Filters








340 Hits in 10.2 sec

An Invincible Rudimentary Architecture for Data Security in Cloud Environment Using Multi Cloud

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
This paper provides the details of need of security in cloud environment, various categories of security threats, mechanisms, cloud architecture, multi-cloud and various security algorithms in detailed  ...  The main attention of this paper is to point out the works on security in cloud computing, show the proposed architecute of multi cloud instead of single cloud and the way for the future work for the efficient  ...  Michele Ciavotta et al, work provides novel mathematical approach Mixed Integer Linear Program (MILP) which is based on queuing theory to find a strong multi cloud formation for a given software architecture  ... 
doi:10.35940/ijitee.g5457.0981119 fatcat:7r5i6galhnac3c5klsyf243vsu

Hybrid Clouds for Data-Intensive, 5G-Enabled IoT Applications: An Overview, Key Issues and Relevant Architecture

Panagiotis Trakadas, Nikolaos Nomikos, Emmanouel T. Michailidis, Theodore Zahariadis, Federico M. Facca, David Breitgand, Stamatia Rizou, Xavi Masip, Panagiotis Gkonis
2019 Sensors  
Hybrid cloud multi-access edge computing (MEC) deployments have been proposed as efficient means to support Internet of Things (IoT) applications, relying on a plethora of nodes and data.  ...  Furthermore, a decentralized hybrid cloud MEC architecture, resulting in a Platform-as-a-Service (PaaS) is proposed and its main building blocks and layers are thoroughly described.  ...  The Resource Optimization and Orchestration component provides the orchestration mechanisms for hybrid cloud operations in the fog-to-cloud fabric.  ... 
doi:10.3390/s19163591 fatcat:qz6md7lbsfhejcrs3e7vqigsnu

Secure Cloud Infrastructure: A Survey on Issues, Current Solutions, and Open Challenges

Yara Alghofaili, Albatul Albattah, Noura Alrajeh, Murad A. Rassam, Bander Ali Saleh Al-rimy
2021 Applied Sciences  
Security is the biggest concern for cloud computing and is a major obstacle to users adopting cloud computing systems.  ...  Based on the exploration of the current challenges, some cloud features such as flexibility, elasticity and the multi-tenancy are found to pose new challenges at each infrastructure level.  ...  Acknowledgments: The researcher(s) would like to thank the Deanship of Scientific Research, Qassim University for funding the publication of this project.  ... 
doi:10.3390/app11199005 fatcat:zxxcwgbscffnzakdrqrqicegq4

Smart Resilient Security Framework and Solutions for Cloud-driven Digital Supply Networks

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
The cloud-based logistics services allow cost reduction, higher elasticity, flexibility, and maximum utilization of resources for performing high computations and data analytics.  ...  Also, the Data Residency for cloud-based logistics services is elaborated with Data Security analysis.  ...  Fig. 6 An overview of the authentication mechanism for the security framework for cloud-based logistics services.  ... 
doi:10.35940/ijitee.b7073.129219 fatcat:tjvlcde4vveibpyausi5f6jdye

Security Issues in Cloud Computing

Sanchi Kalra, Kunal Atal, Rachna Jain
2017 International Journal of Computer Applications  
Cloud computing is a framework for providing various computing and storage services on the on-demand basis via the internet.  ...  It provides access to a user pool of shared network and storage resources using the server of the service provider without materially acquiring these resources.  ...  along with scalability of public cloud  Reduced Capital Expenses  Improved Resource allocation for temporary projects  Optimized infrastructure spending  Support for cloud bursting   ... 
doi:10.5120/ijca2017914190 fatcat:sawjteifa5evjkysoxemv7dcqu

Edge Computing and Its Convergence with Blockchain in 5G and Beyond: Security, Challenges, and Opportunities

Showkat Ahmad Bhat, Ishfaq Bashir Sofi, Chong-Yung Chi
2020 IEEE Access  
Multi-tenancy and scalability issues. SDN-based traffic engineering. Providing a network performance guarantee.  ...  FIGURE 8 . 8 Execution of blockchain transaction FIGURE 10 . 10 Cloud-blockchain hybrid architecture for edge FIGURE 11 . 11 Multi-tiered blockchain-based IoT edge architecture IntroductionFIGURE  ... 
doi:10.1109/access.2020.3037108 fatcat:iksoyfx7nbhfrefnzgf6uxuw4q

Algorithmics and Modeling Aspects of Network Slicing in 5G and Beyonds Network: Survey

Fadoua Debbabi, Rihab Jmal, Lamia Chaari Fourati, Adlene KSENTINI.
2020 IEEE Access  
From the basis of IoT, a secure and efficient method is needed to authenticate a lot of devices.  ...  CONCLUSION NS for 5G networks presents a key solution to accomplish its design principles are known as scalability and multi-tenancy, fragmentation of administrative fields, as well as efficient orchestration  ... 
doi:10.1109/access.2020.3022162 fatcat:vy62e6awjnemhgcl4srdgr5eqe

