This paper begins with the understanding that criticizes in one of the Sustainable development gender
goal, “Undertake reforms to give women equal rights to economic resources, as well as access to
ownership and control over land and other forms of property ” under the Populations growth and
Climate Change. Because an increasing population generates a number of challenges for today and also
in the future world. According to the results of World Population Prospect 2015, world population
reached 7.3 billion as of mid-2015 and continually increasing to 11.2 billion in 2100, In the meanwhile
world tempter anticipated to increase between 2.6 RCP and 8.6 RCP, therefore, world average sea level
increase in between from 0.4m and 0.9 m in 2010 (IPCC,2014).as a reason world need to face negative
demographical change send of this century. According to gender goals, UN wants to increase the
women's new land access. but it generates the number of unsustainable results in future, because climate
change and population growth affected to huge density and land ownership problems. Therefore in this
paper criticized this Sustainable Development Goal and gender indicators, as same as discussed
technological and sustainable suggestions under the Populations growth and Climate Change.
A robust and verifiable threshold multi authority access control system in pu...IJARIIT
Attribute-based Encryption is observed as a promising cryptographic leading tool to assurance data owners’ direct
regulator over their data in public cloud storage. The former ABE schemes include only one authority to maintain the whole
attribute set, which can carry a single-point bottleneck on both security and performance. Then, certain multi-authority
schemes are planned, in which numerous authorities distinctly maintain split attribute subsets. However, the single-point
bottleneck problem remains unsolved. In this survey paper, from another perspective, we conduct a threshold multi-authority
CP-ABE access control scheme for public cloud storage, named TMACS, in which multiple authorities jointly manage a
uniform attribute set. In TMACS, taking advantage of (t, n) threshold secret allocation, the master key can be shared among
multiple authorities, and a lawful user can generate his/her secret key by interacting with any t authorities. Security and
performance analysis results show that TMACS is not only verifiable secure when less than t authorities are compromised, but
also robust when no less than t authorities are alive in the system. Also, by efficiently combining the traditional multi-authority
scheme with TMACS, we construct a hybrid one, which satisfies the scenario of attributes coming from different authorities as
well as achieving security and system-level robustness.
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
Cloud Computing is going to be very popular technology in IT enterprises. For any enterprise the data stored is very huge
and invaluable. Since all tasks are performed through network it has become vital to have the secured use of legitimate data. In cloud
computing the most important matter of concern are data security and privacy along with flexibility, scalability and fine grained access
control of data being the other requirements to be maintained by cloud systems Access control is one of the prominent research topics
and hence various schemes have been proposed and implemented. But most of them do not provide flexibility, scalability and fine
grained access control of the data on the cloud. In order to address the issues of flexibility, scalability and fine grained access control
of remotely stored data on cloud we have proposed the hierarchical attribute set-based encryption (HASBE) which is the extension of
attribute- set-based encryption(ASBE) with a hierarchical structure of users. The proposed scheme achieves scalability by handling the
authority to appropriate entity in the hierarchical structure, inherits flexibility by allowing easy transfer and access to the data in case
of location switch. It provides fine grained access control of data by showing only the requested and authorized details to the user thus
improving the performance of the system. In addition, it provides efficient user revocation within expiration time, request to view
extra-attributes and privacy in the intra-level hierarchy is achieved. Thus the scheme is implemented to show that is efficient in access
control of data as well as security of data stored on cloud with comprehensive experiments
This document discusses security issues related to cloud computing. It begins with an introduction to cloud computing models including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It then discusses potential security attacks to clouds like denial of service attacks and man-in-the-middle attacks. Security concerns with moving data and applications to the cloud are outlined. Techniques for securely publishing data in the cloud are also presented. The document concludes that security in cloud computing is challenging due to the complexity of clouds but that assurance of secure and mission-critical operations is important.
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend companies are migrating business critical and sensitive data stored in database to cloud-hosted and Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious little attention has been paid to authentication in the cloud. In this paper we have designed a new effective authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password,
whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the authentication problem in cloud. The proposed solution which we have provided is based mainly on improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized or not. The results showed that this scheme is very strong and difficult to break it.
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE (DBAAS)ijdpsjournal
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend companies are migrating business critical and sensitive data stored in database to cloud-hosted and Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious little attention has been paid to authentication in the cloud. In this paper we have designed a new effective authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the authentication problem in cloud. The proposed solution which we have provided is based mainly on improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized or not. The results showed that this scheme is very strong and difficult to break it.
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend companies are migrating business critical and sensitive data stored in database to cloud-hosted and Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious little attention has been paid to authentication in the cloud. In this paper we have designed a new effective authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the authentication problem in cloud. The proposed solution which we have provided is based mainly on improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized or not. The results showed that this scheme is very strong and difficult to break it.
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend
companies are migrating business critical and sensitive data stored in database to cloud-hosted and
Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious
little attention has been paid to authentication in the cloud. In this paper we have designed a new effective
authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password,
whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for
DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the
authentication problem in cloud. The proposed solution which we have provided is based mainly on
improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized
or not. The results showed that this scheme is very strong and difficult to break it.
A robust and verifiable threshold multi authority access control system in pu...IJARIIT
Attribute-based Encryption is observed as a promising cryptographic leading tool to assurance data owners’ direct
regulator over their data in public cloud storage. The former ABE schemes include only one authority to maintain the whole
attribute set, which can carry a single-point bottleneck on both security and performance. Then, certain multi-authority
schemes are planned, in which numerous authorities distinctly maintain split attribute subsets. However, the single-point
bottleneck problem remains unsolved. In this survey paper, from another perspective, we conduct a threshold multi-authority
CP-ABE access control scheme for public cloud storage, named TMACS, in which multiple authorities jointly manage a
uniform attribute set. In TMACS, taking advantage of (t, n) threshold secret allocation, the master key can be shared among
multiple authorities, and a lawful user can generate his/her secret key by interacting with any t authorities. Security and
performance analysis results show that TMACS is not only verifiable secure when less than t authorities are compromised, but
also robust when no less than t authorities are alive in the system. Also, by efficiently combining the traditional multi-authority
scheme with TMACS, we construct a hybrid one, which satisfies the scenario of attributes coming from different authorities as
well as achieving security and system-level robustness.
