Filters








173 Hits in 6.0 sec

Self-healing Multi-Cloud Application Modelling

Erkuden Rios, Eider Iturbe, Maria Carmen Palacios
2017 Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17  
Cloud computing market forecasts and technology trends confirm that Cloud is an IT disrupting phenomena and that the number of companies with multi-cloud strategy is continuously growing.  ...  The paper introduces also the MUSA SecDevOps framework in which the MUSA Modeller is integrated and with which the MUSA Modeller will be validated.  ...  of attacks or incidents in both parts at a time; • partition of application logic into fragments in order to obfuscate the overall application logic to providers; • partition of application data into fragments  ... 
doi:10.1145/3098954.3104059 dblp:conf/IEEEares/RiosIP17 fatcat:px6id5lsmjftffy25v2gxaxdxa

Improving Data Spillage in Multi Cloud Capacity Administrations

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
The FHE algorithm is used to enhance security to the information stored in the servers.  ...  The information is stored in multiple servers in order to avoid data loss due to vulnerabilities like hacking or server crash.  ...  [24] provided a survey for four different multi cloud architectures with various security and privacy-enhancing designs.  ... 
doi:10.35940/ijitee.a1015.1191s19 fatcat:gwpewlkk5ra2jjg7ebvtdop3cu

Methodology to Obtain the Security Controls in Multi-cloud Applications

Samuel Olaiya Afolaranmi, Luis E. Gonzalez Moctezuma, Massimiliano Rak, Valentina Casola, Erkuden Rios, Jose L. Martinez Lastra
2016 Proceedings of the 6th International Conference on Cloud Computing and Services Science  
The methodology has been applied in the MUSA EU H2020 project use cases as the first step for building up the multi-cloud applications' security-aware Service Level Agreements (SLA).  ...  In this paper, a methodology that enables the identification of the best security controls for multicloud applications which components are deployed in heterogeneous cloud providers is presented.  ...  of logic into fragments, and partition of data into fragments.  ... 
doi:10.5220/0005912603270332 dblp:conf/closer/AfolaranmiMRCRL16 fatcat:pkcq4ssbyrfupp44a23vpz4jbm

Towards Self-Protective Multi-Cloud Applications - MUSA – a Holistic Framework to Support the Security-Intelligent Lifecycle Management of Multi-Cloud Applications

Erkuden Rios, Eider Iturbe, Leire Orue-Echevarria, Massimiliano Rak, Valentina Casola
2015 Proceedings of the 5th International Conference on Cloud Computing and Services Science  
of multi-cloud applications.  ...  The most challenging applications in heterogeneous cloud ecosystems are those that are able to maximise the benefits of the combination of the cloud resources in use: multi-cloud applications.  ...  Case Study B: Smart Mobility Multi-Cloud Application Our second case study is an urban smart mobility multi-cloud application in Tampere city in Finland.  ... 
doi:10.5220/0005492905510558 dblp:conf/closer/RiosIORC15 fatcat:ml5oah4vvbgyzdngqfpvpqqrvm

Security and Privacy Based Data Sharing in Cloud Computing

Dr.Prasanna Kumar.R, Porselvan G, Prem Kumar S, Robinlash F
2018 International Journal of Innovative Research in Engineering & Management  
Data sharing in cloud storage is playing major role in Information Communication, since it can provide users with efficient and effective storage services.  ...  In order to provide security to the shared secret data, the cryptographic techniques are usually applied. However, the data cryptographic key is protected by the two factors.  ...  CONCLUSION Privacy and security are among the most important requirements in Big Data.  ... 
doi:10.21276/ijirem.2018.5.1.9 fatcat:w4ieubijjvaybjrrj22fgtq3p4

A New Framework for Securing Personal Data Using the Multi-Cloud

Hassan Saad Alqahtani, Paul Sant, Ghita Kouadri-Mostefaoui
2015 International Journal of Security Privacy and Trust Management  
This research proposes an approach that provides a secure data storage mechanism using a multi-cloud computing model. The research will be validated by an android app prototype.  ...  CONCLUSION To sum up, we have proposed an approach that offers secure data storage over multi-clouds for mobile computing users to ensure the security of the stored data.  ... 
doi:10.5121/ijsptm.2015.4402 fatcat:iest3t3ce5edtobnsz74faujzm

Ensuring user authentication and data integrity in multi-cloud environment

Leila Megouache, Abdelhafid Zitouni, Mahieddine Djoudi
2020 Human-Centric Computing and Information Sciences  
if the same customer decides to work in an open and distributed system that is the multi-cloud, and how will this data be restored afterwards.  ...  Concerning user authentication framework, authors in [29] : They propose an access control mechanism to ensure confidentiality of data in the cloud.  ...  Authors' contributions Authors contributed in various important aspects. All authors read and approved the final manuscript. Funding No funding was received. Availability of data and materials  ... 
doi:10.1186/s13673-020-00224-y fatcat:462fajqaqjfzhp6hmaqxj3assy