Security challenges and solutions using healthcare cloud computing

Mohammad Mehrtak, SeyedAhmad SeyedAlinaghi, Mehrzad MohsseniPour, Tayebeh Noori, Amirali Karimi, Ahmadreza Shamsabadi, Mohammad Heydari, Alireza Barzegary, Pegah Mirzapour, Mahdi Soleymanzadeh, Farzin Vahedi, Esmaeil Mehraeen (+1 others)
2021 Journal of Medicine and Life  
Further, data encryption, authentication, and classification, besides application programming interfaces (API), were security solutions to cloud infrastructure.  ...  Security is one of the focal issues in cloud computing technology, and this study aims at investigating security issues of cloud computing and their probable solutions.  ...  scheme and blooming filter; A virtual machine-based cloud model with Hybrid Cloud Security Algorithm (HCSA); The optimization in the computational steps by ECC signature set and the duplication removal  ... 
doi:10.25122/jml-2021-0100 pmid:34621367 pmcid:PMC8485370 fatcat:k2ltpgsaurhffgkdmkjlwofwdy

Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey

Waqas Ahmad, Aamir Rasool, Abdul Rehman Javed, Thar Baker, Zunera Jalil
2021 Electronics  
Traditional security solutions are not directly applicable and sometimes ineffective for cloud-based systems.  ...  The findings of the proposed research include the following: we present a comprehensive survey of enabling cloud-based IoT architecture, services, configurations, and security models; the classification  ...  Multi-Tenancy Multi-tenancy in cloud computing means multiple users of a cloud vendor use the same computational resources, be they software, hardware, service, network resource, or data.  ... 
doi:10.3390/electronics11010016 fatcat:kpymzw6kq5aurm4heqzysceete

Editorial: Special Issue on "Recent Advances in Mobile and Wireless Networks"

Der-Jiunn Deng, Chih-Cheng Tseng, Tony Q. S. Quek, Nirwan Ansari
2015 Wireless personal communications  
These challenges motivate us to design and develop new protocols, architectures and services for future mobile and wireless networks.  ...  It also presents opportunities for research and innovation to both the academia and industry, especially for the development of efficiency, scalability and reliability in mobile and wireless networks.  ...  ''An Attribute-Role Based Access Control Mechanism for Multi-Tenancy Cloud Environment'' by N.W.  ... 
doi:10.1007/s11277-015-3034-6 fatcat:ihnsxx2rwzd6vitikcvzhfvikm

Enhancing Data Integrity Proofs with Cloud Storage Security

2017 International Journal of Science and Research (IJSR)  
The prime objective is to give effective and efficient method for cloud storage security in cloud computing. We are analyzed types of cloud storage and security aspects in cloud.  ...  Data security is considered as the constant issue leading towards a hitch in the adoption of cloud computing.  ...  A number of concerns emerge regarding the issues of multi-tenancy, application security and privacy [5] . Multitenancy refers to the cloud characteristic of resource sharing [4] .  ... 
doi:10.21275/art20164007 fatcat:qkk3l2boujdz3pbe7uk2nehec4

A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions

Rabia Khan, Pardeep Kumar, Dushantha Nalin K. Jayakody, Madhusanka Liyanage
2019 IEEE Communications Surveys and Tutorials  
Advanced evolved packet core solutions for efficient system management with virtualization were developed that uses NFV/SDN in a secure backhaul architecture as well as a novel SDN-based Internet protocol  ...  For instance, Lam et. al. proposed to used Identity-Based Cryptography (IBC) protocol based secure key exchange mechanism to enhance the security of the east/westbound data transmission in a multi-controller  ... 
doi:10.1109/comst.2019.2933899 fatcat:bulfng6levdelgmel7oxoi6pna

A Review on Secure Storage Using Bidirectional Verification Techniques in Cloud Computing

Mr. Girish kumar d, Dr. Rajashree v biradar, Dr. V c patil
2018 International Journal of Engineering & Technology  
The architecture of cloud poses such a threat to the security of existing models when deployed in a cloud environment.  ...  Security has become one of the major issue in cloud computing which reduces the growth of cloud environment with complications in data privacy and data protection continue to outbreak the market.  ...  The cloud security problems are given as follows: i) Some security problems were inherited from the used technologies such as virtualization and SOA, ii) Multi-tenancy and isolation was a major dimension  ... 
doi:10.14419/ijet.v7i4.36.24128 fatcat:xdu3ti32kra35fgd2jllxstcvy

Towards low-latency service delivery in a continuum of virtual resources: State-of-the-art and Research Directions

Jose Santos, Tim Wauters, Bruno Volckaert, Filip De Turck
2021 IEEE Communications Surveys and Tutorials  
ACKNOWLEDGMENT This research was performed within the project "Intelligent DEnse And Longe range IoT networks (IDEAL-IoT)" under Grant Agreement #S004017N, from the fund for Scientific Research-Flanders  ...  The authors aim to enhance the security (C5) of DCNs and large clouds with a new FPGA-accelerated NFV.  ...  K., et al. have presented a distributed cloud architecture based on SDN and BC for secure and on-demand access to IoT services.  ... 
doi:10.1109/comst.2021.3095358 fatcat:vqdli2727rgydid2c2iqsnmnx4

Comparative Study Of Traditional And Evolutionary Approaches For Cloud Service Selection

Preeti Sirohi, Amit Agarwal, Piyush Maheshwari
2019 International Journal of Research in Advent Technology  
Due to the diversity of available cloud service in the market puts up a challenge for the user which service to take from the provider.  ...  The service selection and cloud ranking is considered challenging and therefore there should be some efficient approach which can select and rank cloud service according to the customized requirements  ...  The cloud technology is known for its multi-tenancy architecture and therefore it should be taken into account.  ... 
doi:10.32622/ijrat.74201955 fatcat:aqe5organbfd3p7cln6ysjn4pi
« Previous Showing results 1 — 15 out of 340 results