scholarly journals Privacy and Security in Cloud Computing Architecture

Author(s):  
Yin Myo Kay Khine Thaw ◽  
Myo Ma Ma ◽  
Khin Myat New Win

Cloud Computing is the most advanced technical platform for next generation. Cloud Computing provide us a large range of data storage space in web source. Cloud Computing work automatically as per the need of user we don’t need to do extra work on it. High level applications and game is run by Cloud Computing. It simply states that cloud computing means storing and accessing the data and programs over the internet rather than the computer’s hard disk. Cloud Computing cover the wide range of areas. It provides its service through online net connection. The data can be anything such as music, files, images, documents, and more. The user can access the data from anywhere just with the help of an internet connection. To use cloud computing, the user should register and provide with ID and password for security reasons. The speed of transfer depends on various factors such as the capacity of the server, internet speed, and many more. In this paper, we explore the understanding the determinates of security and privacy in cloud computing, Cloud Computing architecture and we also address the characteristics and applications of several popular cloud computing platforms. We identified several challenges from the cloud computing adoption perspective and we also highlighted the cloud interoperability issue that deserves substantial further research and development. However, security and privacy issues present a strong barrier for users to adapt into cloud computing systems.

Author(s):  
Kayalvili S ◽  
Sowmitha V

Cloud computing enables users to accumulate their sensitive data into cloud service providers to achieve scalable services on-demand. Outstanding security requirements arising from this means of data storage and management include data security and privacy. Attribute-based Encryption (ABE) is an efficient encryption system with fine-grained access control for encrypting out-sourced data in cloud computing. Since data outsourcing systems require flexible access control approach Problems arises when sharing confidential corporate data in cloud computing. User-Identity needs to be managed globally and access policies can be defined by several authorities. Data is dual encrypted for more security and to maintain De-Centralization in Multi-Authority environment.


Author(s):  
Sourav Banerjee ◽  
Debashis Das ◽  
Manju Biswas ◽  
Utpal Biswas

Blockchain-based technology is becoming increasingly popular and is now used to solve a wide range of tasks. And it's not all about cryptocurrencies. Even though it's based on secure technology, a blockchain needs protection as well. The risks of exploits, targeted attacks, or unauthorized access can be mitigated by the instant incident response and system recovery. Blockchain technology relies on a ledger to keep track of all financial transactions. Ordinarily, this kind of master ledger would be a glaring point of vulnerability. Another tenet of security is the chain itself. Configuration flaws, as well as insecure data storage and transfers, may cause leaks of sensitive information. This is even more dangerous when there are centralized components within the platform. In this chapter, the authors will demonstrate where the disadvantages of security and privacy in blockchain are currently and discuss how blockchain technology can improve these disadvantages and outlines the requirements for future solution.


2019 ◽  
pp. 1440-1459
Author(s):  
Sara Usmani ◽  
Faiza Rehman ◽  
Sajid Umair ◽  
Safdar Abbas Khan

The novel advances in the field of Information Technology presented the people pleasure, luxuries and ease. One of the latest expansions in the Information Technology (IT) industry is Cloud Computing, a technology that uses the internet for storage and access of data. It is also known as on-demand computing. The end user can access personal data and applications anywhere any time with a device having internet. Cloud Computing has gained an enormous attention but it results in the issues of data security and privacy as the data is scattered on different machines in different places across the globe which is a serious threat to the technology. It has many advantages like flexibility, efficiency and scalability but many of the companies are hesitant to invest in it due to privacy concerns. In this chapter, the objective is to review the privacy and security issues in cloud storage of Big Data and to enhance the security in cloud environment so that end users can enjoy a trustworthy and reliable data storage and access.


Author(s):  
Sourav Banerjee ◽  
Debashis Das ◽  
Manju Biswas ◽  
Utpal Biswas

Blockchain-based technology is becoming increasingly popular and is now used to solve a wide range of tasks. And it's not all about cryptocurrencies. Even though it's based on secure technology, a blockchain needs protection as well. The risks of exploits, targeted attacks, or unauthorized access can be mitigated by the instant incident response and system recovery. Blockchain technology relies on a ledger to keep track of all financial transactions. Ordinarily, this kind of master ledger would be a glaring point of vulnerability. Another tenet of security is the chain itself. Configuration flaws, as well as insecure data storage and transfers, may cause leaks of sensitive information. This is even more dangerous when there are centralized components within the platform. In this chapter, the authors will demonstrate where the disadvantages of security and privacy in blockchain are currently and discuss how blockchain technology can improve these disadvantages and outlines the requirements for future solution.