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...Editor IJCATR
Cloud Computing is going to be very popular technology in IT enterprises. For any enterprise the data stored is very huge
and invaluable. Since all tasks are performed through network it has become vital to have the secured use of legitimate data. In cloud
computing the most important matter of concern are data security and privacy along with flexibility, scalability and fine grained access
control of data being the other requirements to be maintained by cloud systems Access control is one of the prominent research topics
and hence various schemes have been proposed and implemented. But most of them do not provide flexibility, scalability and fine
grained access control of the data on the cloud. In order to address the issues of flexibility, scalability and fine grained access control
of remotely stored data on cloud we have proposed the hierarchical attribute set-based encryption (HASBE) which is the extension of
attribute- set-based encryption(ASBE) with a hierarchical structure of users. The proposed scheme achieves scalability by handling the
authority to appropriate entity in the hierarchical structure, inherits flexibility by allowing easy transfer and access to the data in case
of location switch. It provides fine grained access control of data by showing only the requested and authorized details to the user thus
improving the performance of the system. In addition, it provides efficient user revocation within expiration time, request to view
extra-attributes and privacy in the intra-level hierarchy is achieved. Thus the scheme is implemented to show that is efficient in access
control of data as well as security of data stored on cloud with comprehensive experiments
This document discusses security issues related to cloud computing. It begins with an introduction to cloud computing models including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It then discusses potential security attacks to clouds like denial of service attacks and man-in-the-middle attacks. Security concerns with moving data and applications to the cloud are outlined. Techniques for securely publishing data in the cloud are also presented. The document concludes that security in cloud computing is challenging due to the complexity of clouds but that assurance of secure and mission-critical operations is important.
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend companies are migrating business critical and sensitive data stored in database to cloud-hosted and Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious little attention has been paid to authentication in the cloud. In this paper we have designed a new effective authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password,
whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the authentication problem in cloud. The proposed solution which we have provided is based mainly on improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized or not. The results showed that this scheme is very strong and difficult to break it.
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE (DBAAS)ijdpsjournal
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend companies are migrating business critical and sensitive data stored in database to cloud-hosted and Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious little attention has been paid to authentication in the cloud. In this paper we have designed a new effective authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the authentication problem in cloud. The proposed solution which we have provided is based mainly on improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized or not. The results showed that this scheme is very strong and difficult to break it.
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend companies are migrating business critical and sensitive data stored in database to cloud-hosted and Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious little attention has been paid to authentication in the cloud. In this paper we have designed a new effective authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password, whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the authentication problem in cloud. The proposed solution which we have provided is based mainly on improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized or not. The results showed that this scheme is very strong and difficult to break it.
AUTHENTICATION SCHEME FOR DATABASE AS A SERVICE(DBAAS) ijccsa
IT Companies have shifted their resources to the cloud at rapidly increasing rate. As part of this trend
companies are migrating business critical and sensitive data stored in database to cloud-hosted and
Database as a Service (DBaaS) solutions.Of all that has been written about cloud computing, precious
little attention has been paid to authentication in the cloud. In this paper we have designed a new effective
authentication scheme for Cloud Database as a Service (DBaaS). A user can change his/her password,
whenever demanded. Furthermore, security analysis realizes the feasibility of the proposed model for
DBaaS and achieves efficiency. We also proposed an efficient authentication scheme to solve the
authentication problem in cloud. The proposed solution which we have provided is based mainly on
improved Needham-Schroeder’s protocol to prove the users’ identity to determine if this user is authorized
or not. The results showed that this scheme is very strong and difficult to break it.
Data Stream Controller for Enterprise Cloud ApplicationIJSRD
Cloud computing is an emerging computing paradigm where computing resources are provided as services over Internet while residing in a large data center. Even though it enables us to dynamically provide servers with the ability to address a wide range of needs, this paradigm brings forth many new challenges for the data security and access control as users outsource their sensitive data to clouds, which are beyond the same trusted domain as data owners. The occupier need not be concerned with how the Paas system achieves expansion under high load.MAC systems differ as security policy is defined for the entire system, typically by administrators. Information flow control (IFC) is a MAC approach, developed originally from military information management methodologies. IFC can be used to enforce more general policies, using appropriate labeling and checking schemes. The labels can be used to manage both confidentiality and integrity concerns, tracking “secrecy†and “quality†of data, respectively. Decentralized Information Flow Control (DIFC) is an approach to security that allows application writers to control how data flow between the pieces of application and the outside world. As applied to privacy DIFC allows un trusted software to compute with private data while trusted security code controls the release of that data. As applied to integrity DIFC allows trusted code to protect un trusted software from unexpected inputs.
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
This document proposes a new cloud-manager-based encryption scheme (CMReS) to address key management and sharing issues in fully homomorphic encryption. CMReS distributes encryption, decryption, and re-encryption tasks between a trusted Encryption/Decryption Service Provider (EDSP) module and a Re-encryption Service Provider (RSP) module hosted on the cloud. The scheme uses Diffie-Hellman key exchange to generate session keys and one-time passwords for authentication between users and cloud services. Experimental results show the proposed technique reduces delay compared to previous approaches by distributing computational tasks between user devices, the EDSP, and RSP modules.
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudINFOGAIN PUBLICATION
The data storage in the cloud typically resides in a service providing environment collocated with data from different clients. The institutions or organizations moving the sensitive and regulated data into the cloud in order to maintain the account for the means by which the access data is controlled and the data is kept secure. Data can take many forms. The cloud based application development; it includes the application programs, scripts, and configuration settings, along with the development tools. For deployed applications, it includes records and other content created or used by the applications, as well as account information about the users of the applications. Access controls are one means to keep data away from unauthorized users; encryption is another. Access controls are typically identity-based, which makes authentication of the user’s identity an important issue in cloud computing. In this research paper focus the cloud data storage architectural frame work of encrypted data.
Let us understand some of the infrastructural and
security challenges that every organization faces today
before delving into the concept of securing the cloud
data lake platform. Though Data lakes provide scalability,
agility, and cost-effective features, it possesses a unique
infrastructure and security challenges.
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
The document proposes a mutual key oversight procedure for cloud security and distribution of data based on a hierarchy method. It discusses using attribute-based encryption to encrypt data before outsourcing it to the cloud. The proposed scheme uses a hierarchical structure with a cloud authority, domain authorities, and users to provide security and scalability. It allows both private and public uploading and sharing of files within this hierarchy.
