals.  ...  A. Homomorphic Encryption Suppose that to lower operating costs, the NIH were to store and process its data on a public cloud, such as the Amazon Elastic Compute Cloud (EC2) [5] .  ... 
doi:10.1109/hpec.2014.7040943 dblp:conf/hpec/YakoubovGSSY14 fatcat:jinnrastevhkzn5y4plfkh7baq

"Security Issues and Solutions in Cloud Computing"

Arun Kumar Sen, Pradeep Kumar Tiwari
2017 IOSR Journal of Computer Engineering  
models, and four deployment models [4].  ...  NIST Definition-Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications  ...  How do you protect user authentication information? 2. How are User Files stored? What level of encryption? 3. Is the system multi-tenant? 4. How is account information stored? 5.  ... 
doi:10.9790/0661-1902046772 fatcat:bib5krs6n5cvbml4l7v4fjrmyi

Tenant - Vendor and Third-Party Agreements for the Cloud: Considerations for Security Provision

Lubna Luxmi Dhirani, Thomas Newe, Shahzad Nizamani
2016 International Journal of Software Engineering and Its Applications  
With the expanding hybrid cloud model offering better services and convenience there are also a number of security problems associated with cloud standardization, multi-tenancy third party privity/sub-contracting  ...  This paper focuses on Hybrid Cloud Computing security in the context of a Tenant-Vendor-Third-Party environment and service level agreements.  ...  There should be an additional level of security to encrypt the data, so it is protected incase of any Distributed Denial-of-Service Attacks (DDoS) attacks or malicious attacks within the multi-tenancy  ... 
doi:10.14257/ijseia.2016.10.12.37 fatcat:tukb32cuazdjljtngra3ukc3xi

An Exhaustive Review on Security Issues in Cloud Computing

2019 KSII Transactions on Internet and Information Systems  
However, security, privacy and integrity of data is a major concern.  ...  Cloud computing has become a buzzword in relation to Grid & Utility computing. It provides on demand services to customers and customers will pay for what they get.  ...  • PaaS [Platform as a service] PaaS is at the middle level of the model. It provides tools, framework & programs.  ... 
doi:10.3837/tiis.2019.06.025 fatcat:d2lidmgohvashh6vbqchkvekti

Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations [chapter]

Johannes Blömer, Peter Günther, Volker Krummel, Nils Löken
2018 Lecture Notes in Computer Science  
As a result, we achieve elasticity, high performance, and high security at the same time.  ...  Compared to the standard approach based on access control lists, our encryption as a service approach allows us to use cheap standard cloud storage in the public cloud and to mitigate a single point of  ...  Protection from insiders can be achieved by client-side encryption, e. g. Cryptomator, 4 or encryption as a service, e. g.  ... 
doi:10.1007/978-3-319-75650-9_1 fatcat:ldxf53pfjfhpdmua6kxqo4hbyi

Review of solutions for securing end user data over cloud applications

Akashdeep Bhardwaj, GVB Subramanyam, Vinay Avasthi, Hanumat Sastry
2016 International Journal of Advanced Computer Research  
There is an urgent need of solutions for end user data protection and privacy during the times when migrating from one cloud service provider to another.  ...  By using solution paths such as digital keys, multi factor authentication and cloud aware applications. This paper identifies end users data security issues when using cloud computing services.  ...  [9] addresses research on cloud computing, data security model based on multi dimensions. A complete data security three layer defence model based on multi dimension is proposed.  ... 
doi:10.19101/ijacr.2016.626005 fatcat:ojhtghld5fba7cuauahnhebhni
« Previous Showing results 1 — 15 out of 3,915 results