Author(s):  
Barbara Calabrese ◽  
Mario Cannataro

Abstract truncated at 3,000 characters - the full version is available in the pdf file MOTIVATIONS The availability of high-throughput technologies and the application of genomics and pharmacogenomics studies of large populations, are producing an increasing amount of experimental and clinical data, as well as specialized databases spread over the Internet. The storage, preprocessing and analysis of experimental data is becoming the main bottleneck of the analysis pipeline. Managing omics data requires both space for data storing as well as services for data preprocessing, analysis, and sharing. The resulting scenario comprises a set of bioinformatics tools, often implemented as web services, for the management and analysis of data stored in geographically distributed biological databases [1]. Cloud computing may play an important role in many phases of the bioinformatics analysis pipeline, from data management and processing, to data integration and analysis, including data exploration and visualization because it offers massive scalable computing and storage, data sharing, on-demand anytime and anywhere access to resources and applications, thus it may represent the key technology for facing those issues [2]. METHODS This work reviews main academic and industrial cloud-based bioinformatics solutions developed in the recent years; moreover, it underlines main issues and problems related to the use of such platforms for the storage and analysis of patients’ data. Specifically, the analysed solutions regard: - Data as a Service (DaaS): it provides data storage in a dynamic virtual space hosted by the cloud and allows to have updated data that are accessible from a wide range of connected devices on the web. - Software as a Service (SaaS): several cloud-based tools to execute different bioinformatics tasks, e.g. mapping applications, sequences alignment, gene expression analysis have been proposed and made available. - Platform as a Service (PaaS): unlike SaaS solutions, PaaS solutions allow users to customize the deployment of bioinformatics applications as well as to retain complete control over their instances and associated data. - Infrastructure as a Service (IaaS): this service model is offered in a computing infrastructure that includes servers (typically virtualized) with specific computational capability and/or storage. The user controls all the deployed storage resources, operating systems and bioinformatics applications. For each analysed solution, main technical characteristics as well as security and privacy issues arising when storing and analysing patients data, are reported. RESULTS The application of cloud computing in bioinformatics regards the efficient storage, retrieval and integration of experimental data and their efficient and high-throughput preprocessing and analysis.


Author(s):  
Sara Usmani ◽  
Faiza Rehman ◽  
Sajid Umair ◽  
Safdar Abbas Khan

The novel advances in the field of Information Technology presented the people pleasure, luxuries and ease. One of the latest expansions in the Information Technology (IT) industry is Cloud Computing, a technology that uses the internet for storage and access of data. It is also known as on-demand computing. The end user can access personal data and applications anywhere any time with a device having internet. Cloud Computing has gained an enormous attention but it results in the issues of data security and privacy as the data is scattered on different machines in different places across the globe which is a serious threat to the technology. It has many advantages like flexibility, efficiency and scalability but many of the companies are hesitant to invest in it due to privacy concerns. In this chapter, the objective is to review the privacy and security issues in cloud storage of Big Data and to enhance the security in cloud environment so that end users can enjoy a trustworthy and reliable data storage and access.