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
Cloud computing provides many benefits to the users such as accessibility and availability. As the data is available over the cloud, it can be accessed by different users. There may be sensitive data of organization. This is the one issue to provide access to authenticated users only. But the data can be accessed by the owner of the cloud. So to avoid getting data being accessed by the cloud owner, we will use the intrusion detection system to provide security to the data. The other issue is to save the data backup in other cloud in encrypted form so that load balancing can be done. This will help the user with data availability in case of failure of one cloud.
A Survey on Different Techniques Used in Decentralized Cloud ComputingEditor IJCATR
This paper proposes various methods for anonymous authentication for data stored in cloud. Cloud verifies the authenticity
of the series without knowing the user’s identity before storing data. This paper also has the added feature of access control in which
only valid users are able to decrypt the stored information. These schemes also prevents replay attacks and supports creation,
modification, and reading data stored in the cloud. Moreover, our authentication and access control scheme is decentralized and robust,
unlike other access control schemes designed for clouds which are centralized. The communication, computation, and storage
overheads are comparable to centralized approaches .The aim of this paper is to cover many security issues arises in cloud computing
and different schemes to prevent security risks in cloud. Storage-as-a-service (Saas) offered by cloud service providers (CSPs) is a paid
facility that enables organizations to outsource their sensitive data to be stored on remote servers. In this paper, we propose a cloudbased
storage schemes that allows the data owner to benefit from the facilities offered by the CSP and enables indirect mutual trust
between them. This Paper provides different authentication techniques and algorithms for cloud security.
This document discusses security and privacy issues related to cloud computing. It begins by defining cloud computing and describing the four broad categories of cloud services: IaaS, PaaS, DSaaS, and SaaS. It then discusses general security issues faced by both cloud service providers and consumers. Specific issues are organized by governance domain, operational domain, and computer network domain for providers, and by governance, architecture, identity and access management, and availability for consumers. The document also summarizes security challenges related to each type of cloud service and issues regarding virtualization and legal concerns in cloud computing.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
This document summarizes a research paper that proposes a method for enhancing data security in cloud computing through steganography. The method hides user data in digital images stored on cloud servers. When data needs to be accessed, it is extracted from the images. The document outlines the cloud architecture and security issues addressed. It then describes the proposed system architecture, security model, and data storage and retrieval process. Data is partitioned and hidden in multiple images to improve security. The goal is to prevent unauthorized access to user data stored on cloud servers.
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
Cloud Computing is the ability to improve the utility or train new human resources without investing in new infrastructure, or add capabilities to existence without the latest software licensing. It expanded the capabilities of Information Technology (IT). From the past few years, cloud computing has developed from a good business concept in the best rising sectors of the IT industry. But more information on individuals and companies was put in the cloud, and concerns began to think about how secure the cloud environment was. Despite cloud surrounding structures, enterprise users still do not want to expand their business in the cloud. Security reduces the growth of cloud computing and continues to spread the market with complexity with data privacy and data protection. The security of cloud computing has constantly been an significant aspect of improved quality of service from cloud service providers. Data storage in the cloud has a problem related to data security. However, cloud computing construct many new security challenges which have not been well examine. In order to ensure that the user's data in the cloud is secure, we have proposed an effective mechanism with a distinctive feature of data integrity and privacy. This paper focusing on problems relating to the cloud data storage techniques and security in virtual environment. We recommend a method for providing data storage and security in cloud using public key Cryptosystem, which uses the concept of the modified RSA algorithm to provide better security for the data stored in the cloud.
Bluedog white paper - Our WebObjects Web Security Modeltom termini
At Bluedog, our seminal product, Workbench “Always on the Job!” social collaboration SAAS platform is secured the way we have architected all our three-tier Java-based web applications. We secure the application with input validation, a core authentication authorization framework based on LDAP and JINDI, configuration management that ensures testing for vulnerabilities, and strong use of cryptography. In addition, we utilize session management, exception control, auditing and logging to ensure security of the app and web services.
We also secure our routers and other aspects of the network as well as securing the host servers (patching, account management, directory access, and port monitoring). Most importantly, we design our WebObject web applications securely from the get-go.
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
Deployment of using cloud services as a new approach to keep people's platforms, Infrastructure and applications has become an important issue in the world of communications technology. This is a very useful paradigm for humans to obtain their essential needs simpler, faster ,more flexible, and safer than before. But there are many concerns about this system challenge. Security is the most important challenge for cloud systems. In this paper we design and explain the procedure of implementation of a new method for cloud services based on multi clouds on our platform which supplies security and privacy more than other clouds. We introduce some confidentiality and security methods in each layer to have a secure access to requirements. The architecture of our method and the implementation of method on our selected platform for each layer are introduced in this paper.
Design and implement a new cloud security method based on multi clouds on ope...csandit
Deployment of using cloud services as a new approach to keep people's platforms,
Infrastructure and applications has become an important issue in the world of communications
technology. This is a very useful paradigm for humans to obtain their essential needs simpler,
faster ,more flexible, and safer than before. But there are many concerns about this system
challenge. Security is the most important challenge for cloud systems. In this paper we design
and explain the procedure of implementation of a new method for cloud services based on multi
clouds on our platform which supplies security and privacy more than other clouds. We
introduce some confidentiality and security methods in each layer to have a secure access to
requirements. The architecture of our method and the implementation of method on our selected
platform for each layer are introduced in this paper.
A Novel Computing Paradigm for Data Protection in Cloud ComputingIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
This document discusses techniques for securing data in multi-cloud computing simulations. It proposes a protocol for securely transferring data between cloud servers and storage nodes using encryption and digital signatures. The protocol uses cryptographic algorithms like elliptic curve cryptography to encrypt data, generate digital signatures for authentication, and distribute encrypted data fragments across multiple clouds for redundancy and access control. A simulation of the protocol shows how cloudlets are distributed across different data centers and virtual machines using encrypted channels and access controls. The protocol aims to provide secure data transmission and storage in multi-cloud environments.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
This document proposes a method to improve data storage security in cloud computing using Identity-Based Cryptography (IBC) and Elliptic Curve Cryptography (ECC). IBC reduces key management complexity and eliminates the need for certificates by using a user's identity as their public key. ECC provides data confidentiality through encryption and data integrity is provided by Elliptic Curve Digital Signature Algorithm (ECDS). The proposed method involves a Private Key Generator (PKG) that generates user keys, a Trusted Cloud (TC) that stores encrypted user data, and users who encrypt data using IBC and ECC before storing it on the TC. This is intended to provide secure and flexible data storage in cloud computing.
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible cryptography based scheme. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against malicious data modification attack.
