A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2014; you can also visit the original URL.
The file type is application/pdf
.
Filters
Addressing cloud computing security issues
2012
Future generations computer systems
The research methodology adopted towards achieving this goal, is based on software engineering and information systems design approaches. ...
Grid and cloud computing Grid Computing emerged in the early 1990s, as high performance computers were inter-connected via fast data communication links, with the aim of supporting complex calculations ...
The name cloud computing, was inspired by the cloud symbol that is often used to represent the Internet in flow charts and diagrams. ...
doi:10.1016/j.future.2010.12.006
fatcat:j7wh6nux25ha7hlpuknlw443xi
Security of Cloud IAAS, DAAS Services using Encryption, Obfuscation Techniques: A Review
2019
Figshare
Security in Cloud computing can be addressed in many directions viz. authentication, integrity, Code Obfuscation, Data Obfuscation, confidentiality and many more. ...
In this paper we make literature survey on Encryption as well obfuscation techniques for Cloud computing and review current practices as well as applications. ...
The second class is control-flow transformations in which the flow of the program is changed while keeping computation functionality same. loop unrolling, clone methods, and inline/outline techniques are ...
doi:10.6084/m9.figshare.7824890.v1
fatcat:zawjuv2uv5bffkmr4lebjsoy5i
An analysis of security challenges and their perspective solutions for cloud computing and IoT
2018
EAI Endorsed Transactions on Scalable Information Systems
Another objective is to provide protection of information from unauthorized access controls in IoT-cloud integrated framework and secure data from spying. ...
INTRODUCTION: With the on-going revolution in the Internet of Things and Cloud Computing has made the potential of every object that is connected through the Internet, to exchange and transfer data. ...
[47] presented a sorting framework for Statistical Disclosure Control (SDC) which helps to protect microdata in cloud computing. ...
doi:10.4108/eai.23-10-2020.166718
fatcat:i24rjgr55faodblzxzjk6tkjmq
Manufacturing Supply Chain and Product Lifecycle Security in the Era of Industry 4.0
2017
Journal of Hardware and Systems Security
requirements such as confidentiality, integrity, and availability. ...
These technologies will aid in ushering the era of the fourth industrial revolution. ...
Companies that are using various cloud-based services should especially impose or adapt strict rules to protect them from cloud-based threats [103] . ...
doi:10.1007/s41635-017-0031-0
dblp:journals/jhss/ChhetriFRF18
fatcat:kjqonv6zvrhufcux3ou7mq54ei
Information Flow Control for Secure Cloud Computing
2014
IEEE Transactions on Network and Service Management
Index Terms-Cloud, data security, information flow, information flow control (IFC). ...
Security concerns are widely seen as an obstacle to the adoption of cloud computing solutions. Information Flow Control (IFC) is a well understood Mandatory Access Control methodology. ...
In particular we introduced the notion of Decentralised Event Flow Control (DEFC), which focuses on the IFC requirements of event-based systems. ...
doi:10.1109/tnsm.2013.122313.130423
fatcat:oczijxwkfvdtrgar6nvab4ypem
Enforcing End-to-End Application Security in the Cloud
[chapter]
2010
Lecture Notes in Computer Science
Our big idea-cloud-hosted services that have end-to-end information flow control-preempts worries about security and privacy violations retarding the evolution of large-scale cloud computing. 2. ...
Overall this means that the details of information flow control and the monitoring of its integrity can be removed from application logic, being placed within the cloud infrastructure for all clients to ...
Towards End-to-end Security Recall that we achieve security by requiring that all data and communication be protected with Information Flow Control (IFC) constraints. ...
doi:10.1007/978-3-642-16955-7_15
fatcat:ptw2qd7mkjhhnjwqtaj7zyfx74
Clouds of Things Need Information Flow Control with Hardware Roots of Trust
2015
2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom)
Towards this, we propose an approach based on Information Flow Control (IFC) that allows: (1) the continuous, end-to-end enforcement of data flow policy, and (2) the generation of provenance-like audit ...
There is a clear, outstanding need for new security mechanisms that allow data to be managed and controlled within the cloud-enabled Internet of Things. ...
We acknowledge the support of Microsoft through the Microsoft Cloud Computing Research Centre. ...
doi:10.1109/cloudcom.2015.41
dblp:conf/cloudcom/PasquierSB15
fatcat:tna3qe4grbdyjkh4jwzggnoqda
Data Outsourcing Security Issues and Introduction of DOSaaS in Cloud Computing
2014
International Journal of Computer Applications
In cloud environment, the client data can reside in any corner of the world and maintained and controlled outside their reach. So, there can be security and privacy issues with the client data. ...
