Filters








56,535 Hits in 2.9 sec

Migration of Virtual Machine to improve the Security of Cloud Computing

N. Chandrakala, B. Thirumala Rao
2018 International Journal of Electrical and Computer Engineering (IJECE)  
With the increase in the development of cloud computing environment, the security has become the major concern that has been raised more consistently in order to move data and applications to the cloud  ...  In the migration based security approach, proposed the placement of VMs can make enormous difference in terms of security levels.  ...  The major issues pertaining to data security in the cloud computing environment like data location and data transmission, data availability, data security are discussed in [5] .  ... 
doi:10.11591/ijece.v8i1.pp210-219 fatcat:a46iu7tnd5ad3hqnscewabrybu

Preventing data loss even when the security system compromise

S. Renu, Krishna Veni
2018 Istrazivanja i projektovanja za privredu  
Storage as a service will diminish the risk of data storage but it leads to the era of data storage security.  ...  Replicating all data into numerous clouds will lead to monetary detriment as well as gigantic growth of electronic data.  ...  Controlling the size of outsourced fi le can make a great impact in data security even when the security system compromise.  ... 
doi:10.5937/jaes16-15732 fatcat:rjigmq67avamjcew5o4t6ohrqm

Securing Cloud from Cloud Drain [article]

Niva Das, Tanmoy Sarkar
2014 arXiv   pre-print
We have used the term Cloud-Drain to define data leakage in case of security compromise.  ...  Amazon.com announced the Elastic Compute Cloud.In this paper, we will discuss about cloud security approaches.  ...  CLOUD DRAIN The term cloud-drain is used to signify the data leakage in case of security compromise in cloud computing. Intrusion plays a major role in this part.  ... 
arXiv:1407.6482v3 fatcat:dwc7jaeimjdadb75oslrduup6y

SoK: Cryptographic Confidentiality of Data on Mobile Devices

Maximilian Zinkus, Tushar M. Jois, Matthew Green
2021 Proceedings on Privacy Enhancing Technologies  
In this work, we outline those challenges, and systematize the known approaches to securing user data against extraction attacks.  ...  We evaluate the existing literature for securing devices against data extraction adversaries with powerful capabilities including access to devices and to the cloud services they rely on.  ...  The authors received support from the National Science Foundation under awards CNS-1653110, CNS-1801479, CNS-1955172, and from a Google Security & Privacy Award as well as an ONR award.  ... 
doi:10.2478/popets-2022-0029 fatcat:uykbhajxxveatal5jopghi2jji

ISSUES OF CLOUD SECURITY AND ITS IMPLICATIONS

Sandeep.B .
2014 International Journal of Research in Engineering and Technology  
, securing data transmission in cloud, elasticity, cloud multi-tenancy, service level agreement and compromise on the integrity of the information in cloud.  ...  data stored in the cloud.  ...  ISSUES IN CLOUD SECURITY Security is a primary concern of cloud computing as the cloud gives access to data but does not ensure the integrity of data. cloud computing offers amazing benefits in communication  ... 
doi:10.15623/ijret.2014.0315059 fatcat:gzgw7xfubnbchayctxjas56vz4

Improved AES Algorithm for Secure Communication in Cloud

Abhipray Bajpai
2018 International Journal for Research in Applied Science and Engineering Technology  
Privacy and security are also important at the same time. Computing resources are another demand which makes outsourcing of data by the organizations, which need secure storage in cloud.  ...  This paper address secure data storage using AES (Advance Encryption Standard) for increase in confidentiality and security by splitting data files into chunks and then calculating number of keys.  ...  Security In Cloud Computing In terms of data storage on cloud, public storage is not costly but is not secure.  ... 
doi:10.22214/ijraset.2018.5265 fatcat:vlykpl5bbzda5eguo6f76pe4zu

Security Aspects of Virtualization in Cloud Computing [chapter]

Muhammad Kazim, Rahat Masood, Muhammad Awais Shibli, Abdul Ghafoor Abbasi
2013 Lecture Notes in Computer Science  
In this paper, different aspects of Cloud virtualization security have been explored.  ...  In Cloud computing, virtualization is the basis of delivering Infrastructure as a Service (IaaS) that separates data, network, applications and machines from hardware constraints.  ...  These activities will result in security compromises such as loss of data confidentiality and unauthorized traffic monitoring.  ... 
doi:10.1007/978-3-642-40925-7_22 fatcat:stn6viomirfr7axqd267fqehwm

Secured Identity Management System for Preserving Data Privacy and Transmission in Cloud Computing