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware,
networking, and services integrate to offer different computational facilities, while Internet or a private
network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud
system delimit the benefits of cloud computing like “on-demand, customized resource availability and
performance management”. It is understood that current IT and enterprise security solutions are not
adequate to address the cloud security issues. This paper explores the challenges and issues of security
concerns of cloud computing through different standard and novel solutions. We propose analysis and
architecture for incorporating different security schemes, techniques and protocols for cloud computing,
particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed
architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and
is not coupled with the underlying backbone. This would facilitate to manage the cloud system more
effectively and provide the administrator to include the specific solution to counter the threat. We have also
shown using experimental data how a cloud service provider can estimate the charging based on the
security service it provides and security-related cost-benefit analysis can be estimated.
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware, networking, and services integrate to offer different computational facilities, while Internet or a private network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud system delimit the benefits of cloud computing like “on-demand, customized resource availability and performance management”. It is understood that current IT and enterprise security solutions are not adequate to address the cloud security issues. This paper explores the challenges and issues of security concerns of cloud computing through different standard and novel solutions. We propose analysis and architecture for incorporating different security schemes, techniques and protocols for cloud computing, particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and is not coupled with the underlying backbone. This would facilitate to manage the cloud system more effectively and provide the administrator to include the specific solution to counter the threat. We have also shown using experimental data how a cloud service provider can estimate the charging based on the security service it provides and security-related cost-benefit analysis can be estimated.
Adhd Medication Shortage Uk - trinexpharmacy.comreignlana06
The UK is currently facing a Adhd Medication Shortage Uk, which has left many patients and their families grappling with uncertainty and frustration. ADHD, or Attention Deficit Hyperactivity Disorder, is a chronic condition that requires consistent medication to manage effectively. This shortage has highlighted the critical role these medications play in the daily lives of those affected by ADHD. Contact : +1 (747) 209 – 3649 E-mail : sales@trinexpharmacy.com
More Related Content
Similar to CRITICISMS OF THE FUTURE AVAILABILITY IN SUSTAINABLE GENDER GOAL, ACCESS TO LAND AND NON-LAND UNDER THE POPULATIONS AND CLIMATE CHANGE
Data Stream Controller for Enterprise Cloud ApplicationIJSRD
Cloud computing is an emerging computing paradigm where computing resources are provided as services over Internet while residing in a large data center. Even though it enables us to dynamically provide servers with the ability to address a wide range of needs, this paradigm brings forth many new challenges for the data security and access control as users outsource their sensitive data to clouds, which are beyond the same trusted domain as data owners. The occupier need not be concerned with how the Paas system achieves expansion under high load.MAC systems differ as security policy is defined for the entire system, typically by administrators. Information flow control (IFC) is a MAC approach, developed originally from military information management methodologies. IFC can be used to enforce more general policies, using appropriate labeling and checking schemes. The labels can be used to manage both confidentiality and integrity concerns, tracking “secrecy†and “quality†of data, respectively. Decentralized Information Flow Control (DIFC) is an approach to security that allows application writers to control how data flow between the pieces of application and the outside world. As applied to privacy DIFC allows un trusted software to compute with private data while trusted security code controls the release of that data. As applied to integrity DIFC allows trusted code to protect un trusted software from unexpected inputs.
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
This document proposes a new cloud-manager-based encryption scheme (CMReS) to address key management and sharing issues in fully homomorphic encryption. CMReS distributes encryption, decryption, and re-encryption tasks between a trusted Encryption/Decryption Service Provider (EDSP) module and a Re-encryption Service Provider (RSP) module hosted on the cloud. The scheme uses Diffie-Hellman key exchange to generate session keys and one-time passwords for authentication between users and cloud services. Experimental results show the proposed technique reduces delay compared to previous approaches by distributing computational tasks between user devices, the EDSP, and RSP modules.
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudINFOGAIN PUBLICATION
The data storage in the cloud typically resides in a service providing environment collocated with data from different clients. The institutions or organizations moving the sensitive and regulated data into the cloud in order to maintain the account for the means by which the access data is controlled and the data is kept secure. Data can take many forms. The cloud based application development; it includes the application programs, scripts, and configuration settings, along with the development tools. For deployed applications, it includes records and other content created or used by the applications, as well as account information about the users of the applications. Access controls are one means to keep data away from unauthorized users; encryption is another. Access controls are typically identity-based, which makes authentication of the user’s identity an important issue in cloud computing. In this research paper focus the cloud data storage architectural frame work of encrypted data.
Let us understand some of the infrastructural and
security challenges that every organization faces today
before delving into the concept of securing the cloud
data lake platform. Though Data lakes provide scalability,
agility, and cost-effective features, it possesses a unique
infrastructure and security challenges.
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
The document proposes a mutual key oversight procedure for cloud security and distribution of data based on a hierarchy method. It discusses using attribute-based encryption to encrypt data before outsourcing it to the cloud. The proposed scheme uses a hierarchical structure with a cloud authority, domain authorities, and users to provide security and scalability. It allows both private and public uploading and sharing of files within this hierarchy.
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
Cloud computing provides many benefits to the users such as accessibility and availability. As the data is available over the cloud, it can be accessed by different users. There may be sensitive data of organization. This is the one issue to provide access to authenticated users only. But the data can be accessed by the owner of the cloud. So to avoid getting data being accessed by the cloud owner, we will use the intrusion detection system to provide security to the data. The other issue is to save the data backup in other cloud in encrypted form so that load balancing can be done. This will help the user with data availability in case of failure of one cloud.
A Survey on Different Techniques Used in Decentralized Cloud ComputingEditor IJCATR
This paper proposes various methods for anonymous authentication for data stored in cloud. Cloud verifies the authenticity
of the series without knowing the user’s identity before storing data. This paper also has the added feature of access control in which
only valid users are able to decrypt the stored information. These schemes also prevents replay attacks and supports creation,
modification, and reading data stored in the cloud. Moreover, our authentication and access control scheme is decentralized and robust,
unlike other access control schemes designed for clouds which are centralized. The communication, computation, and storage
overheads are comparable to centralized approaches .The aim of this paper is to cover many security issues arises in cloud computing
and different schemes to prevent security risks in cloud. Storage-as-a-service (Saas) offered by cloud service providers (CSPs) is a paid
facility that enables organizations to outsource their sensitive data to be stored on remote servers. In this paper, we propose a cloudbased
storage schemes that allows the data owner to benefit from the facilities offered by the CSP and enables indirect mutual trust
between them. This Paper provides different authentication techniques and algorithms for cloud security.
