IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend
companies are migrating business critical and sensitive data stored in database to cloud-hosted and
Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious
little attention has been paid to authentication in the cloud. In this paper we have designed a new effective
authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password,
whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for
DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the
authentication problem in cloud. The proposed solution which we have provided is based mainly on
improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized
or not. The results showed that this scheme is very strong and difficult to break it.
Security Check in Cloud Computing through Third Party Auditorijsrd.com
In cloud computing, data owners crowd their data on cloud servers and users (data consumers) can access the data from cloud servers. Due to the data outsourcing, however, it requires an independent auditing service to check the data integrity in the cloud. Some existing remote integrity checking method scan only serve for static records data. Thus, cannot be used in the auditing service since the data in the cloud can be animatedly updated. Thus, an efficient and secure dynamic auditing protocol is required to convince data owners that the data are correctly stored in the cloud. In this paper, we first design an auditing framework for cloud storage systems for privacy-preserving auditing protocol. Then, we extend our auditing protocol to support the data dynamic operations, which is efficient to secure the random model.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsIJERA Editor
In recent years,increment in the growth and popularity of cloud services has lead the enterprises to an increase in the capability to handle, store and retrieve critical data. This technology access a shared group of configurable computing resources, which are- servers,storage and applications. Cloud computing is a succeeding generation architecture of IT enterprise, which convert the application software and databaseto large data hubs.Data security and storage of data is an essential functionality of cloud services.It allows data storage in the cloud server efficiently without any worry. Cloud services includes request service, wide web access, measured services, just single click away ,easy usage, just pay for the services you use and location independent.All these features poses many security challenges.The data partitioning techniques are used in literature, for privacy conserving and security of data, using third party auditor (TPA). Objective of the current workis to review all available partitioning technique in literature and analyze them. Through this work authors will compare and identify the limitations and benefits of the available and widely used partitioning techniques.
Security Check in Cloud Computing through Third Party Auditorijsrd.com
In cloud computing, data owners crowd their data on cloud servers and users (data consumers) can access the data from cloud servers. Due to the data outsourcing, however, it requires an independent auditing service to check the data integrity in the cloud. Some existing remote integrity checking method scan only serve for static records data. Thus, cannot be used in the auditing service since the data in the cloud can be animatedly updated. Thus, an efficient and secure dynamic auditing protocol is required to convince data owners that the data are correctly stored in the cloud. In this paper, we first design an auditing framework for cloud storage systems for privacy-preserving auditing protocol. Then, we extend our auditing protocol to support the data dynamic operations, which is efficient to secure the random model.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsIJERA Editor
In recent years,increment in the growth and popularity of cloud services has lead the enterprises to an increase in the capability to handle, store and retrieve critical data. This technology access a shared group of configurable computing resources, which are- servers,storage and applications. Cloud computing is a succeeding generation architecture of IT enterprise, which convert the application software and databaseto large data hubs.Data security and storage of data is an essential functionality of cloud services.It allows data storage in the cloud server efficiently without any worry. Cloud services includes request service, wide web access, measured services, just single click away ,easy usage, just pay for the services you use and location independent.All these features poses many security challenges.The data partitioning techniques are used in literature, for privacy conserving and security of data, using third party auditor (TPA). Objective of the current workis to review all available partitioning technique in literature and analyze them. Through this work authors will compare and identify the limitations and benefits of the available and widely used partitioning techniques.
Single Sign-on Authentication Model for Cloud Computing using KerberosDeepak Bagga
ABSTRACT
In today’s organizations need for several new resources and storage requirements for terabytes of data is generated every day. Cloud computing provides solution for this in a cost effective and efficient manner. Cloud computing provides on demand resources as services to clients. Cloud is highly scalable and flexible. Although it is benefiting the clients in several ways but as data is stored remotely it has many security loopholes like attacks, data lose, other security and authentication issues. In this paper we are proposing an authentication model for cloud computing based on the Kerberos protocol to provide single sign-on and to prevent against DDOS attacks. This model can benefit by filtering against unauthorized access and to reduce the burden, computation and memory usage of cloud against authentication checks for each client. It acts as a third party between cloud servers and clients to allow secure access to cloud services. In this paper we will see some of the related work for cloud security issues and attacks. Then in next section we will discuss the proposed architecture, its working and sequential process of message transmission. Next we will see how it can prevent against DDOS attacks, some benefits and how it provides single sign-on.
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible cryptography based scheme. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against malicious data modification attack.
Cloud computing is the technology which enables obtaining resources like so services,
software, hardware over the internet. With cloud storage users can store their data remotely and
enjoy on-demand services and application from the configurable resources. The cloud data storage
has many benefits over local data storage. Users should be able to just use the cloud storage as if it is
local, without worrying about the need to verify its integrity. The problem is that ensuring data
security and integrity of data of user. Sohere, I am going to have public audit ability for cloud storage
that users can resort to a third-party auditor (TPA) to check the integrity of data. This paper gives the
various issues related to privacy while storing the user’s data to the cloud storage during the TPA
auditing. Without appropriate security and privacy solutions designed for clouds this computing
paradigm could become a big failure. I am a giving privacy-preserving public auditing using ring
signature process for secure cloud storage system. This paper is going to analyze various techniques
to solve these issues and to provide the privacy and security to the data in cloud
Excellent Manner of Using Secure way of data storage in cloud computingEditor IJMTER
The major challenging issue in Cloud computing is Security. Providing Security is big issue
towards protecting data from third person as well as in Internet. This mainly deals the Security how it is
provided. Various type of services are there to protect our data and Various Services are available in Cloud
Computing to Utilize effective manner as Software as a Service (SaaS), Platform as a Service (PaaS),
Hardware as a Service (HaaS). Cloud computing is the use of computing resources (hardware and
software) that are delivered as a service over Internet network. Cloud Computing moves the Application
software and databases to the large data centres, where the administration of the data and services may not
be fully trustworthy that is in third party here the party has to get certified and authorized. Since Cloud
Computing share distributed resources via network in the open environment thus it makes new security
risks towards the correctness of the data in cloud. I propose in this paper flexibility of data storage
mechanism in the distributed environment by using the homomorphism token generation. In the proposed
system, users need to allow auditing the cloud storage with lightweight communication. While using
Encryption and Decryption methods it is very burden for a single processor. Than the processing
Capabilities can we utilize from Cloud Computing.
IT Solutions for 3 Common Small Business ProblemsBrooke Bordelon
Many time consuming IT problems can be side-stepped by establishing a solid network from the get-go rather than playing catch up with problems as they arise..find out how with these IT solutions.
Trust Your Cloud Service Provider: User Based Crypto ModelIJERA Editor
In Data Storage as a Service (STaaS) cloud computing environment, the equipment used for business operations
can be leased from a single service provider along with the application, and the related business data can be
stored on equipment provided by the same service provider. This type of arrangement can help a company save
on hardware and software infrastructure costs, but storing the company’s data on the service provider’s
equipment raises the possibility that important business information may be improperly disclosed to others [1].
Some researchers have suggested that user data stored on a service-provider’s equipment must be encrypted [2].
Encrypting data prior to storage is a common method of data protection, and service providers may be able to
build firewalls to ensure that the decryption keys associated with encrypted user data are not disclosed to
outsiders. However, if the decryption key and the encrypted data are held by the same service provider, it raises
the possibility that high-level administrators within the service provider would have access to both the
decryption key and the encrypted data, thus presenting a risk for the unauthorized disclosure of the user data. we
in this paper provides an unique business model of cryptography where crypto keys are distributed across the
user and the trusted third party(TTP) with adoption of such a model mainly the CSP insider attack an form of
misuse of valuable user data can be treated secured.
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMijiert bestjournal
The continuous development of cloud computing,seve ral trends are opening up to new forms of outsourci ng. Public data integrity auditing is not secure and efficient for shared dynamic data. In existing scheme figure out the collusion attack and provide an efficient public integrity au diting scheme,with the help of secure group user r evocation based on vector commitment and verifier�local revocation group signature. It provides secure and efficient s cheme which support public checking and efficient user revocati on. Problem of existing work they used TPA (Third p arty auditor) for key generation and key agreement. Use of TPA as central system if it fails then whole system gets failed. If we are working with cloud,user identity is major conc ern because user doesn�t want to reveal his persona l information to public. This concept not included in it. In this paper,based these con�s we proposed a dynamic dat a sharing in public cloud using multi-authority system. The prop osed scheme is able to protect user�s privacy again st each single authority. .
Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces database and application software to the large data centres, where the management of services and data may not be predictable, where as the conventional solutions, for IT services are under proper logical, physical and personal controls. This aspect attribute, however comprises different security challenges which have not been well understood. It concentrates on cloud data storage security which has always been an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent features. Homomorphic token is used for distributed verification of erasure – coded data. By using this scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the data management and services may not be absolutely truthful. This effective security and performance analysis describes that the proposed scheme is extremely flexible against malicious data modification, convoluted failures and server clouding attacks.
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces
database and application software to the large data centres, where the management of services and data
may not be predictable, where as the conventional solutions, for IT services are under proper logical,
physical and personal controls. This aspect attribute, however comprises different security challenges
which have not been well understood. It concentrates on cloud data storage security which has always been
an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and
efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent
features. Homomorphic token is used for distributed verification of erasure – coded data. By using this
scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and
secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to
traditional solutions, where the IT services are under proper physical, logical and personnel controls,
cloud computing moves the application software and databases to the large data centres, where the data
management and services may not be absolutely truthful. This effective security and performance analysis
describes that the proposed scheme is extremely flexible against malicious data modification, convoluted
failures and server clouding attacks.
Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces database and application software to the large data centres, where the management of services and data may not be predictable, where as the conventional solutions, for IT services are under proper logical, physical and personal controls. This aspect attribute, however comprises different security challenges which have not been well understood. It concentrates on cloud data storage security which has always been an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent features. Homomorphic token is used for distributed verification of erasure – coded data. By using this scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the data management and services may not be absolutely truthful. This effective security and performance analysis describes that the proposed scheme is extremely flexible against malicious data modification, convoluted failures and server clouding attacks.
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
Cloud Computing is going to be very popular technology in IT enterprises. For any enterprise the data stored is very huge
and invaluable. Since all tasks are performed through network it has become vital to have the secured use of legitimate data. In cloud
computing the most important matter of concern are data security and privacy along with flexibility, scalability and fine grained access
control of data being the other requirements to be maintained by cloud systems Access control is one of the prominent research topics
and hence various schemes have been proposed and implemented. But most of them do not provide flexibility, scalability and fine
grained access control of the data on the cloud. In order to address the issues of flexibility, scalability and fine grained access control
of remotely stored data on cloud we have proposed the hierarchical attribute set-based encryption (HASBE) which is the extension of
attribute- set-based encryption(ASBE) with a hierarchical structure of users. The proposed scheme achieves scalability by handling the
authority to appropriate entity in the hierarchical structure, inherits flexibility by allowing easy transfer and access to the data in case
of location switch. It provides fine grained access control of data by showing only the requested and authorized details to the user thus
improving the performance of the system. In addition, it provides efficient user revocation within expiration time, request to view
extra-attributes and privacy in the intra-level hierarchy is achieved. Thus the scheme is implemented to show that is efficient in access
control of data as well as security of data stored on cloud with comprehensive experiments
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITYijccsa
Blockchain is widely used for money related transaction and still there are many proven usecases across
different industries like Retail in stock checks and order management, Manufacturing in good movement
processing, Health care in patient database management to name a few. With this in mind, it is always
important to understand the merits and demerits of both Public and Private Blockchain to understand their
capabilities and limitations to decide which one is more suitable for an industry specific usecase
implementation. In a Cloud based platform, data security plays a crucial role to cater to data protection
and regulatory requirements and Blockchain can play an important role in this for accelerated workflow
by providing ‘data security’ as a service capability.
Single Sign-on Authentication Model for Cloud Computing using KerberosDeepak Bagga
ABSTRACT
In today’s organizations need for several new resources and storage requirements for terabytes of data is generated every day. Cloud computing provides solution for this in a cost effective and efficient manner. Cloud computing provides on demand resources as services to clients. Cloud is highly scalable and flexible. Although it is benefiting the clients in several ways but as data is stored remotely it has many security loopholes like attacks, data lose, other security and authentication issues. In this paper we are proposing an authentication model for cloud computing based on the Kerberos protocol to provide single sign-on and to prevent against DDOS attacks. This model can benefit by filtering against unauthorized access and to reduce the burden, computation and memory usage of cloud against authentication checks for each client. It acts as a third party between cloud servers and clients to allow secure access to cloud services. In this paper we will see some of the related work for cloud security issues and attacks. Then in next section we will discuss the proposed architecture, its working and sequential process of message transmission. Next we will see how it can prevent against DDOS attacks, some benefits and how it provides single sign-on.
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible cryptography based scheme. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against malicious data modification attack.
Cloud computing is the technology which enables obtaining resources like so services,
software, hardware over the internet. With cloud storage users can store their data remotely and
enjoy on-demand services and application from the configurable resources. The cloud data storage
has many benefits over local data storage. Users should be able to just use the cloud storage as if it is
local, without worrying about the need to verify its integrity. The problem is that ensuring data
security and integrity of data of user. Sohere, I am going to have public audit ability for cloud storage
that users can resort to a third-party auditor (TPA) to check the integrity of data. This paper gives the
various issues related to privacy while storing the user’s data to the cloud storage during the TPA
auditing. Without appropriate security and privacy solutions designed for clouds this computing
paradigm could become a big failure. I am a giving privacy-preserving public auditing using ring
signature process for secure cloud storage system. This paper is going to analyze various techniques
to solve these issues and to provide the privacy and security to the data in cloud
Excellent Manner of Using Secure way of data storage in cloud computingEditor IJMTER
The major challenging issue in Cloud computing is Security. Providing Security is big issue
towards protecting data from third person as well as in Internet. This mainly deals the Security how it is
provided. Various type of services are there to protect our data and Various Services are available in Cloud
Computing to Utilize effective manner as Software as a Service (SaaS), Platform as a Service (PaaS),
Hardware as a Service (HaaS). Cloud computing is the use of computing resources (hardware and
software) that are delivered as a service over Internet network. Cloud Computing moves the Application
software and databases to the large data centres, where the administration of the data and services may not
be fully trustworthy that is in third party here the party has to get certified and authorized. Since Cloud
Computing share distributed resources via network in the open environment thus it makes new security
risks towards the correctness of the data in cloud. I propose in this paper flexibility of data storage
mechanism in the distributed environment by using the homomorphism token generation. In the proposed
system, users need to allow auditing the cloud storage with lightweight communication. While using
Encryption and Decryption methods it is very burden for a single processor. Than the processing
Capabilities can we utilize from Cloud Computing.
IT Solutions for 3 Common Small Business ProblemsBrooke Bordelon
Many time consuming IT problems can be side-stepped by establishing a solid network from the get-go rather than playing catch up with problems as they arise..find out how with these IT solutions.
Trust Your Cloud Service Provider: User Based Crypto ModelIJERA Editor
In Data Storage as a Service (STaaS) cloud computing environment, the equipment used for business operations
can be leased from a single service provider along with the application, and the related business data can be
stored on equipment provided by the same service provider. This type of arrangement can help a company save
on hardware and software infrastructure costs, but storing the company’s data on the service provider’s
equipment raises the possibility that important business information may be improperly disclosed to others [1].
Some researchers have suggested that user data stored on a service-provider’s equipment must be encrypted [2].
Encrypting data prior to storage is a common method of data protection, and service providers may be able to
build firewalls to ensure that the decryption keys associated with encrypted user data are not disclosed to
outsiders. However, if the decryption key and the encrypted data are held by the same service provider, it raises
the possibility that high-level administrators within the service provider would have access to both the
decryption key and the encrypted data, thus presenting a risk for the unauthorized disclosure of the user data. we
in this paper provides an unique business model of cryptography where crypto keys are distributed across the
user and the trusted third party(TTP) with adoption of such a model mainly the CSP insider attack an form of
misuse of valuable user data can be treated secured.
