Filters








38,920 Hits in 5.8 sec

Effective Ways of Secure, Private and Trusted Cloud Computing [article]

Pardeep Kumar, Vivek Kumar Sehgal, Durg Singh Chauhan, P. K. Gupta and Manoj Diwakar
2011 arXiv   pre-print
A concept of utility cloud has been represented to provide the various services to the users. Emerging technologies can help address the challenges of Security, Privacy and Trust in cloud computing.  ...  Since cloud computing uses distributed resources in open environment, thus it is important to provide the security and trust to share the data for developing cloud computing applications.  ...  This gap between adoption and innovation is so wide that cloud computing consumers don't fully trust this new way of computing.  ... 
arXiv:1111.3165v1 fatcat:56ruvacgfjbbjkydr5o4kq65yi

Trust Model for Dependable File Exchange in Cloud Computing

El-Sayed M.
2018 International Journal of Computer Applications  
This paper displays a model for trust in cloud computing. Representing vital components which shape the clients trust and a method for assessing every component's significance  ...  The issue of low trust on distributed computing is an obstruction, one of the significant snag to its pervasive organization, especially if there should arise an occurrence of basic information storage  ...  trust can be communicated by: T np(a,h) = Vhnp Represents the trust of An in B in the private cloud NP and V represents worth trust of B, in the private cloud NP broke down by A.  ... 
doi:10.5120/ijca2018917305 fatcat:xckbw6cumzf5hj3fovsmhtxnry

A Survey & Analysis of Various Trust Model for Security in Cloud Computing: Issues & Challenges

Mr.Ashish Sharma, Dr.Sanjay Kumar
2017 International Journal of Scientific and Engineering Research  
One of the efficient and improved Trust Model is implemented which increases the strength of Security in Cloud Computing [1].  ...  Cloud computing enables sharing of data over internet, hence the chances of security attacks also increases.  ...  Here in this paper an effective trust model is implanted which computes trust value and hence on the basis Security Strength of the Cloud Computing increases.  ... 
doi:10.14299/ijser.2017.07.004 fatcat:iz765t6w6zaepmqpuhjulkxmam

Data Protection Techniques for Building Trust in Cloud Computing

Muhammad Yousaf Saeed, M.N.A. Khan
2015 International Journal of Modern Education and Computer Science  
Cloud computing has played much important role in comparison to other fields of IT, in providing Data storage, Data security, Quality of Services (QoS) etc.  ...  By the use of proposed trust and security model, we can enhance Return on Investment factor in the cloud for the data security and service provided by it.  ...  Security Aware Cloud This is a type of private cloud which is not the same to the present current clouds in many ways.  ... 
doi:10.5815/ijmecs.2015.08.05 fatcat:xpwpxu3bxvb3lammqmcjax3jwy

A Trusted-based Cloud Computing Virtual Storage System and Key Technologies

Kehe Wu, Long Chen, Yi Li
2015 International Journal of Computers Communications & Control  
and secondly introduces the concept of trusted into Cloud Computing data protection, presents the concept of Trusted Virtual Block Storage Device (TVBSD) and designs the Trusted Cloud Computing Virtual  ...  In order to protect confidentiality and integrity of user data in Cloud Computing, this paper firstly studies the relevant research works in fields of trusted computing and Cloud Computing data protection  ...  In section 2, we introduce the concept of trusted into cloud computing virtual storage, propose the concept of Trusted Virtual Block Storage Device (TVBSD) and design the Trusted Cloud Computing Virtual  ... 
doi:10.15837/ijccc.2015.4.1992 fatcat:6zljpcl3l5fu3kyojwzdpia2y4

Research on Scheduling Strategy based on Trust in Hybrid Cloud

Xiao-Lan Xie, Shun-Bai Huang, Xiu-juan Guo
2016 International Journal of Grid and Distributed Computing  
The experimental results show that the hybrid cloud scheduling strategy is effective in terms of security and throughput.  ...  How to effectively and safely make hybrid cloud scheduling is one of the main research topics in the field of hybrid cloud.  ...  International Journal of Grid and Distributed Computing Vol. 9, No. 8 (2016)  ... 
doi:10.14257/ijgdc.2016.9.8.26 fatcat:iff6fyp5wbda7d6rrblr74atoe

Cloud Computing Technology: Security and Trust Challenges

Sajjad Hashemi
2013 International Journal of Security Privacy and Trust Management  
A let of exclusive features such as high functionality and low cost have made cloud computing a valuable technology.  ...  Looking at the literature of this technology, it can be claimed that the main concerns of the users of cloud are security issues especially trust.  ...  Today the main and first concerns in cloud computing are security, trust and the way of creating trust in accepting and sharing applications, hardware and so on in an environment which nobody knows who  ... 
doi:10.5121/ijsptm.2013.2501 fatcat:2e4sjvusbbhrtezb4axagimmhq