This document discusses security and privacy issues related to cloud computing. It begins by defining cloud computing and describing the four broad categories of cloud services: IaaS, PaaS, DSaaS, and SaaS. It then discusses general security issues faced by both cloud service providers and consumers. Specific issues are organized by governance domain, operational domain, and computer network domain for providers, and by governance, architecture, identity and access management, and availability for consumers. The document also summarizes security challenges related to each type of cloud service and issues regarding virtualization and legal concerns in cloud computing.
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
This document summarizes a research paper that proposes a method for enhancing data security in cloud computing through steganography. The method hides user data in digital images stored on cloud servers. When data needs to be accessed, it is extracted from the images. The document outlines the cloud architecture and security issues addressed. It then describes the proposed system architecture, security model, and data storage and retrieval process. Data is partitioned and hidden in multiple images to improve security. The goal is to prevent unauthorized access to user data stored on cloud servers.
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
Cloud Computing is the ability to improve the utility or train new human resources without investing in new infrastructure, or add capabilities to existence without the latest software licensing. It expanded the capabilities of Information Technology (IT). From the past few years, cloud computing has developed from a good business concept in the best rising sectors of the IT industry. But more information on individuals and companies was put in the cloud, and concerns began to think about how secure the cloud environment was. Despite cloud surrounding structures, enterprise users still do not want to expand their business in the cloud. Security reduces the growth of cloud computing and continues to spread the market with complexity with data privacy and data protection. The security of cloud computing has constantly been an significant aspect of improved quality of service from cloud service providers. Data storage in the cloud has a problem related to data security. However, cloud computing construct many new security challenges which have not been well examine. In order to ensure that the user's data in the cloud is secure, we have proposed an effective mechanism with a distinctive feature of data integrity and privacy. This paper focusing on problems relating to the cloud data storage techniques and security in virtual environment. We recommend a method for providing data storage and security in cloud using public key Cryptosystem, which uses the concept of the modified RSA algorithm to provide better security for the data stored in the cloud.
Bluedog white paper - Our WebObjects Web Security Modeltom termini
At Bluedog, our seminal product, Workbench “Always on the Job!” social collaboration SAAS platform is secured the way we have architected all our three-tier Java-based web applications. We secure the application with input validation, a core authentication authorization framework based on LDAP and JINDI, configuration management that ensures testing for vulnerabilities, and strong use of cryptography. In addition, we utilize session management, exception control, auditing and logging to ensure security of the app and web services.
We also secure our routers and other aspects of the network as well as securing the host servers (patching, account management, directory access, and port monitoring). Most importantly, we design our WebObject web applications securely from the get-go.
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
Deployment of using cloud services as a new approach to keep people's platforms, Infrastructure and applications has become an important issue in the world of communications technology. This is a very useful paradigm for humans to obtain their essential needs simpler, faster ,more flexible, and safer than before. But there are many concerns about this system challenge. Security is the most important challenge for cloud systems. In this paper we design and explain the procedure of implementation of a new method for cloud services based on multi clouds on our platform which supplies security and privacy more than other clouds. We introduce some confidentiality and security methods in each layer to have a secure access to requirements. The architecture of our method and the implementation of method on our selected platform for each layer are introduced in this paper.
Design and implement a new cloud security method based on multi clouds on ope...csandit
Deployment of using cloud services as a new approach to keep people's platforms,
Infrastructure and applications has become an important issue in the world of communications
technology. This is a very useful paradigm for humans to obtain their essential needs simpler,
faster ,more flexible, and safer than before. But there are many concerns about this system
challenge. Security is the most important challenge for cloud systems. In this paper we design
and explain the procedure of implementation of a new method for cloud services based on multi
clouds on our platform which supplies security and privacy more than other clouds. We
introduce some confidentiality and security methods in each layer to have a secure access to
requirements. The architecture of our method and the implementation of method on our selected
platform for each layer are introduced in this paper.
A Novel Computing Paradigm for Data Protection in Cloud ComputingIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
This document discusses techniques for securing data in multi-cloud computing simulations. It proposes a protocol for securely transferring data between cloud servers and storage nodes using encryption and digital signatures. The protocol uses cryptographic algorithms like elliptic curve cryptography to encrypt data, generate digital signatures for authentication, and distribute encrypted data fragments across multiple clouds for redundancy and access control. A simulation of the protocol shows how cloudlets are distributed across different data centers and virtual machines using encrypted channels and access controls. The protocol aims to provide secure data transmission and storage in multi-cloud environments.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
This document proposes a method to improve data storage security in cloud computing using Identity-Based Cryptography (IBC) and Elliptic Curve Cryptography (ECC). IBC reduces key management complexity and eliminates the need for certificates by using a user's identity as their public key. ECC provides data confidentiality through encryption and data integrity is provided by Elliptic Curve Digital Signature Algorithm (ECDS). The proposed method involves a Private Key Generator (PKG) that generates user keys, a Trusted Cloud (TC) that stores encrypted user data, and users who encrypt data using IBC and ECC before storing it on the TC. This is intended to provide secure and flexible data storage in cloud computing.
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...ijsrd.com
Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible cryptography based scheme. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against malicious data modification attack.
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware,
networking, and services integrate to offer different computational facilities, while Internet or a private
network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud
system delimit the benefits of cloud computing like “on-demand, customized resource availability and
performance management”. It is understood that current IT and enterprise security solutions are not
adequate to address the cloud security issues. This paper explores the challenges and issues of security
concerns of cloud computing through different standard and novel solutions. We propose analysis and
architecture for incorporating different security schemes, techniques and protocols for cloud computing,
particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed
architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and
is not coupled with the underlying backbone. This would facilitate to manage the cloud system more
effectively and provide the administrator to include the specific solution to counter the threat. We have also
shown using experimental data how a cloud service provider can estimate the charging based on the
security service it provides and security-related cost-benefit analysis can be estimated.
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware, networking, and services integrate to offer different computational facilities, while Internet or a private network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud system delimit the benefits of cloud computing like “on-demand, customized resource availability and performance management”. It is understood that current IT and enterprise security solutions are not adequate to address the cloud security issues. This paper explores the challenges and issues of security concerns of cloud computing through different standard and novel solutions. We propose analysis and architecture for incorporating different security schemes, techniques and protocols for cloud computing, particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and is not coupled with the underlying backbone. This would facilitate to manage the cloud system more effectively and provide the administrator to include the specific solution to counter the threat. We have also shown using experimental data how a cloud service provider can estimate the charging based on the security service it provides and security-related cost-benefit analysis can be estimated.