Data Storage Security and Privacy in Cloud Computing: A Comprehensive Survey

Jeevitha B., Thriveni J., Venugopal K.
2016 International Journal of Computer Applications  
It also provides the analysis of data security issues and privacy protection affairs related to cloud computing by preventing data access from unauthorized users, managing sensitive data, providing accuracy  ...  In searchable encryption scheme [112] , the encryption for index is done by using 1) For every keyword, token is given for the encrypted files that contain keyword pointers that is retrieved and  ...  Data Availability Mingqiang et al., [70] built a CDstore a unified multi-cloud storage solution for clients to outsource backup data with reliability and security.  ... 
doi:10.5120/ijca2016912513 fatcat:y2hdci4lkrhkpfwbnykkibvhqi

Collaborative and secure sharing of healthcare data in multi-clouds

Benjamin Fabian, Tatiana Ermakova, Philipp Junghanns
2015 Information Systems  
In this paper, we present a novel architecture and its implementation for interorganizational data sharing, which provides a high level of security and privacy for patient data in semi-trusted cloud computing  ...  However, there are still many security and privacy challenges impeding the wide adoption of cloud computing in this domain.  ...  huge amount of medical data that is available in the multi-cloud.  ... 
doi:10.1016/j.is.2014.05.004 fatcat:ru3mrecicbajlgn7jpkqf4gyeq

Cooperative Demonstrable Data Retention for Integrity Verification in Multi-Cloud Storage

Krishna Kumar Singh, Rajkumar Gaura, Sudhir Kumar Singh
2013 International Journal of Computer Applications Technology and Research  
Our technique is for distributed cloud storage and support the scalability of services and data migration. This technique Cooperative store and maintain the client's data on multi cloud storage.  ...  In this paper we propose an efficient DDR protocol that prevent attacker in gaining information from multiple cloud storage node.  ...  a multi-cloud.  ... 
doi:10.7753/ijcatr0202.1022 fatcat:va6kg4juabef7c3srfqvausyu4

Perlustration on Recent Research into Multi Clouds integrated with Multi Party Computation

2019 International Journal of Engineering and Advanced Technology  
clouds and multi-party computation techniques and emphasizes on recent research done across multi cloud environment and give a short note of future work to enhance security paradigm.  ...  Recent advances in multi cloud technologies and multi-party computations have improved State of art usage of Cloud computing in real time scenarios.  ...  - [34] Privacy and Security of data Multi clouds database model Multi cloud service providers & Secret sharing approach - Divided the data into multiple parts and stored on different  ... 
doi:10.35940/ijeat.f8067.088619 fatcat:r5vj63mpqje23a7vyykwgm673m

Secure and Dependable Multi-Cloud Network Virtualization

Max Alaluna, Eric Vial, Nuno Neves, Fernando M. V. Ramos
2017 Proceedings of the 1st International Workshop on Security and Dependability of Multi-Domain Infrastructures - XDOMO'17  
Besides enhancing the substrate, Sirius also enhances the virtual networks with security and dependability.  ...  Sirius allows virtual networks to seam-lessly span across a substrate composed of multiple cloud infrastructures, including public clouds and private data centers.  ...  In summary, the main contributions of this chapter are: • An enhancement of our multi-cloud network virtualization system Sirius by extending its underling network model to fit a hybrid multi-cloud substrate  ... 
doi:10.1145/3071064.3071066 fatcat:timnf66ocbafnb4f6xh5xlfofi

Security-aware elasticity for NoSQL databases in multi-cloud environments

Panagiotis Katsaros, Haralambos Mouratidis, Anastasios Gounaris, Athanasios Naskos
2017 International Journal of Intelligent Information and Database Systems  
His research interests are in the area of autonomic, adaptive and wide-area data management, massive parallelism, flow and query optimization, data mining and resource scheduling.  ...  same physical machine, and data loss after one or more node failures.  ...  Since, these requirements are contradicting, we have developed a probabilistic model checking solution that accounts for user-defined trade-offs between them and is applicable to multi-cloud environments  ... 
doi:10.1504/ijiids.2017.10007783 fatcat:6bzbccfzjba4zg2wo5ngcfulva

A user-centric multi-PaaS application management solution for hybrid multi-Cloud scenarios

Dimitris Zeginis, Francesco D'Andria, Stefano Bocconi, Jesus Gorronogoitia Cruz, Oriol Collell Martin, Panagiotis Gouvas, Giannis Ledakis, Konstantinos A. Tarabanis
2013 Scalable Computing : Practice and Experience  
In this paper we present a multi-PaaS application management solution as a result of the Cloud4SOA European project that addresses these challenges.  ...  This work is partially funded by the European Commission in the context of the Cloud4SOA project, under the contract No. 257953 within the Seventh Framework Programme of the European Community.  ...  The authors would like to thank Esen Kunt and Stefano Travelli for their contribution to the design/implementation of the User Interface and David Goncalves Cunha from PTIN for providing the framework  ... 
doi:10.12694/scpe.v14i1.824 fatcat:ovjgxsobpveb5flx3ze7wt4y7e

Homomorphic Encryption and Network Coding in IoT Architectures: Advantages and Future Challenges

Goiuri Peralta, Raul G. Cid-Fuentes, Josu Bilbao, Pedro M. Crespo
2019 Electronics  
the cloud while maintaining data privacy.  ...  research directions are showing that Network Coding (NC) can increase the robustness and throughput of wireless networks, as well as that Homomorphic Encryption (HE) can be used to perform computations in  ...  The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.  ... 
doi:10.3390/electronics8080827 fatcat:qmo5zze6ozdtvfxokf73s3qavi
« Previous Showing results 1 — 15 out of 173 results