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMijiert bestjournal
The continuous development of cloud computing,seve ral trends are opening up to new forms of outsourci ng. Public data integrity auditing is not secure and efficient for shared dynamic data. In existing scheme figure out the collusion attack and provide an efficient public integrity au diting scheme,with the help of secure group user r evocation based on vector commitment and verifier�local revocation group signature. It provides secure and efficient s cheme which support public checking and efficient user revocati on. Problem of existing work they used TPA (Third p arty auditor) for key generation and key agreement. Use of TPA as central system if it fails then whole system gets failed. If we are working with cloud,user identity is major conc ern because user doesn�t want to reveal his persona l information to public. This concept not included in it. In this paper,based these con�s we proposed a dynamic dat a sharing in public cloud using multi-authority system. The prop osed scheme is able to protect user�s privacy again st each single authority. .
Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces database and application software to the large data centres, where the management of services and data may not be predictable, where as the conventional solutions, for IT services are under proper logical, physical and personal controls. This aspect attribute, however comprises different security challenges which have not been well understood. It concentrates on cloud data storage security which has always been an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent features. Homomorphic token is used for distributed verification of erasure – coded data. By using this scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the data management and services may not be absolutely truthful. This effective security and performance analysis describes that the proposed scheme is extremely flexible against malicious data modification, convoluted failures and server clouding attacks.
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces
database and application software to the large data centres, where the management of services and data
may not be predictable, where as the conventional solutions, for IT services are under proper logical,
physical and personal controls. This aspect attribute, however comprises different security challenges
which have not been well understood. It concentrates on cloud data storage security which has always been
an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and
efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent
features. Homomorphic token is used for distributed verification of erasure – coded data. By using this
scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and
secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to
traditional solutions, where the IT services are under proper physical, logical and personnel controls,
cloud computing moves the application software and databases to the large data centres, where the data
management and services may not be absolutely truthful. This effective security and performance analysis
describes that the proposed scheme is extremely flexible against malicious data modification, convoluted
failures and server clouding attacks.
Cloud Computing is the revolution in current generation IT enterprise. Cloud computing displaces database and application software to the large data centres, where the management of services and data may not be predictable, where as the conventional solutions, for IT services are under proper logical, physical and personal controls. This aspect attribute, however comprises different security challenges which have not been well understood. It concentrates on cloud data storage security which has always been an important aspect of quality of service (QOS). In this paper, we designed and simulated an adaptable and efficient scheme to guarantee the correctness of user data stored in the cloud and also with some prominent features. Homomorphic token is used for distributed verification of erasure – coded data. By using this scheme, we can identify misbehaving servers. In spite of past works, our scheme supports effective and secure dynamic operations on data blocks such as data insertion, deletion and modification. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the data management and services may not be absolutely truthful. This effective security and performance analysis describes that the proposed scheme is extremely flexible against malicious data modification, convoluted failures and server clouding attacks.
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
Cloud Computing is going to be very popular technology in IT enterprises. For any enterprise the data stored is very huge
and invaluable. Since all tasks are performed through network it has become vital to have the secured use of legitimate data. In cloud
computing the most important matter of concern are data security and privacy along with flexibility, scalability and fine grained access
control of data being the other requirements to be maintained by cloud systems Access control is one of the prominent research topics
and hence various schemes have been proposed and implemented. But most of them do not provide flexibility, scalability and fine
grained access control of the data on the cloud. In order to address the issues of flexibility, scalability and fine grained access control
of remotely stored data on cloud we have proposed the hierarchical attribute set-based encryption (HASBE) which is the extension of
attribute- set-based encryption(ASBE) with a hierarchical structure of users. The proposed scheme achieves scalability by handling the
authority to appropriate entity in the hierarchical structure, inherits flexibility by allowing easy transfer and access to the data in case
of location switch. It provides fine grained access control of data by showing only the requested and authorized details to the user thus
improving the performance of the system. In addition, it provides efficient user revocation within expiration time, request to view
extra-attributes and privacy in the intra-level hierarchy is achieved. Thus the scheme is implemented to show that is efficient in access
control of data as well as security of data stored on cloud with comprehensive experiments
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITYijccsa
Blockchain is widely used for money related transaction and still there are many proven usecases across
different industries like Retail in stock checks and order management, Manufacturing in good movement
processing, Health care in patient database management to name a few. With this in mind, it is always
important to understand the merits and demerits of both Public and Private Blockchain to understand their
capabilities and limitations to decide which one is more suitable for an industry specific usecase
implementation. In a Cloud based platform, data security plays a crucial role to cater to data protection
and regulatory requirements and Blockchain can play an important role in this for accelerated workflow
by providing ‘data security’ as a service capability.
CRITICISMS OF THE FUTURE AVAILABILITY IN SUSTAINABLE GENDER GOAL, ACCESS TO L...csijjournal
This paper begins with the understanding that criticizes in one of the Sustainable development gender
goal, “Undertake reforms to give women equal rights to economic resources, as well as access to
ownership and control over land and other forms of property ” under the Populations growth and
Climate Change. Because an increasing population generates a number of challenges for today and also
in the future world. According to the results of World Population Prospect 2015, world population
reached 7.3 billion as of mid-2015 and continually increasing to 11.2 billion in 2100, In the meanwhile
world tempter anticipated to increase between 2.6 RCP and 8.6 RCP, therefore, world average sea level
increase in between from 0.4m and 0.9 m in 2010 (IPCC,2014).as a reason world need to face negative
demographical change send of this century. According to gender goals, UN wants to increase the
women's new land access. but it generates the number of unsustainable results in future, because climate
change and population growth affected to huge density and land ownership problems. Therefore in this
paper criticized this Sustainable Development Goal and gender indicators, as same as discussed
technological and sustainable suggestions under the Populations growth and Climate Change.
Blockchain based Data Security as a Service in Cloud Platform Securityijccsa
Blockchain is widely used for money related transaction and still there are many proven usecases across different industries like Retail in stock checks and order management, Manufacturing in good movement processing, Health care in patient database management to name a few. With this in mind, it is always important to understand the merits and demerits of both Public and Private Blockchain to understand their capabilities and limitations to decide which one is more suitable for an industry specific usecase implementation. In a Cloud based platform, data security plays a crucial role to cater to data protection and regulatory requirements and Blockchain can play an important role in this for accelerated workflow by providing ‘data security’ as a service capability.
BLOCKCHAIN BASED DATA SECURITY AS A SERVICE IN CLOUD PLATFORM SECURITYijccsa
Blockchain is widely used for money related transaction and still there are many proven usecases across different industries like Retail in stock checks and order management, Manufacturing in good movement processing, Health care in patient database management to name a few. With this in mind, it is always important to understand the merits and demerits of both Public and Private Blockchain to understand their capabilities and limitations to decide which one is more suitable for an industry specific usecase implementation. In a Cloud based platform, data security plays a crucial role to cater to data protection and regulatory requirements and Blockchain can play an important role in this for accelerated workflow by providing ‘data security’ as a service capability.
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
In this study, survey questions were sent to different non-profit and government organizations, which
assisted in collecting fundamental information. The data was acquired by conducting surveys in OpenStack
Company to identify the critical vulnerabilities in the cloud computing platform in order to provide the
recommended solutions.
So, analysis will be made on how the cloud’s characteristics such as the nature of the architecture,
attractiveness, as well as, vulnerability are tightly related to privacy and security issues. Privacy and
security are complex issues for which there is no standard and the relationship between them is necessarily
complicated. The study also highlight on the inherent challenge to data privacy because it typically results
in data to be presented in an encryption from the data owner. Thus, the study aimed at obtaining a common
goal to provide a comprehensive review of the existing security and privacy issues in cloud environments,
and identify and describe the most representative of the security and privacy attributes and present a
relationship among them.
Finally, in order to ensure that the standard measure of validity is achieved, validity test was conducted in
order to ensure that the study is free from errors. Various recommendations were provided. The study also
explored various areas that require future directions for each attribute, which comprise of multi-domain
policy integration and a secure service composition to design a comprehensive policy-based management
framework in the cloud environments.