This survey paper presents and analyze different security and privacy issues involved in cloud computing service. ...
There is need to have better encryption techniques and integrated cloud security framework to make it more dynamic with scalability. ...
doi:10.5120/14945-3501
fatcat:hzd6loy4hfctvg5fdi4kyhhni4
A Review Study on Cloud Computing Issues
2018
Journal of Physics, Conference Series
Nevertheless, cloud computing is still in its premature stage and experiences lack of standardization. The security issues are the main challenges to cloud computing adoption. ...
Cloud computing is the most promising current implementation of utility computing in the business world, because it provides some key features over classic utility computing, such as elasticity to allow ...
Its patterns are based on schematics that show the data traffic flow control for secure cloud computing and particular implementation with policies implemented at each step for the cloud security issues ...
doi:10.1088/1742-6596/1018/1/012006
fatcat:nataqduwmrdq5j2fycgrx6gqzi
Security, Privacy and Trust Challenges in Cloud Computing and Solutions
2014
International Journal of Computer Network and Information Security
In this paper Cloud Computing security challenges will be discussed and proposed many new recommendations to increase security and trust also maintaining privacy. ...
As much as the technological benefits, cloud computing also has risks involved. ...
At a deeper level, trust might be regarded as a consequence of progress towards security or privacy objectives.
IV. CRITICAL SECURITY CHALLENGES IN CLOUD COMPUTING
A. ...
doi:10.5815/ijcnis.2014.08.05
fatcat:2k55llrywfh4flvf4yrupumvtq
Modelling Threats with Security Requirements in Cloud Storage
2015
International Journal for Information Security Research
Therefore, there is a need to investigate the security requirements and threats which will enable efficient security protection to protect data in cloud storage. ...
Cloud storage is becoming an option for users in keeping their data online, but it comes with the security requirements and challenges of protecting their data from threats. ...
Applying controls based on security requirements and threats is proposed here to protect data efficiently in the cloud. A threat identification approach is chosen to explore threats in cloud storage. ...
doi:10.20533/ijisr.2042.4639.2015.0063
fatcat:rykkyf3ouvd4hfknys3aw5tf3y
A Survey on Modern Cloud Computing Security over Smart City Networks: Threats, Vulnerabilities, Consequences, Countermeasures and Challenges
2021
Electronics
Cloud Computing (CC) is a promising technology due to its pervasive features, such as online storage, high scalability, and seamless accessibility, in that it plays an important role in reduction of the ...
Even though CC is a great innovation in the aspect of computing with ease of access, it also has some drawbacks. With the increase of cloud usage, security issues are proportional to the increase. ...
The proposed protocols are computationally efficient. Privacy invasion is protected. ...
doi:10.3390/electronics10151811
fatcat:nqkyuoti5nd2pl5lo3hwcmu3xe
Cloud Computing Environment and Security Challenges: A Review
2017
International Journal of Advanced Computer Science and Applications
In this paper, we examine the detailed design of cloud computing architecture in which deployment models, service models, cloud components, and cloud security are explored. ...
The task of Trusted Third Party (TTP) is introducing that ensure the sufficient security characteristics in the cloud computing. ...
Due to the deficiency in traditional physical connection, the complexity increases in cloud computing environment that it required not only protection toward cloud traffic but additionally among the cloud ...
doi:10.14569/ijacsa.2017.081025
fatcat:6lup4o3zgrb6zesokksadljr74
CRC: Fully General Model of Confidential Remote Computing
[article]
2021
arXiv
pre-print
CRC proposes a compact solution for next-generation applications to be built on strong hardware-based security primitives, control of secure software products' trusted computing base, and a way to make ...
Drawing on and consolidating the disparate strains of research, technologies and methods employed throughout the adaptation of confidential computing, we present a novel, dedicated Confidential Remote ...
Old-school Cloud Computing as Confidential Remote Computing: Partial Confidential Remote Computation in the Cloud. 4. ...
arXiv:2104.03868v1
fatcat:j72spncwrfhedjtgmtnqdtszl4
A Novel Design and Implementation of Delegated Access Control for Privacy in Clouds Outsourcing
English
2014
International Journal of Computer Trends and Technology
English
We projected a two layer encryption based approach to resolve this difficulty by delegating as much of access control enforcement tasks as possible to Cloud while reducing information exposure risks due ...
to colluding users as well as Cloud. ...
This approach is based on a privacy preserving aspect based key management system that protects confidentiality of users although enforcing attribute based access control systems. ...
doi:10.14445/22312803/ijctt-v15p107
fatcat:5gsj56w2ufddtm5jaw3dtdskga
« Previous
Showing results 1 — 15 out of 13,658 results