Similar to CRITICISMS OF THE FUTURE AVAILABILITY IN SUSTAINABLE GENDER GOAL, ACCESS TO LAND AND NON-LAND UNDER THE POPULATIONS AND CLIMATE CHANGE (20)
Adhd Medication Shortage Uk - trinexpharmacy.comreignlana06
The UK is currently facing a Adhd Medication Shortage Uk, which has left many patients and their families grappling with uncertainty and frustration. ADHD, or Attention Deficit Hyperactivity Disorder, is a chronic condition that requires consistent medication to manage effectively. This shortage has highlighted the critical role these medications play in the daily lives of those affected by ADHD. Contact : +1 (747) 209 – 3649 E-mail : sales@trinexpharmacy.com
Osteoporosis - Definition , Evaluation and Management .pdfJim Jacob Roy
Osteoporosis is an increasing cause of morbidity among the elderly.
In this document , a brief outline of osteoporosis is given , including the risk factors of osteoporosis fractures , the indications for testing bone mineral density and the management of osteoporosis
These lecture slides, by Dr Sidra Arshad, offer a quick overview of the physiological basis of a normal electrocardiogram.
Learning objectives:
1. Define an electrocardiogram (ECG) and electrocardiography
2. Describe how dipoles generated by the heart produce the waveforms of the ECG
3. Describe the components of a normal electrocardiogram of a typical bipolar lead (limb II)
4. Differentiate between intervals and segments
5. Enlist some common indications for obtaining an ECG
6. Describe the flow of current around the heart during the cardiac cycle
7. Discuss the placement and polarity of the leads of electrocardiograph
8. Describe the normal electrocardiograms recorded from the limb leads and explain the physiological basis of the different records that are obtained
9. Define mean electrical vector (axis) of the heart and give the normal range
10. Define the mean QRS vector
11. Describe the axes of leads (hexagonal reference system)
12. Comprehend the vectorial analysis of the normal ECG
13. Determine the mean electrical axis of the ventricular QRS and appreciate the mean axis deviation
14. Explain the concepts of current of injury, J point, and their significance
Study Resources:
1. Chapter 11, Guyton and Hall Textbook of Medical Physiology, 14th edition
2. Chapter 9, Human Physiology - From Cells to Systems, Lauralee Sherwood, 9th edition
3. Chapter 29, Ganong’s Review of Medical Physiology, 26th edition
4. Electrocardiogram, StatPearls - https://www.ncbi.nlm.nih.gov/books/NBK549803/
5. ECG in Medical Practice by ABM Abdullah, 4th edition
6. Chapter 3, Cardiology Explained, https://www.ncbi.nlm.nih.gov/books/NBK2214/
7. ECG Basics, http://www.nataliescasebook.com/tag/e-c-g-basics
Integrating Ayurveda into Parkinson’s Management: A Holistic ApproachAyurveda ForAll
Explore the benefits of combining Ayurveda with conventional Parkinson's treatments. Learn how a holistic approach can manage symptoms, enhance well-being, and balance body energies. Discover the steps to safely integrate Ayurvedic practices into your Parkinson’s care plan, including expert guidance on diet, herbal remedies, and lifestyle modifications.
- Video recording of this lecture in English language: https://youtu.be/kqbnxVAZs-0
- Video recording of this lecture in Arabic language: https://youtu.be/SINlygW1Mpc
- Link to download the book free: https://nephrotube.blogspot.com/p/nephrotube-nephrology-books.html
- Link to NephroTube website: www.NephroTube.com
- Link to NephroTube social media accounts: https://nephrotube.blogspot.com/p/join-nephrotube-on-social-media.html
share - Lions, tigers, AI and health misinformation, oh my!.pptxTina Purnat
• Pitfalls and pivots needed to use AI effectively in public health
• Evidence-based strategies to address health misinformation effectively
• Building trust with communities online and offline
• Equipping health professionals to address questions, concerns and health misinformation
• Assessing risk and mitigating harm from adverse health narratives in communities, health workforce and health system
Basavarajeeyam is a Sreshta Sangraha grantha (Compiled book ), written by Neelkanta kotturu Basavaraja Virachita. It contains 25 Prakaranas, First 24 Chapters related to Rogas& 25th to Rasadravyas.
Does Over-Masturbation Contribute to Chronic Prostatitis.pptxwalterHu5
In some case, your chronic prostatitis may be related to over-masturbation. Generally, natural medicine Diuretic and Anti-inflammatory Pill can help mee get a cure.
Muktapishti is a traditional Ayurvedic preparation made from Shoditha Mukta (Purified Pearl), is believed to help regulate thyroid function and reduce symptoms of hyperthyroidism due to its cooling and balancing properties. Clinical evidence on its efficacy remains limited, necessitating further research to validate its therapeutic benefits.
Role of Mukta Pishti in the Management of Hyperthyroidism
CRITICISMS OF THE FUTURE AVAILABILITY IN SUSTAINABLE GENDER GOAL, ACCESS TO LAND AND NON-LAND UNDER THE POPULATIONS AND CLIMATE CHANGE
1. International Journal on Cloud Computing: Services and Architecture (IJCCSA)
Vol. 11, No. 1/2/3/4/5/6, December 2021
DOI: 10.5121/ijccsa.2021.11601 1
BLOCKCHAIN BASED DATA SECURITY AS A
SERVICE IN CLOUD PLATFORM SECURITY
Magesh Kasthuri
Wipro Limited, Bengaluru, India
ABSTRACT
Blockchain is widely used for money related transaction and still there are many proven usecases across
different industries like Retail in stock checks and order management, Manufacturing in good movement
processing, Health care in patient database management to name a few. With this in mind, it is always
important to understand the merits and demerits of both Public and Private Blockchain to understand their
capabilities and limitations to decide which one is more suitable for an industry specific usecase
implementation. In a Cloud based platform, data security plays a crucial role to cater to data protection
and regulatory requirements and Blockchain can play an important role in this for accelerated workflow
by providing ‘data security’ as a service capability.
KEYWORDS
Data Security, Blockchain, Cloud platforms, Data protection, Regulatory requirements
1. INTRODUCTION
In PermissionLess Ledger, user can login anonymously without revealing the identity and
controlling the transaction rate can be done through a defined owner group. On the other hand,
Permissioned Ledger has defined roles like Owner, Approver, Viewer/Reader and Administrator.