Lastly, the recommendations will provide the potential for security and privacy approaches that can be
implemented to improve the cloud computing environment to ensure that a level of trust is achieved
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
Cloud environment supports data sharing between multiple users. Data integrity is violated
due to hardware / software failures and human errors. Data owners and public verifiers are involved to
efficiently audit cloud data integrity without retrieving the entire data from the cloud server. File and
block signatures are used in the integrity verification process.
“One Ring to RUle Them All” (Oruta) scheme is used for privacy-preserving public auditing process. In
oruta homomorphic authenticators are constructed using Ring Signatures. Ring signatures are used to
compute verification metadata needed to audit the correctness of shared data. The identity of the signer
on each block in shared data is kept private from public verifiers. Homomorphic authenticable ring
signature (HARS) scheme is applied to provide identity privacy with blockless verification. Batch
auditing mechanism supports to perform multiple auditing tasks simultaneously. Oruta is compatible
with random masking to preserve data privacy from public verifiers. Dynamic data management process
is handled with index hash tables. Traceability is not supported in oruta scheme. Data dynamism
sequence is not managed by the system. The system obtains high computational overhead
The proposed system is designed to perform public data verification with privacy. Traceability features
are provided with identity privacy. Group manager or data owner can be allowed to reveal the identity of
the signer based on verification metadata. Data version management mechanism is integrated with the
system.
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
ANALYSIS OF THE COMPARISON OF SELECTIVE CLOUD VENDORS SERVICESijccsa
Cloud computing refers to a location that allows us to preserve our precious data and use computing and
networking services on a pay-as-you-go basis without the need for a physical infrastructure. Cloud
computing now provides us with powerful data processing and storage, exceptional availability and
security, rapid accessibility and adaption, ensured flexibility and interoperability, and time and cost
efficiency. Cloud computing offers three platforms (IaaS, PaaS, and SaaS) with unique capabilities that
promise to make it easier for a customer, organization, or trade to establish any type of IT business. We
compared a variety of cloud service characteristics in this article, following the comparing, it's
straightforward to pick a specific cloud service from the possible options by comparison with three chosen
cloud providers such as Amazon, Microsoft Azure, and Digital Ocean. By using findings of this study to not
only identify similarities and contrasts across various aspects of cloud computing, as well as to suggest
some areas for further study.
Review of Business Information Systems – Fourth Quarter 2013 V.docxmichael591
Review of Business Information Systems – Fourth Quarter 2013 Volume 17, Number 4
2013 The Clute Institute Copyright by author(s) Creative Commons License CC-BY 159
Dimensions Of Security Threats In Cloud
Computing: A Case Study
Mathew Nicho, University of Dubai, UAE
Mahmoud Hendy, University of Dubai, UAE
ABSTRACT
Even though cloud computing, as a model, is not new, organizations are increasingly
implementing it because of its large-scale computation and data storage, flexible scalability,
relative reliability, and cost economy of services. However, despite its rapid adoption in some
sectors and domains, it is evident from research and statistics, that security-related threats are the
most noticeable barrier to its widespread adoption. To investigate the reasons behind these
threats, the authors used available literature to identify and aggregate information about IS
security threats in cloud computing. Based on this information, the authors explored the
dimensions of the nature of threat by interviewing a cloud computing practitioner in an
organization that uses both the private and public cloud deployment models. From these findings,
the authors found that IS security threats in cloud computing must be defined at different levels;
namely, at the business and technical level, as well as from a generic and cloud-specific threat
perspective. Based on their findings, the authors developed the Cloud Computing Threat Matrix
(CCTM) which provides a two-dimensional definition of threat that enables cloud users to fully
comprehend the concerns so that they can make relevant decisions while availing cloud computing
services.
Keywords: Cloud Computing; Security; Cloud Security Issues Taxonomy; Threat Matrix
INTRODUCTION
ecause a cloud is a collection of inter-connected and virtualized computers (Buyya et al., 2008), the
main enabling technology for cloud computing is virtualization. The basic concept of cloud is based
on the premise that instead of having selected information systems (IS) resources, such as software
and data stored locally on a user’s or organization’s computer systems, these resources can be stored on Internet
servers, called “clouds,” and accessed anytime, anywhere as a paid service on the Internet. Cloud computing has the
potential to bring significant benefits to small- and medium-sized businesses by reducing the costs of investment in
information communication technology (ICT) infrastructure because it enables the use of services, such as
computation, software, data access, and storage by end-users, without the need to know the physical location and
configuration of the system that delivers the services (Mujinga & Chipangura, 2011). However, it has been stated
that organizations adopt cloud computing projects and systems cautiously while maximizing benefits and
minimizing risks (Lawler, Joseph, & Howell-Barber, 2012). Cloud computing is expected to play .
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
Deployment of using cloud services as a new approach to keep people's platforms, Infrastructure and applications has become an important issue in the world of communications technology. This is a very useful paradigm for humans to obtain their essential needs simpler, faster ,more flexible, and safer than before. But there are many concerns about this system challenge. Security is the most important challenge for cloud systems. In this paper we design and explain the procedure of implementation of a new method for cloud services based on multi clouds on our platform which supplies security and privacy more than other clouds. We introduce some confidentiality and security methods in each layer to have a secure access to requirements. The architecture of our method and the implementation of method on our selected platform for each layer are introduced in this paper.
Design and implement a new cloud security method based on multi clouds on ope...csandit
Deployment of using cloud services as a new approach to keep people's platforms,
Infrastructure and applications has become an important issue in the world of communications
technology. This is a very useful paradigm for humans to obtain their essential needs simpler,
faster ,more flexible, and safer than before. But there are many concerns about this system
challenge. Security is the most important challenge for cloud systems. In this paper we design
and explain the procedure of implementation of a new method for cloud services based on multi
clouds on our platform which supplies security and privacy more than other clouds. We
introduce some confidentiality and security methods in each layer to have a secure access to
requirements. The architecture of our method and the implementation of method on our selected
platform for each layer are introduced in this paper.
Crypto multi tenant an environment of secure computing using cloud sqlijdpsjournal
Today’s most modern research area of computing is cloud comput
ing due to its ability to diminish the costs
associated with virtualization, high availability, dynamic resource pools and increases the efficien
cy of
computing. But still it contains some drawbacks such as privacy, security, etc. This paper is thorou
ghly
focused on the security of data of multi tenant model obtains from the virtualization feature of clo
ud
computing. We use AES
-
128 bit algorithm and cloud SQL to protect sensitive data before storing in the
cloud. When the authorized customer arises for usag
e of data, then data firstly decrypted after that
provides to the customer. Multi tenant infrastructure is supported by Google, which prefers pushing
of
contents in short iteration cycle. As the customer is distributed and their demands can arise anywhe
re,
anytime so data can’t store at particular site it must be available different sites also. For this f
aster
accessing by different users from different places Google is the best one. To get high reliability a
nd
availability data is stored in encrypted befor
e storing in database and updated every time after usage. It is
very easy to use without requiring any software. This authenticate user can recover their encrypted
and
decrypted data, afford efficient and data storage security in the cloud.
Similar to AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) (20)
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
The Internet of Things (IoT) is a revolutionary concept that connects everyday objects and devices to the internet, enabling them to communicate, collect, and exchange data. Imagine a world where your refrigerator notifies you when you’re running low on groceries, or streetlights adjust their brightness based on traffic patterns – that’s the power of IoT. In essence, IoT transforms ordinary objects into smart, interconnected devices, creating a network of endless possibilities.
Here is a blog on the role of electrical and electronics engineers in IOT. Let's dig in!!!!
For more such content visit: https://nttftrg.com/
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS)
1. International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 8, No.1/2/3/4/5, October 2018
DOI: 10.5121/ijccsa.2018.8502 11
AUTHENTICATION SCHEME FOR DATABASE AS A
SERVICE(DBAAS)
KashifMunir and Lawan A. Mohammed
University of Hafr Al Batin, KSA
ABSTRACT
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend
companies are migrating business critical and sensitive data stored in database to cloud-hosted and
Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious
little attention has been paid to authentication in the cloud. In this paper we have designed a new effective
authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password,
whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for
DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the
authentication problem in cloud. The proposed solution which we have provided is based mainly on
improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized
or not. The results showed that this scheme is very strong and difficult to break it.
