13,658 Hits in 5.7 sec

Addressing cloud computing security issues

Dimitrios Zissis, Dimitrios Lekkas
2012 Future generations computer systems  
The research methodology adopted towards achieving this goal, is based on software engineering and information systems design approaches.  ...  Grid and cloud computing Grid Computing emerged in the early 1990s, as high performance computers were inter-connected via fast data communication links, with the aim of supporting complex calculations  ...  The name cloud computing, was inspired by the cloud symbol that is often used to represent the Internet in flow charts and diagrams.  ... 
doi:10.1016/j.future.2010.12.006 fatcat:j7wh6nux25ha7hlpuknlw443xi

Security of Cloud IAAS, DAAS Services using Encryption, Obfuscation Techniques: A Review

Dr. Jayeshkumar Madhubhai Patel
2019 Figshare  
Security in Cloud computing can be addressed in many directions viz. authentication, integrity, Code Obfuscation, Data Obfuscation, confidentiality and many more.  ...  In this paper we make literature survey on Encryption as well obfuscation techniques for Cloud computing and review current practices as well as applications.  ...  The second class is control-flow transformations in which the flow of the program is changed while keeping computation functionality same. loop unrolling, clone methods, and inline/outline techniques are  ... 
doi:10.6084/m9.figshare.7824890.v1 fatcat:zawjuv2uv5bffkmr4lebjsoy5i

An analysis of security challenges and their perspective solutions for cloud computing and IoT

Muhammad Muhammad, Tahir Alyas, Faraz Ahmad, Fatima Butt, Wajahat Qazi, Shazia Saqib
2018 EAI Endorsed Transactions on Scalable Information Systems  
Another objective is to provide protection of information from unauthorized access controls in IoT-cloud integrated framework and secure data from spying.  ...  INTRODUCTION: With the on-going revolution in the Internet of Things and Cloud Computing has made the potential of every object that is connected through the Internet, to exchange and transfer data.  ...  [47] presented a sorting framework for Statistical Disclosure Control (SDC) which helps to protect microdata in cloud computing.  ... 
doi:10.4108/eai.23-10-2020.166718 fatcat:i24rjgr55faodblzxzjk6tkjmq

Manufacturing Supply Chain and Product Lifecycle Security in the Era of Industry 4.0

Sujit Rokka Chhetri, Sina Faezi, Nafiul Rashid, Mohammad Abdullah Al Faruque
2017 Journal of Hardware and Systems Security  
requirements such as confidentiality, integrity, and availability.  ...  These technologies will aid in ushering the era of the fourth industrial revolution.  ...  Companies that are using various cloud-based services should especially impose or adapt strict rules to protect them from cloud-based threats [103] .  ... 
doi:10.1007/s41635-017-0031-0 dblp:journals/jhss/ChhetriFRF18 fatcat:kjqonv6zvrhufcux3ou7mq54ei

Information Flow Control for Secure Cloud Computing

Jean Bacon, David Eyers, Thomas F. J.-M. Pasquier, Jatinder Singh, Ioannis Papagiannis, Peter Pietzuch
2014 IEEE Transactions on Network and Service Management  
Index Terms-Cloud, data security, information flow, information flow control (IFC).  ...  Security concerns are widely seen as an obstacle to the adoption of cloud computing solutions. Information Flow Control (IFC) is a well understood Mandatory Access Control methodology.  ...  In particular we introduced the notion of Decentralised Event Flow Control (DEFC), which focuses on the IFC requirements of event-based systems.  ... 
doi:10.1109/tnsm.2013.122313.130423 fatcat:oczijxwkfvdtrgar6nvab4ypem

Enforcing End-to-End Application Security in the Cloud [chapter]

Jean Bacon, David Evans, David M. Eyers, Matteo Migliavacca, Peter Pietzuch, Brian Shand
2010 Lecture Notes in Computer Science  
Our big idea-cloud-hosted services that have end-to-end information flow control-preempts worries about security and privacy violations retarding the evolution of large-scale cloud computing. 2.  ...  Overall this means that the details of information flow control and the monitoring of its integrity can be removed from application logic, being placed within the cloud infrastructure for all clients to  ...  Towards End-to-end Security Recall that we achieve security by requiring that all data and communication be protected with Information Flow Control (IFC) constraints.  ... 
doi:10.1007/978-3-642-16955-7_15 fatcat:ptw2qd7mkjhhnjwqtaj7zyfx74

Clouds of Things Need Information Flow Control with Hardware Roots of Trust

Thomas F. J.-M. Pasquier, Jatinder Singh, Jean Bacon
2015 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom)  
Towards this, we propose an approach based on Information Flow Control (IFC) that allows: (1) the continuous, end-to-end enforcement of data flow policy, and (2) the generation of provenance-like audit  ...  There is a clear, outstanding need for new security mechanisms that allow data to be managed and controlled within the cloud-enabled Internet of Things.  ...  We acknowledge the support of Microsoft through the Microsoft Cloud Computing Research Centre.  ... 
doi:10.1109/cloudcom.2015.41 dblp:conf/cloudcom/PasquierSB15 fatcat:tna3qe4grbdyjkh4jwzggnoqda

Data Outsourcing Security Issues and Introduction of DOSaaS in Cloud Computing

Mohammad Asadullah, R. K. Choudhary
2014 International Journal of Computer Applications  
In cloud environment, the client data can reside in any corner of the world and maintained and controlled outside their reach. So, there can be security and privacy issues with the client data.  ...  This survey paper presents and analyze different security and privacy issues involved in cloud computing service.  ...  There is need to have better encryption techniques and integrated cloud security framework to make it more dynamic with scalability.  ... 
doi:10.5120/14945-3501 fatcat:hzd6loy4hfctvg5fdi4kyhhni4

