Filters








8,099 Hits in 3.9 sec

Security Issues Over Some Cloud Models

Passent M. El-Kafrawy, Azza A. Abdo, Amr. F. Shawish
2015 Procedia Computer Science  
So that a cloud data security models should be able to overcome all the possible issues of cloud computing, so as to provide the benefits of cloud computing and preventing the owner's data from all the  ...  A comparison of some designed cloud models is discussed as the second phase. The cloud models discussed are Wang scheme (2009) , Prased scheme (2011), Sandeep K.  ...  , as previously described, with a secure, private and scalable policy for data sharing in cloud computing, ensure the overheads of the service provided by the system and is as light as possible.  ... 
doi:10.1016/j.procs.2015.09.041 fatcat:45yyrq5zxrdmvl3bnuprg5aili

A Security Framework in Cloud Computing Infrastructure

Arijit Ukil, Debasish Jana, Ajanta De Sarkar
2013 International journal of network security and its applications  
We propose analysis and architecture for incorporating different security schemes, techniques and protocols for cloud computing, particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service  ...  We have also shown using experimental data how a cloud service provider can estimate the charging based on the security service it provides and security-related cost-benefit analysis can be estimated.  ...  Cloud Computing with Security-As-A-Service Security-as-a-service, as defined earlier is to be availed as a horizontal service in a cloud service model.  ... 
doi:10.5121/ijnsa.2013.5502 fatcat:uhnvesnonjc7dndquhedjcylla

VegaWarden: A Uniform User Management System for Cloud Applications

Jian Lin, Xiaoyi Lu, Lin Yu, Yongqiang Zou, Li Zha
2010 2010 IEEE Fifth International Conference on Networking, Architecture, and Storage  
In a virtual cluster based Cloud Computing environment, the sharing of infrastructure introduces two problems on user management: usability and security.  ...  VegaWarden supplies a global user space for different virtual infrastructures and application services in one Cloud, and allows user system interconnection among homogeneous Cloud instances.  ...  VegaWarden is a common service designed to solve the usability and security problems, and adapt to scale expansion and interconnection of Clouds. The rest of this paper is organized as follows.  ... 
doi:10.1109/nas.2010.34 dblp:conf/nas/LinLYZZ10 fatcat:cjl5nmd3zrbx3mrf3axgxq7cqm

A Survey on Modern Cloud Computing Security over Smart City Networks: Threats, Vulnerabilities, Consequences, Countermeasures and Challenges

Abeer Iftikhar Tahirkheli, Muhammad Shiraz, Bashir Hayat, Muhammad Idrees, Ahthasham Sajid, Rahat Ullah, Nasir Ayub, Ki-Il Kim
2021 Electronics  
Even though CC is a great innovation in the aspect of computing with ease of access, it also has some drawbacks. With the increase of cloud usage, security issues are proportional to the increase.  ...  Cloud Computing (CC) is a promising technology due to its pervasive features, such as online storage, high scalability, and seamless accessibility, in that it plays an important role in reduction of the  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/electronics10151811 fatcat:nqkyuoti5nd2pl5lo3hwcmu3xe

MSSF: User-Friendly Multi-cloud Data Dispersal

Rafael M. de O. Libardi, Stephan Reiff-Marganiec, Luiz Henrique Nunes, Lucas J. Adami, Carlos H.G. Ferreira, Julio C. Estrella
2015 2015 IEEE 8th International Conference on Cloud Computing  
Using a multi-cloud storage solution requires a user to make complex decisions. Making these decisions can be a problem for regular users who are not familiar with multi-cloud storage.  ...  MSSF formalises the selection process using a knapsack optimisation problem using integer linear programming along with a rule-based system to select a multi-cloud storage strategy that fits the user needs  ...  ACKNOWLEDGEMENTS The authors thank FAPESP, CNPq and CAPES for the financial support. Part of the work was conducted while Rafael M. de O.  ... 
doi:10.1109/cloud.2015.53 dblp:conf/IEEEcloud/LibardiRNAFE15 fatcat:vxdrssfjsngu3etqoqj5syc7oa

Toward Quality Attribute Driven Approach to Software Architectural Design

Payel Bajpayee, Hassan Reza
2017 Journal of Software Engineering and Applications  
In this paper, a method has been proposed to evaluate the software architecture's fitness with respect to key quality attributes for a web-based system.  ...  To the end, a comparative analysis based on quality attributes scenarios and tactics is carried out to select an optimal software architecture that meets the system level requirements of a web-based system  ...  So the Data confidentiality achievement for a secured application though seems achievable for Student grade system, but the secured connection, user validation, data confidentiality management is time  ... 
doi:10.4236/jsea.2017.106027 fatcat:wfxyst7rvzbxhhupz3j3bd64ee

A Review of Gaps between Usability and Security/Privacy

Majed Alshamari
2016 International Journal of Communications, Network and System Sciences  
Usability of software applications is one factor that reduces security and privacy up to a substantial level.  ...  This paper examines the differences between usability factors and aspects related to security and privacy.  ...  Sascha et al. have presented a new idea of "Confidentiality as a Service" (CaaS) for cloud platforms. Accord-ing to this model, confidentiality is taken care of by another service provider on cloud.  ... 
doi:10.4236/ijcns.2016.910034 fatcat:6rol26nmanebpd2ecimvx3xeiy