KEYWORDS
Cloud Computing, NoSQL, Database Security, DBaaS, Authentication Protocol,
1. INTRODUCTION
A mobile cloud approach enables developers to build applications designed specifically for
mobile users without being bound by the mobile operating system and the computing or memory
capacity of the mobile device. Mobile cloud computing servicesare generally accessed via a
mobile browser from a remote webserver, typically without the need for installing a client
application on the recipient device.
Now, many mobile applications are developed based on mobile databases on devices and
conventional databases. Database authentication is the process or act of confirming that a user
who is attempting to log in to a database is authorized to do so, and is only accorded the rights to
perform activities that he or she has been authorized to do.
Database as a Service or simply DBaaS provides professional databases that can get running and
ready in a matter of minutes without a lot of training or personnel effort. A service provider
chooses most of the options, offering the “best” configuration for most needs.While individual
systems can become unique “snowflake” servers, DBaaS tends to avoid that by simplifying and
normalizing the customization, management, and upkeep for administrators. Overall, the service
makes it easier to solve problems, correct mistakes, and transfer data from one system to the next.
They can scale as large as necessary, fit the needs of the customers, and offer better availability
and security than most in-house operations.
DBaaS is also accessible to a larger audience because, like other “as a service” cloud innovations,
it is largely defined, configured, and driven by code—not commands typed into a terminal. So,
instead of requiring database specialists, developers themselves can easily create and manage
database-backed apps on cloud-based development platforms.
2. International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 8, No.1/2/3/4/5, October 2018
12
DBaaS isalready responsible for much of the growth in some key technologies, particularly open-
source databases like MySQL. In other words, traditional database deployment is somewhat
stagnant, and most new deployments are DBaaS.The demand is so high that some tech giants
started offering a managed “as a service” version of their own (Schwartz, 2015).
DBaaS provides automated services where consumers can request database-oriented
functionalities from a dedicated service hosted on Cloud. The model is end user driven and
provides self-service provisioning. It is based on architectural and operational approach (Oracle,
2011), which provides new and distinctive ways of using and managing database services. There
are many other database services which are available today but DBaaS differs from those
traditional databases because its architecture has two major attributes (Oracle, 2011): 1).Service-
orientated as database facilities are available in the form of service and 2). Customer self-service
interaction model as organizations are allowed to use, configure and deploy the Cloud database
services themselves without any IT support and without purchasing any hardware for specified
purpose. These are the three main phases in the overall DBaaS architecture as depicted in Figure
1 below.
i. Consumers request the database deployment via Cloud.
ii. Consumers adjust the capacity as demand changes.
iii. Consumers can retire from the app when not needed.
Figure 1. Cloud DBaaS (Krishna & Roger, 2012)
2. LITERATURE REVIEW
Threats and vulnerabilities are a foremost challenge in the field of cloud computing. To address
these challenges and to provide security and privacy (Ruchika&Rajarathnam, 2016). present a
Software-as-a-Service (SaaS) application with a data model with built-in security and privacy.
This data model enhances security and privacy of the data by attaching security levels in the data
itself expressed in the form of XML instead of relying entirely on application level access
controls. Similarly, a survey of different vulnerability attacks on cloud virtualization was
performed in (Titin &Ugrasen, 2016), They also presents a concept for the removal of Cross Site
Scripting (XSS) vulnerabilities to secure the cloud environment.
A Secure Data Transmission Mechanism (SDTM) was proposed in (Abdullah et., al., 2013). The
authors developed SDTM enhanced with Malicious Packets Detection System (MPDS) which is a
set of technologies and solutions. It enforces security policy and bandwidth compliance on all
devices seeking to access Cloud network computing resources, in order to limit damage from
emerging security threats and to allow network access only to compliant and trusted endpoint
devices.
Luca et al.(2012), advised against using any intermediary component for accessing the database
on behalf of the clients, since it becomes a single point of failure. Security and availability of
DBaaS services are bounded by this trusted intermediary proxy server.
Conget al. (2013)proposed a similar approach which puts forth an idea of using third party
auditors. This approach is suitable for preserving data integrity when data is outsourced to the
DBaaS providers and users get access on-demand high quality services without facing
maintenance burden of local data storage.
Request
Database
deployment via
Retire App
when not
needed
Adjust capacity
as demand
changes
3. International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 8, No.1/2/3/4/5, October 2018
13
Jia et al.(2011) presents framework for secure data service with proxy re-encryption (PRE)
scheme and identity based encryption (IDE) scheme .In this scheme, privacy of user is
secured as the cryptography of data is done by user but it increases the energy and
processing requirement of mobile device.
Huangs et al.(2011) proposed framework for authentication on MobiCloud, to achieve secure data
processing.Similarly, Hsueh et al.(2011) proposed authentication mechanism in which mobile
device encrypts the credential information file and stores it on cloud but infected cloud
server can steal the user credential information by decrypting user’s files.Recently, a
comprehensive study of authentication methods in Mobile Cloud Computing (MCC) was
presented in (Mojtaba etal., 2016). The aim was to describe MCC authentication and compare it
with that of cloud computing. The taxonomy of the state-of-the-art authentication methods is
devised and the most credible efforts are critically reviewed. Moreover, the authors present a
comparison of the state-of-the-art MCC authentication methods considering five evaluation
metrics. The results suggest the need for futuristic authentication methods that are designed based
on capabilities and limitations of MCC environment. Finally, the design factors deemed could
lead to effective authentication mechanisms are presented, and open challenges are highlighted
based on the weaknesses and strengths of existing authentication methods.
Additionally, (Nithiavathy 2013) proposed integrity auditing mechanism that utilizes distributed
erasure-coded data for employing redundancy and homomorphic token. This technique allows
third party auditors and users to audit their logs and events at Cloud storage using light weight
communication protocol at less computation cost.
Ferretti et al. (2012) advised against using any intermediary component for accessing the database
on behalf of the clients, since it becomes a single point of failure. Security and availability of
DBaaS services are bounded by this trusted intermediary proxy server.
Similarly, (Qingji et al.(2012) investigated the issues of query integrity and a solution was
proposed. The solution allows users to verify executed queries in Cloud database server along
with the additional support of flexible join and aggregate queries. And, the solution proposed by
(Maciej et al., 2013) covers data key management, data encryption and data integrity which
ensure high data security and access efficiency.
Risk issues and challenges were presented in (Mouna&Latifa, 2012). The authors show how to
solve these problems using a quantitative security risk assessment model named Multi-
dimensional Mean Failure Cost (M2FC). Their scheme takes advantages of both Secret Sharing
and Tornado code which can achieve the computational security and maintain low
communication overhead in terms of shortened data dispersing size. The authors’ model gives
probabilistic proofs of Integrity of data by challenging random blocks from the server to reduce
the computation and communication overhead, and also supports dynamic data operations to data
shares in cloud using index table. Similar study was conducted in (Thamer, 2015), the authors
highlight the different types of risks issues involved and how their existence can affect Global
Software Development or simply GSD. They propose a new risk management process model.
The risk model employs new processes for risk analysis and assessment. Its aim is to analyze
cloud risks quantitatively and, consequently, prioritize them according to their impact on GSD
objectives
General discussion of issues related to the data security management are explained in
(Mohammed et al,. 2015). The authors present a proposed multi-cloud data management model
called Byzantine Fault Tolerance Multi-Clouds Database (BFT-MCDB). The proposed BFT-
MCDB model incorporates the Quantum Byzantine Agreement protocol and Shamir’s Secret
Sharing approach to secure business data storage in a multicloud environment.