A Review Study on Cloud Computing Issues

Qusay Kanaan Kadhim, Robiah Yusof, Hamid Sadeq Mahdi, Sayed Samer Ali Al-shami, Siti Rahayu Selamat
2018 Journal of Physics, Conference Series  
Nevertheless, cloud computing is still in its premature stage and experiences lack of standardization. The security issues are the main challenges to cloud computing adoption.  ...  Cloud computing is the most promising current implementation of utility computing in the business world, because it provides some key features over classic utility computing, such as elasticity to allow  ...  Its patterns are based on schematics that show the data traffic flow control for secure cloud computing and particular implementation with policies implemented at each step for the cloud security issues  ... 
doi:10.1088/1742-6596/1018/1/012006 fatcat:nataqduwmrdq5j2fycgrx6gqzi

Security, Privacy and Trust Challenges in Cloud Computing and Solutions

Seyyed Yasser hashemi, Parisa Sheykhi Hesarlo
2014 International Journal of Computer Network and Information Security  
In this paper Cloud Computing security challenges will be discussed and proposed many new recommendations to increase security and trust also maintaining privacy.  ...  As much as the technological benefits, cloud computing also has risks involved.  ...  At a deeper level, trust might be regarded as a consequence of progress towards security or privacy objectives. IV. CRITICAL SECURITY CHALLENGES IN CLOUD COMPUTING A.  ... 
doi:10.5815/ijcnis.2014.08.05 fatcat:2k55llrywfh4flvf4yrupumvtq

Modelling Threats with Security Requirements in Cloud Storage

Fara Yahya, Robert J. Walters, Gary B. Wills
2015 International Journal for Information Security Research  
Therefore, there is a need to investigate the security requirements and threats which will enable efficient security protection to protect data in cloud storage.  ...  Cloud storage is becoming an option for users in keeping their data online, but it comes with the security requirements and challenges of protecting their data from threats.  ...  Applying controls based on security requirements and threats is proposed here to protect data efficiently in the cloud. A threat identification approach is chosen to explore threats in cloud storage.  ... 
doi:10.20533/ijisr.2042.4639.2015.0063 fatcat:rykkyf3ouvd4hfknys3aw5tf3y

A Survey on Modern Cloud Computing Security over Smart City Networks: Threats, Vulnerabilities, Consequences, Countermeasures and Challenges

Abeer Iftikhar Tahirkheli, Muhammad Shiraz, Bashir Hayat, Muhammad Idrees, Ahthasham Sajid, Rahat Ullah, Nasir Ayub, Ki-Il Kim
2021 Electronics  
Cloud Computing (CC) is a promising technology due to its pervasive features, such as online storage, high scalability, and seamless accessibility, in that it plays an important role in reduction of the  ...  Even though CC is a great innovation in the aspect of computing with ease of access, it also has some drawbacks. With the increase of cloud usage, security issues are proportional to the increase.  ...  The proposed protocols are computationally efficient. Privacy invasion is protected.  ... 
doi:10.3390/electronics10151811 fatcat:nqkyuoti5nd2pl5lo3hwcmu3xe

Cloud Computing Environment and Security Challenges: A Review

Muhammad Faheem, Urooj Akram, Irfan Khan, Sundas Naqeeb, Asim Shahzad, Arif Ullah
2017 International Journal of Advanced Computer Science and Applications  
In this paper, we examine the detailed design of cloud computing architecture in which deployment models, service models, cloud components, and cloud security are explored.  ...  The task of Trusted Third Party (TTP) is introducing that ensure the sufficient security characteristics in the cloud computing.  ...  Due to the deficiency in traditional physical connection, the complexity increases in cloud computing environment that it required not only protection toward cloud traffic but additionally among the cloud  ... 
doi:10.14569/ijacsa.2017.081025 fatcat:6lup4o3zgrb6zesokksadljr74

CRC: Fully General Model of Confidential Remote Computing [article]

Kubilay Ahmet Küçük, Andrew Martin
2021 arXiv   pre-print
CRC proposes a compact solution for next-generation applications to be built on strong hardware-based security primitives, control of secure software products' trusted computing base, and a way to make  ...  Drawing on and consolidating the disparate strains of research, technologies and methods employed throughout the adaptation of confidential computing, we present a novel, dedicated Confidential Remote  ...  Old-school Cloud Computing as Confidential Remote Computing: Partial Confidential Remote Computation in the Cloud. 4.  ... 
arXiv:2104.03868v1 fatcat:j72spncwrfhedjtgmtnqdtszl4

A Novel Design and Implementation of Delegated Access Control for Privacy in Clouds Outsourcing

B Prasanthi, Mohammed Abdul Quavi
2014 International Journal of Computer Trends and Technology  
We projected a two layer encryption based approach to resolve this difficulty by delegating as much of access control enforcement tasks as possible to Cloud while reducing information exposure risks due  ...  to colluding users as well as Cloud.  ...  This approach is based on a privacy preserving aspect based key management system that protects confidentiality of users although enforcing attribute based access control systems.  ... 
doi:10.14445/22312803/ijctt-v15p107 fatcat:5gsj56w2ufddtm5jaw3dtdskga
« Previous Showing results 1 — 15 out of 13,658 results