Garima Rastogi, Rama Sushil
2018 International Journal of Future Generation Communication and Networking  
This paper proposes a novel identity management system for secure data transmission and preserving data privacy in cloud environment called (SIDM).  ...  In short, data security is a very important issue which needs to be addressed properly to enhance the usage of cloud computing.  ...  In [9] , the authors have done some analysis on various recent data security models. They also proposed cloud data security model based on business modeling notations.  ... 
doi:10.14257/ijfgcn.2018.11.1.03 fatcat:jcuy6z2wzrdpnhpvffiim52mpm

Information Safety in Cloud Computing

Dr. Bharat Batham
2022 Praxis international journal of social science and literature  
This paper discusses the security of data in cloud computing. It is a study of data in the cloud and aspects related to it concerning security.  ...  Availability of data in the cloud is beneficial for many applications but it poses risks by exposing data to applications which might already have security loopholes in them.  ...  Storage in Public Cloud Storing data in a public cloud is another security concern in cloud computing.  ... 
doi:10.51879/pijssl/050601 fatcat:oo2ttysgmnh6rf3ckukokorpbi

Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds

Dan Gonzales, Jeremy M. Kaplan, Evan Saltzman, Zev Winkelman, Dulani Woods
2017 IEEE Transactions on Cloud Computing  
data compromise) is high if a minimal set of security controls are implemented.  ...  data compromise) is high if a minimal set of security controls are implemented.  ...  ACKNOWLEDGMENT This work was supported by the Institute of information and infrastructure protection (I3P), the Department of Homeland Security (DHS) National Cyber Security Division, and the RAND Corporation  ... 
doi:10.1109/tcc.2015.2415794 fatcat:iianqjxysvgczhoj6wo2zwhbla

A Survey of : Securing Cloud Data under Key Exposure

2018 International Journal of Advanced Trends in Computer Science and Engineering  
This may be achieved, for example, by spreading cipher text blocks across servers in multiple administrative domains-thus assuming that the adversary cannot compromise all of them.  ...  Nevertheless, if data is encrypted with existing schemes, an adversary equipped with the encryption key, can still compromise a single server and decrypt the cipher text blocks stored therein.  ...  The recent and continuing data breaches highlight the need for more secure cloud storage systems.  ... 
doi:10.30534/ijatcse/2018/01732018 fatcat:zjwvk5ceabfffmgufw6jwyqriq

An Actor-centric, Asset-Based Monitor Deployment Model for Cloud Computing

Uttam Thakore, Gabriel A. Weaver, William H. Sanders
2013 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing  
the data needed, and completing and reviewing the collection of information.  ...  Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining  ...  Effective monitor deployment is a must to effectively detect security breaches in a cloud system and allow cloud consumers to be confident in the security of the cloud system on which their data and services  ... 
doi:10.1109/ucc.2013.67 dblp:conf/ucc/ThakoreWS13 fatcat:ttkpntioejamjipoqt7djy5bym

Enhancing Security and Privacy of Next-Generation Edge Computing Technologies

Matthew Hagan, Fahad Siddiqui, Sakir Sezer
2019 2019 17th International Conference on Privacy, Security and Trust (PST)  
This in contrast to early edge devices that only collect and transmit data from sensors to the cloud for data analysis purposes.  ...  . • Consumer awareness surrounding privacy. • Bandwidth and data consumption costs for cloud & consumers. • Desire to maintain security of raw data. • Increase in processing capability of embedded devices  ... 
doi:10.1109/pst47121.2019.8949052 dblp:conf/pst/HaganSS19 fatcat:b2ibbz64gbgmbdmavzw2gedcaa

IoT Security: Penetration Testing of White-label Cloud-based IoT Camera Compromising Personal Data Privacy

Marlon Intal Tayag, Francisco Napalit, Arcely Napalit
2020 International Journal of Computer Science & Information Technology (IJCSIT)  
Each Cloud-based IoT cameras sold are not properly tested for security. The problem arises when a hacker, hacks into the Cloud-based IoT Camera sees everything we do, without us knowing about it.  ...  How this IoT device can be compromised and how to protect our selves from such cyber-attacks.  ...  People using compromised Cloud-based IoT Cameras deployed in homes to monitor, and a means of protection can be used to breach personal data privacy.  ... 
doi:10.5121/ijcsit.2020.12503 fatcat:uak7k4j3yrgi7chlxdmbeodepi

Inevitable Failure

Yuqiong Sun, Giuseppe Petracca, Trent Jaeger
2014 Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security - CCSW '14  
However, a wide range of vulnerabilities have been identified in these cloud services that may enable an adversary to compromise customers' computations or even the cloud platform itself.  ...  We outline a set of additional security policy goals that a SCOS must enforce to control threats from potentially compromised cloud services comprehensively.  ...  Third, there is no system security policy that governs how the cloud operates in case some services are compromised.  ... 
doi:10.1145/2664168.2664180 dblp:conf/ccs/SunPJ14 fatcat:2y5klxpogzfrbpmh7fhb26tdca
« Previous Showing results 1 — 15 out of 56,535 results