Cloud Computing Security: A Survey

Sheetal Mahalle, Ranjeet Jaiswal
2015 International Journal of Computer Applications  
Now several companies are choosing the services of cloud computing. Then the question of security of the cloud data may arise. As the data on the cloud computing should be secure.  ...  In this paper a study has been made in the direction of cloud computing security. Based on the study some new insights has been gathered and suggested.  ...  Advanced a few trains of considered the security, and recommended that trusted distributed computing will be a guaranteeing bearing without bounds cloud security scrutinizes.  ... 
doi:10.5120/20157-2318 fatcat:5nabynddwbh5rjem6ysgg2kpiy

Security, Privacy and Trust Challenges in Cloud Computing and Solutions

Seyyed Yasser hashemi, Parisa Sheykhi Hesarlo
2014 International Journal of Computer Network and Information Security  
In this paper Cloud Computing security challenges will be discussed and proposed many new recommendations to increase security and trust also maintaining privacy.  ...  Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort  ...  Milne [11] suggests a simple way which is widely employed among UK corporations. This is why they employ private clouds in-house.  ... 
doi:10.5815/ijcnis.2014.08.05 fatcat:2k55llrywfh4flvf4yrupumvtq

Secure Computation for Cloud data Storage [article]

Davood Rezaeipour
2019 IACR Cryptology ePrint Archive  
and therefore practical ways of securing this type of data.  ...  Private semi-trusted clouds, allow researchers to design private clouds by using cryptographic techniques, to protect the semi-trusted ones.  ...  The datasets contain metadata computed by the cloud using a set of effective algorithms and user criteria.  ... 
dblp:journals/iacr/Rezaeipour19 fatcat:ky7l7ndezvgmvomdrhsfmbcvni

A practical approach to the attestation of computational integrity in hybrid cloud

Andrew Pawloski, Longfei Wu, Xiaojiang Du, Lijun Qian
2015 2015 International Conference on Computing, Networking and Communications (ICNC)  
In the context of a heterogeneous trust environment, such as a hybrid cloud (consisting of public and private cloud), it is possible for an untrusted component to create a Byzantine fault intentionally  ...  Although there are ways to provide malicious Byzantine Fault-Tolerance in classical distributed systems, their computation and communication properties make them infeasible to be used in the hybrid cloud  ...  ACKNOWLEDGEMENT This work was supported in part by the US National Science Foundation under grants CNS-0963578, CNS-1022552, and CNS-1065444.  ... 
doi:10.1109/iccnc.2015.7069318 dblp:conf/iccnc/PawloskiWDQ15 fatcat:tzh5ms64mzfdrplnuashzcklye

Security, Privacy, Threats and Risks in Cloud Computing ― A Vital Review

Sumit Goyal
2016 International Journal of Applied Mathematics Electronics and Computers  
This review describes the latest threats and risks associated with cloud computing and suggests techniques for better privacy and security of data in cloud environment.  ...  The security & privacy levels in cloud computing are illustrated and security solutions & standards for cloud computing are proposed.  ...  Introduction Determining the user's trust is a growing concern for ensuring privacy and security in a cloud computing environment.  ... 
doi:10.18100/ijamec.29177 fatcat:vbpmxwnmuzhoxipmoz5cztfcyi

Ensuring Security and Privacy for Cloud-based E-Services

Khadijah M., Fahd S.
2016 International Journal of Computer Applications  
E-services are becoming more and more a cloud-based with the growth of Cloud Computing and E-society.  ...  The aim of this paper is to illustrate those applications and the main challenges that face the adaptation of Cloud Computing, which are mainly privacy and security issues, and what can be done to solve  ...  Security and privacy have been the most controversy about cloud computing, which may consider as a barrier to the adaptation of CC and may have a huge effect on the future of the cloud.  ... 
doi:10.5120/ijca2016911597 fatcat:4bkoc6wuxzddvn4dokhfp4ss7e

A Review of Cloud Computing Security Issues

Manpreet Kaur, Hardeep Singh
2015 International Journal of Grid and Distributed Computing  
Since Cloud computing stores the data and its disseminated resources in the environment, security has become the main obstacle which is hampering the deployment of cloud environments.  ...  The importance of third party is to prevent and control unauthorized access to data store to the cloud. This research paper discuss the security issues of cloud storage.  ...  Security of the Cloud relies on trusted computing and cryptography.  ... 
doi:10.14257/ijgdc.2015.8.5.21 fatcat:3gcn6ysygfa2fjv6s2czcun5hu

A Review of Cloud Computing Security Issues

Manpreet kaur, Hardeep Singh
2015 International Journal of Education and Management Engineering  
Since Cloud computing stores the data and its disseminated resources in the environment, security has become the main obstacle which is hampering the deployment of cloud environments.  ...  The importance of third party is to prevent and control unauthorized access to data store to the cloud. This research paper discuss the security issues of cloud storage.  ...  Security of the Cloud relies on trusted computing and cryptography.  ... 
doi:10.5815/ijeme.2015.05.04 fatcat:jdoe544r5nh6vebbw6suuyppgq
« Previous Showing results 1 — 15 out of 38,920 results