QUIRC: A Quantitative Impact and Risk Assessment Framework for Cloud Security

Prasad Saripalli, Ben Walters
2010 2010 IEEE 3rd International Conference on Cloud Computing  
Wide-band Delphi method is proposed as a scientific means to collect the information necessary for assessing security risks.  ...  This framework, called QUIRC, defines risk as a combination of the Probability of a security threat event and it's Severity, measured as its Impact.  ...  ACKNOWLEDGMENT We are thankful to the security engineering teams at SAN, FIPS, ENISA and UC Berkeley, whose findings were helpful to our work, and Runaware Inc (R&D) for its sponsorship.  ... 
doi:10.1109/cloud.2010.22 dblp:conf/IEEEcloud/SaripalliW10 fatcat:fsngen5xkzctdcmwg4hzgxfsoa

Making secret sharing based cloud storage usable

Erik Framner, Simone Fischer-Hübner, Thomas Lorünser, Ala Sarah Alaqra, John Sören Pettersson
2019 Information and Computer Security  
Purpose The purpose of this paper is to develop a usable configuration management for Archistar, which utilizes secret sharing for redundantly storing data over multiple independent storage clouds in a  ...  Selecting the optimal secret sharing parameters, cloud storage servers and other settings for securely storing the secret data shares, while meeting all of end user's requirements and other restrictions  ...  In fact, CSS chunks not only are by a factor of 1/k shorter compared to perfectly secure secret sharing as proposed by Shamir but also provide confidentiality guarantees as long as no more than k À 1 clouds  ... 
doi:10.1108/ics-01-2019-0016 fatcat:6fpnflb2hrcr5cyqiwjueqsjnq

A Health Research Collaboration Cloud Architecture

Mugonza Robert1 And Basaza-Ejiri. H. Annabella2
2018 Zenodo  
There is a need for secure and efficient approaches of reorganizing the service components, with trust to support collaboration related requirements.  ...  Through iterative design, a reliable and trust-aware re-organization of cloud components – the Collaboration cloud architecture is achieved.  ...  We are grateful to reviewers for the constructive feedback, it helped transform our first write-up of the article. You shall always be of value to us.  ... 
doi:10.5281/zenodo.1489020 fatcat:d2gd5layprbvjgyjqpjniweuwm

Encryption Techniques for Cloud Data Confidentiality

Aized Amin Soofi, M. Irfan Khan, Fazal-e Amin
2014 International Journal of Grid and Distributed Computing  
While data is stored over the cloud to remove the complexity of the maintenance work; it becomes a matter of concern the security of the data which is now in the open network of cloud.  ...  For securing cloud data, protection strategies have to be employed. Strategy should be applied to both data at rest and data in transit.  ...  Thus, Encryption as a service comes in the cloud. Various encryption algorithms are used for encoding cloud data.  ... 
doi:10.14257/ijgdc.2014.7.4.02 fatcat:7x3ikiluunfjblct4jqthbhck4

A Secure Cloud Computing Model based on Data Classification

Lo'ai Tawalbeh, Nour S. Darwazeh, Raad S. Al-Qassas, Fahd AlDosari
2015 Procedia Computer Science  
In this research, we propose a secure cloud computing model based on data classification.  ...  The proposed cloud model minimizes the overhead and processing time needed to secure data through using different security mechanisms with variable key sizes to provide the appropriate confidentiality  ...  Acknowledgment The authors would like to thank Deanship of Scientific Research at Umm Al-Qura University (project # 43408022) for the financial support.  ... 
doi:10.1016/j.procs.2015.05.150 fatcat:oankmgbsxvbini65koluhb3rzu

TwinCloud: Secure Cloud Sharing Without Explicit Key Management [article]

Kemal Bicakci, Davut Deniz Yavuz, Sezin Gurkan
2016 arXiv   pre-print
Serving as a gateway, TwinCloud uses two or more cloud providers to store the encryption keys and encrypted files in separate clouds which ease the secure sharing without a need for trust to either of  ...  We implemented TwinCloud as a lightweight application and make it available as open-source. The results of our usability study show the prospect of the secure sharing solution of TwinCloud.  ...  These cloud providers must keep the data accessible as well as confidential from other users. They offer services like easy file storage, sharing, syncing and collaboration among cloud users.  ... 
arXiv:1606.04705v2 fatcat:awrlbaybf5fe7g62gnnab5vlxm

Security Issues and Future Challenges of Cloud Service Authentication

2017 Acta Polytechnica Hungarica  
Many efforts, within in the literature, have surveyed cloud security and privacy, but lack a detailed analysis of authentication for the cloud.  ...  In view of the research gap and the importance of a valid authentication infrastructure, this survey critically investigates different authentication strategies and frameworks proposed for cloud services  ...  Security-as-a-Service (SEaaS) is a new instance of a cloud service model that delivers security solutions to enterprises by means of cloud-based services from the cloud.  ... 
doi:10.12700/aph.14.2.2017.2.4 fatcat:dxef6qn5ebcandjzkdbp4dilwy

Toward privacy-assured and searchable cloud data storage services

Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou, Y. T. Hou
2013 IEEE Network  
Acknowledgments The authors would like to thank the reviewers for their helpful comments. Li's work was partly supported by the U.S.  ...  Although end-to-end encryption techniques have been proposed as promising solutions for secure cloud data storage, a primary challenge toward building a full-fledged cloud data service remains: how to  ...  highly desirable for building usable cloud data services. • Error tolerance: To accommodate various typos, representation inconsistencies, and so forth, search schemes should have a fuzzy nature.  ... 
doi:10.1109/mnet.2013.6574666 fatcat:mq2f4esfizemrkopan34m247ua
« Previous Showing results 1 — 15 out of 8,099 results