Filters








43,138 Hits in 9.4 sec

Seeding the Cloud: An Innovative Approach to Grow Trust in Cloud Based Infrastructures [chapter]

Stéphane Betgé-Brezetz, Aline Bousquet, Jérémy Briffaut, Eddy Caron, Laurent Clevy, Marie-Pascale Dupont, Guy-Bertrand Kamga, Jean-Marc Lambert, Arnaud Lefray, Bertrand Marquet, Jonathan Rouzaud-Cornabas, Lamiel Toch (+2 others)
2013 Lecture Notes in Computer Science  
The idea is to spread and embed Secure Elements (SE) on each level of the Cloud in order to make a wide trusted infrastructure which complies with access control and isolation policies.  ...  The aim of this article is then to propose a way to build a secure and trustable Cloud.  ...  With the NoSE, each Secure Element represents locally the minimal TCB to implement security function and the interconnection of SE makes the minimal TCB for a trusted service on a Cloud infrastructure.  ... 
doi:10.1007/978-3-642-38082-2_13 fatcat:4x77ikk5h5dyfo6bgcvjwxjgzq

A Cloud Security Framework Based on Trust Model and Mobile Agent [article]

Saddek Benabied, Abdelhafid Zitouni, Mahieddine Djoudi
2020 arXiv   pre-print
The CSU level includes a proxy agent and a trust agent, dealing with the first verification. Then a second verification is performed at the CSP level.  ...  To achieve this goal, our paper introduces two levels security framework: Cloud Service Provider (CSP) and Cloud Service User (CSU). Each level is responsible for a particular task of the security.  ...  cloud service provider site, carrying with it user's, domain's identification and the encrypted request.  STEP 7: the MA when arrived at CSP's site, it establishes a secure SSL connection with Proxy Agent  ... 
arXiv:2001.09090v1 fatcat:v4dwaezy3jeddf7lha2pirhgye

D2i2D: A Novel Secure Approach for Cloud Storage with Cost Minimization

Tushar K. Saha, A. B. M. S. Ali
2016 Journal of Software  
Our technique is based on data to RGB image and RGB image to data conversion technique with multiple-key-cryptography (MKC) to provide more security on cloud data.  ...  Then we propose a novel data hiding approach called 'D2i2D' which is able to provide security to any data stored in the cloud as well as reduce the file size in cloud storage.  ...  Trusted Security Provider for Encryption In our framework trusted security provider (TSP) may be cloud service provider itself or third-party security provider.  ... 
doi:10.17706/jsw.11.8.787-802 fatcat:aogqg262dvbpbgen3in2jnxuda

Key Security Issues and Existing Solutions in Cloud Computing Applications

E. Poornima, N. Kasiviswanath, C. Shoba Bindu
2017 Indian Journal of Science and Technology  
Security is still an un resolved problem in cloud applications.In this paper, we present the key issues of data security in the cloud computing technology , and are described in four areas: storage security  ...  , network security, data security and virtualization.  ...  Thus, the cloud consumers and providers should be presented with a standard means for stating their security requirements and capabilities.  ... 
doi:10.17485/ijst/2017/v10i19/111016 fatcat:bnbztmqodnahfjlfva7ixeucoq

A Security Assessment Framework and Selection Method for Outsourcing Cloud Service

Xiaochen Liu, Chunhe Xia, Jiajin Cao, Jinghua Gao, Zhao Wei
2014 International Journal of Security and Its Applications  
To solve the fears and deal with the threats associated with outsourcing, new method for selection of outsourcing cloud service providers(CSP) based on assessment of security and performance is urgently  ...  CSP based on security weight, meanwhile minimize the business cost.  ...  In order to achieve offering on-demand and scalable service manner, the cloud organization need some cloud service provider to apply some specific minimal services.  ... 
doi:10.14257/ijsia.2014.8.6.32 fatcat:6r4wdoph7be5jbpqci5vegn5ym

Security and Privacy Issues in Cloud Computing Environment: A Survey Paper

Kaleem Ullah, M. N. A. Khan
2014 International Journal of Grid and Distributed Computing  
Cloud computing is emerging as a powerful architecture to perform large-scale and complex computing.  ...  This paper surveys and evaluates the architecture, data security and privacy issues in cloud computing like data confidentiality, integrity, authentication, trust, service level agreements and regulatory  ...  The cloud provider should share all such concerns with the client and a build trust relationship in this connection.  ... 
doi:10.14257/ijgdc.2014.7.2.09 fatcat:xgfjlcyqlzbszbo4o36zgdfqxe

CLOUD COMPUTING: MAJOR CHALLENGES AND COUNTER ACTS

Arjmand Ashraf
2018 International Journal of Advanced Research in Computer Science  
and trust issues with Cloud subscribers.  ...  This paper provides state of the art of major security challenges in the cloud paradigm and the countermeasures to counteract with the security breaches.  ...  So, to attain the motivation of providing a secure and trusted cloud architecture, identifying and then rectifying the security issues should be at top priority.  ... 
doi:10.26483/ijarcs.v9i2.5861 fatcat:736y4gnlwzfzda6witzhcb3xum

Twin Clouds: Secure Cloud Computing with Low Latency [chapter]