4. International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 8, No.1/2/3/4/5, October 2018
14
3. DATABASE-AS-A-SERVICE(DBAAS)
Database-as-a-Service (DBaaS) is a service that is managed by a cloud operator (public or
private) that supports applications, without the application team assuming responsibility for
traditional database administration functions. With a DBaaS, the application developers donot
need to be database experts, nor dothey have to hire a database administrator (DBA) to maintain
the database Qingji et al. (2012)..DBaaS is a prime example of a service that’s both exciting and
at the same time full of difficult security issues.
Cloud providers want to offer the DBaaS service described above. In order to provide a complete
DBaaS solution across large numbers of customers, the cloud providers need a high-degree of
automation. Function’s that have a regular time-based interval, like backups, can be scheduled
and batched. Many other functions, such as elastic scale-out can be automated based on certain
business rules. For example, providing a certain quality of service (QoS) according to the service
level agreement (SLA) might require limiting databases to a certain number of connections or a
peak level of CPU utilization, or some other criteria. When this criterion is exceeded, the DBaaS
might automatically add a new database instance to share the load. The cloud provider also needs
the ability to automate the creation and configuration of database instances Maciej et al. (2013).
Cloud operators are required to work on hundreds, thousands or even tens of thousands of
databases at the same time. This requires automation. In order to automate these functions in a
flexible manner, the DBaaS solution must provide an API to the cloud operator Hacigumus et al.
(2012)The ultimate goal of a DBaaS is that the customer doesn’t have to think about the database.
Today, cloud users don’t have to think about server instances, storage and networking, they just
work. Virtualization enables clouds to provide these services to customers while automating
much of the traditional pain of buying, installing, configuring and managing these capabilities.
Now database virtualization is doing the same thing for the cloud database and it is being
provided as Database as a Service (DBaaS). The DBaaS can substantially reduce operational
costs and perform well. It is important to realise that the goal of DBaaS is to make things easier.
Cloud Control Database as a Service (DBaaS) provides:
1. A shared, consolidated platform on which to provision database services
2. A self-service model for provisioning those resources
3. Elasticity to scale out and scale back database resources
4. Chargeback based on database usage
The aggressive consolidation of information technology (IT) infrastructure and deployment of
Database as a Service (DBaaS) on public or private clouds is a strategy that many enterprises are
pursuing to accomplish these objectives. Both initiatives have substantial implications when
designing and implementing architectures for high availability and data protection. Database
consolidation and DBaaS also drive standardization of I.T. infrastructure and processes.
Standardization is essential for reducing cost and operational complexity. Databases deployed in
the Bronze tier include development and test databases and databases supporting smaller work
group and departmental applications that are often the first candidates for database consolidation
and for deployment as Database as a Service (DBaaS).
Bronze is based upon single instance Oracle Databasewith Oracle Restart for auto-restart
following recoverable outages. When a machinebecomes unusable or the database unrecoverable,
the recovery time objective (RTO) is a function of how quickly a replacement system can be
provisioned or a backup restored. In a worst case scenario of a complete site outage there will be
additional time required to perform these tasks at a secondary location(Oracle, 2016).
4. SECURITY CHALLENGES TO DATABASE-AS-A-SERVICE(DBAAS)
Cloud computing and the notion of large-scale data-centers will become a pervasive technology
in the coming years. There are some technology hurdles that we confront in deploying
5. International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 8, No.1/2/3/4/5, October 2018
15
applications on cloud computing infrastructures: DBMS scalability and DBMS security. In this
paper, we will focus on the problem of making DBMS technology cloud friendly. In fact, we will
argue that the success of cloud computing is critically contingent on making DBMSs scalable,
elastic, available, secure and autonomic, which is in addition to the other well-known properties
of database management technologies like high-level functionality, consistency, performance, and
reliability.In table 1 security challenges of DBaaS infrastructure along with their consequences
and causes has been highlighted (Munir, 2015).
Table 1. Cloud DBaaS Security Challenges(Munir, 2015)
No. Security
Challenge
Description
1 Availability • Temporary and permanent unavailability cause service breakdown
• DOS Attacks, natural disasters, equipment failure
2 Access Control
Issues
• Physical, personnel and logical control missing on organization’s internal
and DBaaS Provider’s employees
• Increase development and analysis cost is incurred when user
management and granular access control is implemented
3 Integrity Check • Need to avoid modification of configuration, access and data files
• Require accuracy and integrity of data
4 Auditing and
Monitoring
• Configuration requirements change continuously
• Important for avoiding failures, backup maintenance, configuration of
auto fail-over mechanisms
• Require stark network and physical device , expertise and relevant
resources
5 Data Sanitization • Recovery of data by malicious sources if not properly discarded
6 Data
Confidentiality
• Unencrypted data in memory, disk or in network may cause data breaches
• Co-located application data is vulnerable to software bugs and errors in
the Cloud
• External organizations might also generate attacks
7 Data Replication
and Consistency
Management
• Replications between multiple servers cause management as well as
consistency issues
8 Network Security • Data flowing over the network (internet) is prone to hazardous
circumstances and network performance issues.
• Possible network failure reasons are: misconfiguration, lack of resource
isolations, poor or untested business continuity, disaster recovery plan, network
traffic modification
9 Data Locality • Compliance and data-security privacy laws prohibit movement of
sensitive data among countries
• Issues faced when no one takes responsibility of data in location
independent data storage
10 Data Provenance • Complexity and time sensitiveness in provenance metadata
• Intensive computations involved in getting required history
• Fast algorithms, auto logs are needed
11 Insider Threats • Employees can tap into sensitive and confidential data
• Strict supply chain management and assessment is required
12 Outside
Malicious
Attackers
• Malicious attacks by hackers
• Difficulty in synchronizing data between users and reporting corruption
• Absence of authentication, authorization and accounting controls
• Poor key management for encryption and decryption
6. International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 8, No.1/2/3/4/5, October 2018
16
5. PROPOSED SECURITYMODEL
DBaaS Security Placing a database in the cloud significantly changes its security threat
landscape. While many of the traditional on-premises risks remain-data leakage risk from
privileged users with access to the data, the presence of unidentified sensitive data and SQL
injection attacks are some examples-the cloud introduces its own additional risks. On the other
hand, there are ways to leverage the cloud by outsourcing some of the risk mitigation to the cloud
provider. For example, physical access security and OS security is always the responsibility of the
DBaaS provider.
To date, there is minimal work done in the field of security and privacy of DBaaS as compared to
traditional data storage. Different approaches for securing DBaaS are discussed under this section
with assorted categories of confidentiality, privacy, integrity and availability.
Figure 2. Secure Model for Cloud DBaaS( Munir, 2015)
State-of-the-art approaches mainly address generally adopted methods for their proposed models.
Those methods are:Encryption based data security, which means hiding data content from service
providers. Private information retrieval, which allows user to retrieve an item from the data server
without revealing the content of that item. Information distribution, which is based on dispersing
information instead of encrypting the data.
The model shown in figure 2 used Four-layer system structure, in which each layerperforms its
own duty to ensure the data security of cloud layers.The first layer (User Interface Layer)
isresponsible for user authentication; it is one time password authentication. User Interface Layer
is used to access the service via internet. This allows users to easily utilize scalable and elastic
database services available on Cloud infrastructure. The second layer (Application Layer) is used
to access software services and storage space on the Cloud. As stated previously, consumers do
not need to have hardware resources to accessthese services.Third layer (Database Layer)
provides efficient and reliable service of managing database residing in the Cloud. It allows reuse
of the query statements residing in the storage, thus saving time for querying and loading data.
Fourth layer is data storage layer where Data is encrypted and decrypted at storage and retrieval
stages, respectively. Data integrity and data recovery is also provided at this layer.
In the proposed model, a central console is responsible for the management of the resources.
Taking backups, archiving and recovering data are now more feasible and less time-consuming
because of these available features. Condition Monitoring Error detects significant changes that
cause errors in storing and managing data. Storage layer also provides data management services,
such as traffic analysis, compression, virtualization, security, and replication etc., through the use
of tools, policies and processes. This layer also provides database upgrades when some major
User Interface
Layer
Single Sign-
on (SSO)
Authenticatio
n
Application
Layer
Data
Upload
Web
Server
Access
Control
Database
Layer
Cloud Data
Storage
Data Storage
Layer
Data
Encryption
Data Integrity
Data
Recovery
7. International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 8, No.1/2/3/4/5, October 2018
17
changes are made in the database structure or between different releases. Our solution is based on
improved Needham-Schroeder Protocol as described below.