These roles has defined workflow activities and controlled transaction processing is ensured in a
Permissioned Ledger based Blockchain platform using these user roles. There would be more
than one users present for each role so that speed of transaction is faster as compared to
PermissionLess Ledger.
In a Multi-tenant cloud architecture, even the application environment is shared in a single
workspace (subscription) there are restrictions to access the application and data (including the
Virtual machines) and hence irrespective or public or private cloud environment, application and
data security is ensured and contained within a limited group of known resources. Hence it is
utmost important to have a robust data security service in cloud platform to accelerate workflow
based resource access through some gatekeeper activities.
2. MULTI-TENANT APPLICATION DESIGN
A multi-tenant design is a horizontal demarcation between application groups to restrict
accessibility of application and data between user groups and security groups. In terms of multi-
tenant database design solution, there are many options like design multiple database for each
application or design a single shared database with multiple schemas so that schema level user
permission can restrict data access between them or even have a single shared database with
shared schema where table level permissions can isolate each tenants of application group.
2. International Journal on Cloud Computing: Services and Architecture (IJCCSA)
Vol. 11, No. 1/2/3/4/5/6, December 2021
2
Figure 1: Multi-tenant application design with security
One of the key benefit of Multi-tenant design is cost effective as it still uses shared environment
without compromising security and accessibility. It also simplifies overall integration design, re-
usability of provisioning services through template; streamline the usability and central
monitoring solutioning for support team without compromising privacy or data or application
level security.
2.1. Key Drivers for Multi-Tenant Security Design
One of the key benefit of Multi-tenant design is cost effective as it still uses shared environment
without compromising security and accessibility. It also simplifies overall integration design, re-
usability of provisioning services through template; streamline the usability and central
monitoring solutioning for support team without compromising privacy or data or application
level security. The key drivers for multi-tenant security design in cloud platform are:
Infrastructure – Defines the platform setup and various patterns associated in defining
the infrastructure components like storage, network, middleware, dependency handling to
name a few. Many organization wishes to keep uniform Infrastructure principles in order
to keep the risk and cost of handling to be low.
Security – Defines the vital element of EA including Infrastructure or Platform security,
Application security and Data security to comply with industry standards (HIPAA, SOC)
and regulatory compliance to regional requirements.
Data – Defines the data flow, operation of data handling in transaction, data structure,
data integrity and low-level data flow operations.
Application – Defines the actual technical stack of the application(s) to be developed as
part of EA design, the interfacing components, the communication mechanism between
application, dependency of different applications etc.,
3. International Journal on Cloud Computing: Services and Architecture (IJCCSA)
Vol. 11, No. 1/2/3/4/5/6, December 2021
3
2.2. Customer Identity Access Management
Customer Identity and Access Management (CIAM) enables application architecture to handle
customer identity and profile data in a secured and flexible solution. There are many CIAM
solutions available in the market and they have many commonality in terms of security, user
management, profile management, policy management and more. CIAM is an integration of
Identity, Security and Privacy of User data as shown below
Figure 2: Customer Identity Access Management
Broadly, CIAM features are categorized as below:
Seamless customer experiences - Provide easy visualization solution during application
integration and handle user access without much complexity.
Security requirements -Provide highest possible security for user data with a data store either
integrated to CIAM solution or connected from CIAM application.
Performance and scalability - Handle any number of concurrency user access without trouble or
delay in application access.
Privacy and regulatory compliance - With GDPR and customer personal data security in place
for regulatory restrictions for different countries, CIAM plays an important role for monitoring,
reporting and notification alert.
Adaptability - CIAM solution should have futuristic architecture to handle easy adoption for
any architecture (Eg: Cloud Adoption, On-premises to Cloud synchronization etc.,)
2.3. Blockchain Based CIAM for Data Security
Blockchain is decentralized in nature and multiple participants of the blockchain platform can act
as approver for the blockchain operation. For example, Data Security as a Service (DSaaS)
implemented through CIAM can be operated through workflow operation using a Blockchain
Smart contracts. This way, we can control data accessibility in a cloud platform using Blockchain
4. International Journal on Cloud Computing: Services and Architecture (IJCCSA)
Vol. 11, No. 1/2/3/4/5/6, December 2021
4
based workflow operation. The layers which enables this DSaaS in cloud platform are listed
below:
Figure 3: Component architecture for a Blockchain based DSaaS
Security Layer: This layer has the Smart contracts defined for the secured data transmission and
data processing including application security, data security and interfacing security policies to be
defined in the layer. This helps to ensure the complete network architecture is secured and role
based access control is ensured in the service communication.
API Service Layer: This is the layer which exposes API services to external world in order to
access the service interface for request handling, monitoring request, health check request to
name a few.
3. EXAMPLE IMPLEMENTATION FOR DSAAS IN A DATALAKE
ARCHITECTURE
Datalake is a classified pool of data in a Big data solution designed in a cloud platform for
scalability and availability requirements. A set of data collection having relational information is
called data puddle and a group of data puddle is called data pond. Multiple collection of data
pond in a organization data is called data lake. Accessing data from a datalake should be
protected from unauthorized access and different pond/puddle should be granted individual role
based access to protect and isolate data security to the group of data.
A Datalake to protect from unauthorized access and isolate the data accessibility through
workflow based approach is called De-identified Data lake (DIDL) and implementing DSaaS
proves to be useful in such DIDL to improve performance and reliability to cloud platform
solutions using Data lake services.
5. International Journal on Cloud Computing: Services and Architecture (IJCCSA)
Vol. 11, No. 1/2/3/4/5/6, December 2021
5
Figure 4: De-identified Data lake implementing DSaaS
DIDL is an architectural approach to protect data and handle risk governance in data privacy like
PII protected data. It helps to discover, identify, monitor, catalog, query and protect data. It acts
as a gateway keeper to Data Lake to remove identity of sensitive data before it moves in and out
of Data Lake. The primary aim of DIDL is to create a data protection framework to secure,
manage for compliance and cost effective data protection and risk management solution from
Data Lake.
It has in-built Data catalog which monitors each and every asset in a Data Lake and also helps
stewardship in data management to access data and provide role based data access. Also, for any
Extract, Transform and Load (ETL) batch operation, it helps to add policy based data masking to
enrich and store/manage protected data into the data lake.
In this context, conceptualizing Data Security as a Service (DSaaS), that provides various data
security requirements, data security capabilities, services, policies, procedures, and associated use
cases forms an important design consideration for any Enterprise. Key Components of DSaaS are
shown in below Figure-5.