Author(s):  
Barbara Calabrese ◽  
Mario Cannataro

Abstract truncated at 3,000 characters - the full version is available in the pdf file MOTIVATIONS The availability of high-throughput technologies and the application of genomics and pharmacogenomics studies of large populations, are producing an increasing amount of experimental and clinical data, as well as specialized databases spread over the Internet. The storage, preprocessing and analysis of experimental data is becoming the main bottleneck of the analysis pipeline. Managing omics data requires both space for data storing as well as services for data preprocessing, analysis, and sharing. The resulting scenario comprises a set of bioinformatics tools, often implemented as web services, for the management and analysis of data stored in geographically distributed biological databases [1]. Cloud computing may play an important role in many phases of the bioinformatics analysis pipeline, from data management and processing, to data integration and analysis, including data exploration and visualization because it offers massive scalable computing and storage, data sharing, on-demand anytime and anywhere access to resources and applications, thus it may represent the key technology for facing those issues [2]. METHODS This work reviews main academic and industrial cloud-based bioinformatics solutions developed in the recent years; moreover, it underlines main issues and problems related to the use of such platforms for the storage and analysis of patients’ data. Specifically, the analysed solutions regard: - Data as a Service (DaaS): it provides data storage in a dynamic virtual space hosted by the cloud and allows to have updated data that are accessible from a wide range of connected devices on the web. - Software as a Service (SaaS): several cloud-based tools to execute different bioinformatics tasks, e.g. mapping applications, sequences alignment, gene expression analysis have been proposed and made available. - Platform as a Service (PaaS): unlike SaaS solutions, PaaS solutions allow users to customize the deployment of bioinformatics applications as well as to retain complete control over their instances and associated data. - Infrastructure as a Service (IaaS): this service model is offered in a computing infrastructure that includes servers (typically virtualized) with specific computational capability and/or storage. The user controls all the deployed storage resources, operating systems and bioinformatics applications. For each analysed solution, main technical characteristics as well as security and privacy issues arising when storing and analysing patients data, are reported. RESULTS The application of cloud computing in bioinformatics regards the efficient storage, retrieval and integration of experimental data and their efficient and high-throughput preprocessing and analysis.


2014 ◽  
Vol 905 ◽  
pp. 687-692
Author(s):  
Waleed Al-Museelem ◽  
Chun Lin Li

Cloud computing has led to the development of IT to more sophisticated levels by improving the capacity and flexibility of data storage and by providing a scalable computation and processing power which matches the dynamic data requirements. Cloud computing has many benefits which has led to the transfer of many enterprise applications and data to public and hybrid clouds. However, many organizations refer to the protection of privacy and the security of data as the major issues which prevent them from adopting cloud computing. The only way successful implementation of clouds can be achieved is through effective enhancement and management of data security and privacy in clouds. This research paper analyzes the privacy and protection of data in cloud computing through all data lifecycle stages providing an overall perspective of cloud computing while highlighting key security issues and concerns which should be addressed. It also discusses several current solutions and further proposes more solutions which can enhance the privacy and security of data in clouds. Finally, the research paper describes future research work on the protection of data privacy and security in clouds.


Author(s):  
Ishan Senarathna ◽  
William Yeoh ◽  
Matthew Warren ◽  
Scott Salzman

New national infrastructure initiatives such as National Broadband Network (NBN) could enable Small and Medium-sized Enterprises (SMEs) in Australia to further embrace Cloud computing service. However, the ability of Cloud computing to store data remotely and share services in a dynamic environment bring along with it Cloud security and privacy concerns. In this study, we examined the influence of privacy and security factors on Cloud adoption by Australian SMEs through a questionnaire survey. Data was collected from 150 SMEs (i.e. 79 metropolitan SMEs and 71 regional SMEs) and structural equation modelling was used for data analysis. The findings show that Cloud privacy and security factors are not the most critical concern for Australian SMEs. Moreover, the results indicate that Cloud computing adoption is not influenced by the geographical location of the SMEs. This study extends the current understanding of Cloud computing adoption by Australian SMEs.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Amr M. Sauber ◽  
Passent M. El-Kafrawy ◽  
Amr F. Shawish ◽  
Mohamed A. Amin ◽  
Ismail M. Hagag

The main goal of any data storage model on the cloud is accessing data in an easy way without risking its security. A security consideration is a major aspect in any cloud data storage model to provide safety and efficiency. In this paper, we propose a secure data protection model over the cloud. The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents the threats and attacks that affect data residing in the cloud. Our proposed model provides the benefits and effectiveness of security in cloud computing such as enhancement of the encryption of data in the cloud. It provides security and scalability of data sharing for users on the cloud computing. Our model achieves the security functions over cloud computing such as identification and authentication, authorization, and encryption. Also, this model protects the system from any fake data owner who enters malicious information that may destroy the main goal of cloud services. We develop the one-time password (OTP) as a logging technique and uploading technique to protect users and data owners from any fake unauthorized access to the cloud. We implement our model using a simulation of the model called Next Generation Secure Cloud Server (NG-Cloud). These results increase the security protection techniques for end user and data owner from fake user and fake data owner in the cloud.


Sign in / Sign up

Export Citation Format

Share Document