Sven Bugiel, Stefan Nürnberger, Ahmad-Reza Sadeghi, Thomas Schneider
2011 Lecture Notes in Computer Science  
In our approach, the user communicates with a resource-constrained Trusted Cloud (either a private cloud or built from multiple secure hardware modules) which encrypts algorithms and data to be stored  ...  We split our protocols such that the Trusted Cloud performs security-critical precomputations in the setup phase, while the Commodity Cloud computes the time-critical query in parallel under encryption  ...  We thank Radu Sion for pointing out the analogy of our Twin Clouds model with a rechargeable battery that accumulates energy (computations) over some time and can then be uncharged rapidly.  ... 
doi:10.1007/978-3-642-24712-5_3 fatcat:hlhej2sgk5gajd3l2m4mfwlnby

The Roles of Security and Trust: Comparing Cloud Computing and Banking

Ranjit Bose, Xin (Robert) Luo, Yuan Liu
2013 Procedia - Social and Behavioral Sciences  
We compare cloud computing and banking since to both security and trust is of vital importance for their service users and providers.  ...  For any new technology such as cloud computing trust is not easily established, it gradually builds based on providers' reputation for good performance and security, earning users' trust over time.  ...  Comparatively, we currently trust cloud less because it is yet to provide users with sufficient security and assurance.  ... 
doi:10.1016/j.sbspro.2013.02.015 fatcat:zos5qcwzlvfwfe5wwuntbvkz34

Privacy and Security in Mobile Cloud Computing: Review

Sapna Malik, M. M Chaturvedi
2013 International Journal of Computer Applications  
This review paper throws light on privacy and security issues of Mobile Cloud Computing.  ...  Being in nascent stage, Mobile Cloud Computing has privacy and security issues which deter the users from adopting this technology.  ...  Security to critical data is provided by isolating public cloud and trusted cloud.  ... 
doi:10.5120/13906-1833 fatcat:brsqocxkgzb6rm5z4ynj54mmcm

Security, Privacy and Trust Challenges in Cloud Computing and Solutions

Seyyed Yasser hashemi, Parisa Sheykhi Hesarlo
2014 International Journal of Computer Network and Information Security  
Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort  ...  In this paper Cloud Computing security challenges will be discussed and proposed many new recommendations to increase security and trust also maintaining privacy.  ...  ) that can be rapidly provisioned and released with minimal management effort or service provider interaction [1] .  ... 
doi:10.5815/ijcnis.2014.08.05 fatcat:2k55llrywfh4flvf4yrupumvtq

When Sensor-Cloud Meets Mobile Edge Computing

Tian Wang, Yucheng Lu, Zhihan Cao, Lei Shu, Xi Zheng, Anfeng Liu, Mande Xie
2019 Sensors  
After that we discuss the issues of sensor-clouds and propose some applications, especially a trust evaluation mechanism and trustworthy data collection which use mobile edge computing to solve the problems  ...  Sensor-clouds are a combination of wireless sensor networks (WSNs) and cloud computing.  ...  At present, some researches focusing on QoS aim to minimize the cost and maximize the profit of cloud service providers and edge service providers.  ... 
doi:10.3390/s19235324 pmid:31816927 fatcat:vq5hrxgixjetxggpjwiwabgw7u

Towards a cloud consumers credibility assessment and trust management of cloud services

E. Priyadharshini, V. Vijayakumar, M.D. Abdul Quadir
2018 EAI Endorsed Transactions on Cloud Systems  
In this Paper we proposed the method is a Trust Management Service (TMS).  ...  Cloud service consumer can interact with the cloud providers. The malicious users can easily hack the user's private information. The cloud provider cannot able to find this problem.  ...  They proposed the data security for cloud environment with trusted parties.  ... 
doi:10.4108/eai.16-5-2018.154775 fatcat:y65te6igcrbhpfxbgo2s7t3dgy

Workflow specification and scheduling with security constraints in hybrid clouds

Daniel S. Marcon, Luiz F. Bittencourt, Ramide Dantas, Miguel C. Neves, Edmundo R. M. Madeira, Stenio Fernandes, Carlos A. Kamienski, Marinho P. Barcelos, Luciano P. Gaspary, Nelson L. S. da Fonseca
2013 2nd IEEE Latin American Conference on Cloud Computing and Communications  
Hybrid cloud management must deal with resources from both public and private clouds, as well as their interaction.  ...  When workflows are executed in a hybrid cloud, dependencies among their components bring new factors to be considered during specification, scheduling, and virtual machine provisioning.  ...  Thus, we conclude that it is possible to increase security with minimal addition of rejected requests. V.  ... 
doi:10.1109/latincloud.2013.6842219 dblp:conf/latincloud/MarconBDNMFKBGF13 fatcat:as2qw2y4lna43mgcldnvcb4hhm

Cloud Computing Technology: Security and Trust Challenges

Sajjad Hashemi
2013 International Journal of Security Privacy and Trust Management  
Looking at the literature of this technology, it can be claimed that the main concerns of the users of cloud are security issues especially trust.  ...  A let of exclusive features such as high functionality and low cost have made cloud computing a valuable technology.  ...  To improve the security of information in cloud environment in [10] , a dynamic security framework has been provided with different methods.  ... 
doi:10.5121/ijsptm.2013.2501 fatcat:2e4sjvusbbhrtezb4axagimmhq
« Previous Showing results 1 — 15 out of 43,138 results