Figure 5: Key components of DSaaS
6. International Journal on Cloud Computing: Services and Architecture (IJCCSA)
Vol. 11, No. 1/2/3/4/5/6, December 2021
6
Blockchain platform can act as a main enabler for DSaaS in which a Distributed Ledger
Technology providing an increased cyber resiliency and maintains ledger integrity because of its
decentralized architecture, implementation of enhanced security frameworks for tamper-proof
transaction, access patterns with no single point of failure (SPoF). The data is stored in blocks
and connected with chain of blocks; thus, attacking a specific block does not affect the other
blocks and the attacker needs to tamper all the blocks, but then detection is evident. The
encryption and cryptography solution that Blockchain applications use to manage the data or
transactions blocks protects individual transactions or records and the entire ledger. Thus,
Blockchain proves to be a holistic capability to serve DSaaS requirements.
4. REFERENCE ARCHITECTURE OF DSAAS
DSaaS (Data Security as a Service) architecture will comprise of all the components and services
mentioned in previous section in a layered architecture. The services can be leveraged by any
kind of solution irrespective of whether blockchain is used not. As shown in Figure-6, the DSaaS
Architecture comprises of well-defined microservices and underlying components.
Figure 6: DSaaS Reference Architecture
Microservices architecture will be followed to build APIs with the right granularity and cohesive
functionality and the components in the architecture are:
Metadata Storage Services: These are generic APIs which will provide ability to the client
application to store metadata related to their assets and process in blockchain so that data
protected at rest with complete provenance and audit trail. This can be used to store small sized
data, or it can be used to store the reference and digital representation of large sized data or
document
7. International Journal on Cloud Computing: Services and Architecture (IJCCSA)
Vol. 11, No. 1/2/3/4/5/6, December 2021
7
Document Management Service: For protecting large sized documents this API can be used to
store the physical document on IPFS and its metadata stored on blockchain. Documents can
either be uploaded as an attachment or a shared folder be specified for upload of very large
documents.
Data Sharding Service: Highly sensitive large sized data and/or digital assets will be protected
by using this API that performs data fragmentation and stores in an encrypted token form in the
file system. The metadata and its associated access rights are maintained on blockchain using
which the data is reconstructed by decoding and combining all fragments.
5. CONCLUSIONS
Data Security is the key to strengthen the Enterprise architecture when handling workflow
operation involving multiple parties. For various industries like Fintech (Insurance, Payment,
Investment banking) and Healthcare (EMR/EHR, Medical Retail Supplychain operations), it is
important that an efficient pluggable DSaaS integration is incorporated which can help in
business agility, cost efficiency and improved Governance and security compliance.
As shown in the reference architecture of DSaaS solution, there are many pluggable components
which can be used to integrate a business agile solution for integrated Enterprise security to
enable industry level compliance like FedRamp, PII, TOSCA, PCI or HIPAA compliance service
functions.
ACKNOWLEDGEMENTS
The authors would like to thank Vinod Panicker, Hitarshi Buch and Krishna Mty from Wipro
Limited in ideating and researching in the topic of Data Security as a Service using Blockchain
platform and the joint idea is submitted as research paper in IBCOM 2021 conference.
REFERENCES
[1] Subashini, Subashini, and Veeraruna Kavitha. "A survey on security issues in service delivery models
of cloud computing." Journal of network and computer applications 34.1 (2011): 1-11.
[2] Chen, Deyan, and Hong Zhao. "Data security and privacy protection issues in cloud computing." 2012
International Conference on Computer Science and Electronics Engineering. Vol. 1. IEEE, 2012.
[3] Getov, Vladimir. "Security as a service in smart clouds--opportunities and concerns." 2012 IEEE 36th
Annual Computer Software and Applications Conference. IEEE, 2012.
[4] Kumar, P. Ravi, P. Herbert Raj, and P. Jelciana. "Exploring data security issues and solutions in cloud
computing." Procedia Computer Science 125 (2018): 691-697.
[5] Mohamed, Eman M., Hatem S. Abdelkader, and Sherif El-Etriby. "Enhanced data security model for
cloud computing." 2012 8th International Conference on Informatics and Systems (INFOS). IEEE,
2012.
[6] Varadharajan, Vijay, and Udaya Tupakula. "Security as a service model for cloud
environment." IEEE Transactions on network and Service management 11.1 (2014): 60-75.
[7] Hussain, Mohammed, and Hanady Abdulsalam. "SECaaS: security as a service for cloud-based
applications." Proceedings of the Second Kuwait Conference on e-Services and e-Systems. 2011.
[8] Fernando, Yudi, Ramanathan RM Chidambaram, and Ika Sari Wahyuni-TD. "The impact of Big Data
analytics and data security practices on service supply chain performance." Benchmarking: An
International Journal (2018).
[9] Subashini, Subashini, and Veeraruna Kavitha. "A survey on security issues in service delivery models
of cloud computing." Journal of network and computer applications 34.1 (2011): 1-11.
[10] Getov, Vladimir. "Security as a service in smart clouds--opportunities and concerns." 2012 IEEE 36th
Annual Computer Software and Applications Conference. IEEE, 2012.
8. International Journal on Cloud Computing: Services and Architecture (IJCCSA)
Vol. 11, No. 1/2/3/4/5/6, December 2021
8
[11] Narula, Saakshi, and Arushi Jain. "Cloud computing security: Amazon web service." 2015 Fifth
International Conference on Advanced Computing & Communication Technologies. ieee, 2015.
[12] Hussain, Mohammed, and Hanady Abdulsalam. "SECaaS: security as a service for cloud-based
applications." Proceedings of the Second Kuwait Conference on e-Services and e-Systems. 2011.
[13] Kasthuri Magesh, Panicker Vinod, Buch Hitarshi and Mty Krishna “Data protection through data
security-as-a-service using blockchain enabled platform” Proceedings of the Second International
Conference on IoT, Blockchain and Cloud Computing (IBCOM 2021), Zurich Switzerland 2021.
AUTHORS
Dr. Magesh is a Distinguished Member of Technical Staff at Wipro. Magesh holds a
Ph. D in Deep Learning and Genetic Algorithms. He is a senior member of IEEE and
has published more than 50 articles in OpenSource For You, PC Quest, Cutter
Business IT Journal and other notable international journals. He has also published
around 480 thought leadership articles on AIML, Blockchain, and Cloud on LinkedIn
with the hashtag #shorticle.