6. IMPROVED NEEDHAM-SCHROEDER PROTOCOL
Needham-Schroeder protocol is one of the most popular authentication protocols that involve two
participants. The protocol uses public-key to achieve authentication between the two participants
with the help of authentication center. It is regarded as the seminal protocol for public-key
authentication and has been used as the model for most key encryption systems to date.
The proposed system is used to secure the link between the User (U), Sever (S), and the
certification authority (CA). The Certification Authority is assumed to be trusted by all the parties
involved in the communication. CA has pairs of public key and secret key (PCA, SCA) and a
session key shared with users (U) and the server (S) KU and KS respectively. A certificate and a
session key are issued to every user at the time of subscription;the certificate contains ID and
some credentials about the server signed by CA while the session keys must be changed from
time to time. Furthermore, since the S is partially trusted by the CA, it is good enough if S can act
as a mediator between U and CA while CA acts as an authenticator.
When describing the protocols, we use the following abstract notation:
U: User
S: Server
CA: Certification Authority
PCA CA’s Public Key
SCA CAs Secret Key
KU Session Key (shared session key between U and CA)
KS Session Key (shared session key between S and CA)
PS S’s Public Key
PU U’s Public Key
Un Nonce generated by U
Sn Nonce generated by S
The process of authentication in the protocol is as follows:
1. U ⇒ CA: PS (U request S’s public-key from CA)
2. CA ⇒ U:{KS, PS}SCA (CA sends S’s public-key and ID to U, singed it with its digital
signature)
3. U⇒S: {Un, PU}KS ( U sends a nonce and its ID to S)
4. S⇒CA: PU (S request U’s public-key from CA)
5. CA ⇒ S: {KU, PU}PCA (CA sends U’s public-key and ID to S)
6. S⇒U: {Un, Sn}KU (S generates a nonce and forward it together with U’s nonce
encrypting the message with U’s public-key)
7. U⇒S: {Sn}KS (U sends back S’s nonce to S encrypted under S’s public-key)
According to (Burrows, 1990), Un, and Sn serve not only as nonces, but also as authentication. It
was discovered by Lowe (1995) that the protocol is vulnerable to attack. Assuming an intruder T
is masquerading, a simple example is given below.
8. International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 8, No.1/2/3/4/5, October 2018
18
The following additional notations will be used:
T: Intruder (pretending to be S)
KT Session Key (shared session key between T and CA)
PT T’s Public Key
KUC Shared Session Key (between U and CA encrypted with CA private key)
Un1 First Nonce generated by U
Un2 Second Nonce generated by U
Sn1 First Nonce generated by S
Sn2 Second Nonce generated by S
3(a). U ⇒ T: {Un, PT}KT(U initiate communication with T)
3(b). T⇒S:{Un, PT}KS (T initiate communication with S using Un)
6(a). S ⇒ U: {Un, Sn}KU (S responds to U)
7(a). U⇒ T: {Sn}KT(U thinking that the previous message is a response from T, T now can get Sn
to impersonate S)
7(b) T ⇒S: {Sn}KS(T complete the protocol with S)
If Un and Sn are used as authentication, T now has the ability to impersonate U to S for the rest of
the session, although T cannot read messages encrypted under S’s key. Even if digital signature
are used for authentication, and T cannot impersonate U, T has still manage to get U and S in an
inconsistent state in which S thinks that U has initiate communication with it when in fact it has
not. The attack on Needham-Schroeder’s protocol is depicted in figure 3 below.
Figure 3. Attack on Needham-Schroeder’s Protocol(Munir,K. 2019)
We have shown that Needham-Schroeder’s protocol is vulnerable to impersonation by
intruder T. We will now solve the problem and show how it can be implemented in our
scheme. The improved protocol can be summarized in the following 7 steps and figure 4
below:
9. International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 8, No.1/2/3/4/5, October 2018
19
Figure 4. Improved Needham-Schroeder’s Protocol(Munir,K. 2019)
1. U ⇒ CA:{TB , PT, Un1)PCA
2. CA ⇒ U:{(Un1, KS, TS)SCA}KUC
3. U⇒S: {Un2, PT}KS
4. S⇒CA: {TS, Sn1, PT} PCA
5. CA ⇒ S: {(Sn1, KU, PT)SCA }KS
6. S⇒U: {TS, Un2, Sn2}KU
7. U⇒S: {Sn2}KS
7. EXPLANATION
Note that step 1 and 2 will prevent T from misleading U since they are encrypted with CA
private key and a shared key between U and CA (KUC) hence, T cannot see the ID of S
and hence cannot forward message 3(b) to S. In fact, even if message T was encrypted
with T’s public key instead of PCA, T will not be able to generate KUC since the key is
only shared between U and CA. Sending messages 3(a) and 3(b) will not do any harm to
the protocol unless T can send a nonce equivalent to Sn1 in step 4, and this is impossible
due to the random property of nonces even if T manage to get an old nonce sent by S. The
use of noncesUn1, Un2, Sn1, Sn2 will ensure privacy and protect both S and U from reply
attack by T. Messages in steps 5, 6, and 7 can only be decrypted by S and U accordingly,
therefore even if T can get the messages he/she cannot decrypt the content. The overall
protocol is given in the Figure 4above.
8. CONCLUSION
In this paper, we have presented authentication scheme for DBaaS. We have described its
components, discussed existing solutions and identified possible approaches to deal with
different security issues related to the DBaaS. In our scheme, a new authentication
protocol by using Needham-Schroeder protocol is proposed. In comparison with
Needham-Schroeder’s scheme, this scheme withstands some of the limitations associated
with the Needham’s scheme to avoid popular attacks including replay attack, and
impersonation attack, and also this scheme is efficient in terms of communication and
computation cost.Database as a Service (DBaaS) is an increasingly popular Cloud service
model, with attractive features like scalability, pay-as-you-go model and cost reduction
that make it a perfect fit for most organizations. However, no extensive research work has
10. International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 8, No.1/2/3/4/5, October 2018
20
been done which meticulously covers each and every aspect of DBaaS. Data storage
security in Cloud is a domain which is full of challenges and is of paramount importance
as customers do not want to lose their data at any cost. There is a need for effective
strategies, proper measurements and methodologies to control this problem by having
mature practices in the form of secure architectures to make DBaaS platform more
secure, and ultimately, widely-adopted.
9. FUTURE RESEARCH
The desired work to be done in future is an attempt to remove other two well-known
possible attacks on Needham-Schroeder protocol; these attacks are, server spoofing
attack and stolen-verifier attack on the protocol. The spoofing attack is when an intruder
impersonates another device, server or user on a network in order to
launch attacks against network hosts, steal data, spread malware or bypass access
controls. There are several different types of spoofing attacks that malicious parties can
use to accomplish this. While stolen-verifier attack (SV attack) is when an adversary
steals verification data from the server in the current or past authentication sessions.
Here, the verification data does not include secret keys used with XOR operation or an
encryption function. She/he generates communication data using the stolen data and
sends them to the server. If it succeeds, she/he impersonates a legal user from the next
authentication session.
REFERENCES
[1] Munir K. (2019) Authentication Model for Mobile Cloud Computing Database Service. In: Zbakh M.,
Essaaidi M., Manneback P., Rong C. (eds) Cloud Computing and Big Data: Technologies,
Applications and Security. CloudTech 2017. Lecture Notes in Networks and Systems, vol 49.
Springer, Cham
[2] Schwartz, B. (2015, October 15). How to choose a DBaaS for Database Management. Retrieved from
http://readwrite.com/2015/10/05/database-as-a-service-tips-choosing-dbaas/ 2016, November 05).
[3] Oracle Corporation,(2011). Database as a Service: Reference Architecture – An Overview.
[4] Krishna, K., Roger, L. (2012).Database as a Service (DBaaS) using Enterprise Manager 12c,Oracle
Open World.
[5] Luca, F., Michele, C., &Mirco, M. (2012). Supporting security and consistency for Cloud database,
Cyberspace Safety and Security:Lecture Notes in Computer Science, Volume 7672, pp. 179-193.
[6] Cong, W., Sherman, S.M.C., Qian, W., Kui, R., &Wenjing, L. (2013). Privacy Preserving Public
Auditing for Secure Cloud Storage, IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 2,
pp. 362-375.
[7] Jia, W., Zhu, H., Cao, Z., Wei, L.,&Lin, X. (2011). SDSM: a securedata service mechanism imobile
cloud computing:ProceedingIEEE Conference on Computer Communications Workshops,
INFOCOM WKSHPS, Shanghai, China.
[8] Huang, D., Zhou, Z., Xu, L.,Xing, T.,&Zhong, Y. (2011). Secure data processing framework for
mobilecloud computing:Proceeding IEEE INFOCOM Workshop on Cloud Computing, INFOCOM
’11, Shanghai, China.
11. International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 8, No.1/2/3/4/5, October 2018
21
[9] Hsueh, S.C., Lin, J.Y.,&Lin, M.Y. (2011). Secure cloud storage for conventional data archive of
smart phones:Proceeding 15th IEEE International Symposium on Consumer Electronics ,ISCE ’11,
Singapore.
[10] Nithiavathy, R. (2013). Data Integrity and Data Dynamics with Secure Storage Service in
Cloud:Proceedings of the 2013 International Conference on Pattern Recognition, Informatics and
Mobile Engineering, IEEE,pp. 125-130.
[11] Qingji, Z., Shouhuai, X., &Giuseppe, A. (2012). Efficient Query Integrity for Outsourced Dynamic
Databases, CCSW’12, Raleigh, North Carolina, USA.
[12] Ferretti, L., Colajanni, M., &Marchetti, M. (2012). Supporting security and consistency for Cloud
database, Cyberspace Safety and Security:Lecture Notes in Computer Science Volume 7672, pp. 179-
193.
[13] Maciej, B., Gracjan, J., Michał, J., Stanisław, J.,Tomasz, J., Norbert, M., Rafal, M., Adam,
Z.&Sławomir, Z. (2013).National Data Storage 2: Secure Storage Cloud with Efficient and Easy.
Data Access.
[14] Hacigumus, H., Iyer, B., Li, C.,Mehrotra,S. (2004). Efficient Execution of Aggregation Queries over
Encrypted Relational Databases:Proc. of the 9th International Conference on Database Systems for
Advanced Applications (DASFAA’04),Jeju Island, Korea, pp. 125–136.
[15] Oracle (2016).Oracle MAA Reference Architectures. Retrieved October 30, 2016, from
http://www.oracle.com/technetwork/database/availability/maa-reference-architectures-2244929.pdf
[16] Lowe, G. (1995). An Attack on the Needham-Schroeder Public-Key Protocol: Information processing
Letters, Vol 56, pp. 131-133
[17] Munir, K. (2015). Security Model for Cloud Database as a Service (DBaaS): IEEE Proceedings of the
International Conference on Cloud Computing Technologies and Applications - CLOUDTECH
2015,. pp. 1-5, ISBN : 978-1-4673-8148-2
[18] Hexatier Survey. (2016).Database as a Service (DBaaS) Security Research 2016. .Retrieved
November 05, 2016, from https://cdn2.hubspot.net/hubfs/1759710/Hexatier-Survey-2016.pdf
[19] Al-Rousan, T. (2015). Cloud Computing for Global Software Development:Opportunities and
Challenges. International Journal of Cloud Applications and Computing, 5(1), 58-68
[20] Jouini,M. &Rabai, L. (2012). A Security Framework for SecureCloud Computing
Environments.International Journal of Cloud Applications and Computing, 2(3), 1-25,
[21] Asija, R &Nallusamy, R. (2016). Healthcare SaaS Based on a Data Model with Built-In Security and
Privacy.International Journal of Cloud Applications and Computing, Volume 6, Issue 3
[22] Nagar, N &Suman, U. (2016). Analyzing Virtualization Vulnerabilitiesand Design a Secure Cloud
Environment to Prevent from XSS Attack.International Journal of Cloud Applications and
Computing.Volume 6, Issue 1
[23] Alhaj, A., Aljawarneh, S., Masadeh,S,. &Abu-Taieh, E. (2013). A Secure Data Transmission
Mechanism for Cloud Outsourced Data. 3(1), 34-43
[24] Alizadeh, M.,Abolfazli, S., Zamani, M.,Baharun, S., Sakurai, K.,(2016). Authentication in mobile
cloud computing: A survey.Journal of Network and Computer Applications, Volume 61, Pages 59-80.
[25] Mohammed A. A., Alice S. Li, Ben, S.,, &Eric, P., .Multi-Cloud Data Management using Shamir’s
Secret Sharing and Quantum Byzantine Agreement Schemes.International Journal of Cloud
Applications and Computing, 5(3), 35-52.
12. International Journal on Cloud Computing: Services and Architecture (IJC
AUTHORS
KashifMunir received his BSc degree in Mathematics and Physics from Islamia
University Bahawalpur, Pakistan in 1999. He received his MSc degree in Information
Technology from University Sains Malaysia in 2001. He also obtained another MS
degree in Software Engineering from University of Malaya, Malaysia in 2005. He
completed his PhD in Informatics from Malaysia University of Science and
Technology, Malaysia. His research interests are in the areas of Cloud Computing
Security, Software Engineering, and Project Manageme
conference papers and book chapters.
KashifMunir has been in the field of higher education since 2002. After an initial teaching experience with
courses in Stamford College, Malaysia for around four years, he later relocated
with King Fahd University of Petroleum and Minerals, KSA from September 2006 till December 2014. He
moved into University of Hafr Al-Batin, KSA in January 2015.
KashifMunir is a researcher and published author/editor of 4 books
such as Security in Cloud Computing, Mobile Cloud and Green Enterprises,
(https://www.amazon.com/Kashif-Munir/e/B079KP1LFJ).
Lawan A. Mohammad, Holds a PhD degree in computer and communication systems engineering fro
University Putra Malaysia. Research interest include smartcard security, authentication protocols, wireless
and mobile security, biometrics, mathematical programming and e
International Journal on Cloud Computing: Services and Architecture (IJCCSA) Vol. 8, No.1/2/3/4/5, October 2018
received his BSc degree in Mathematics and Physics from Islamia
University Bahawalpur, Pakistan in 1999. He received his MSc degree in Information
Technology from University Sains Malaysia in 2001. He also obtained another MS
g from University of Malaya, Malaysia in 2005. He
completed his PhD in Informatics from Malaysia University of Science and
Technology, Malaysia. His research interests are in the areas of Cloud Computing
Security, Software Engineering, and Project Management. He has published journal,
conference papers and book chapters.
KashifMunir has been in the field of higher education since 2002. After an initial teaching experience with
courses in Stamford College, Malaysia for around four years, he later relocated to Saudi Arabia. He worked
with King Fahd University of Petroleum and Minerals, KSA from September 2006 till December 2014. He
Batin, KSA in January 2015.
KashifMunir is a researcher and published author/editor of 4 books on cloud computing including subjects
such as Security in Cloud Computing, Mobile Cloud and Green Enterprises,
Munir/e/B079KP1LFJ).
, Holds a PhD degree in computer and communication systems engineering fro
University Putra Malaysia. Research interest include smartcard security, authentication protocols, wireless
and mobile security, biometrics, mathematical programming and e-learning
CSA) Vol. 8, No.1/2/3/4/5, October 2018
22
KashifMunir has been in the field of higher education since 2002. After an initial teaching experience with
to Saudi Arabia. He worked
with King Fahd University of Petroleum and Minerals, KSA from September 2006 till December 2014. He
on cloud computing including subjects
such as Security in Cloud Computing, Mobile Cloud and Green Enterprises,
, Holds a PhD degree in computer and communication systems engineering from
University Putra Malaysia. Research interest include smartcard security, authentication protocols, wireless