Deployment of using cloud services as a new approach to keep people's platforms,
Infrastructure and applications has become an important issue in the world of communications
technology. This is a very useful paradigm for humans to obtain their essential needs simpler,
faster ,more flexible, and safer than before. But there are many concerns about this system
challenge. Security is the most important challenge for cloud systems. In this paper we design
and explain the procedure of implementation of a new method for cloud services based on multi
clouds on our platform which supplies security and privacy more than other clouds. We
introduce some confidentiality and security methods in each layer to have a secure access to
requirements. The architecture of our method and the implementation of method on our selected
platform for each layer are introduced in this paper.
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...IJERA Editor
Cloud computing, undoubtedly, is a path to expand the limits or add powerful capabilities on-demand with
almost no investment in new framework, training new staff, or authorizing new software. Though today
everyone is talking about cloud but, organizations are still in dilemma whether it’s safe to deploy their business
on cloud. The reason behind it; is nothing but Security. No cloud service provider provides 100% security
assurance to its customers and therefore, businesses are hesitant to accept cloud and the vast benefits that come
along with it. The absence of proper security controls delimits the benefits of cloud. In this paper, a review on
different cloud service models and a survey of the different security challenges and issues while providing
services in cloud is presented .The paper focuses on the security issues specific to service delivery model (SaaS,
IaaS and PaaS) of cloud environment. This paper also explores the various security solutions currently being
applied to protect cloud from various kinds of intruders.
This presentation gives a detailed overview about Cloud Computing, its features and challenges faced by it in the market. It gives an insight into cloud security and privacy issues and its measures.
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware,
networking, and services integrate to offer different computational facilities, while Internet or a private
network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud
system delimit the benefits of cloud computing like “on-demand, customized resource availability and
performance management”. It is understood that current IT and enterprise security solutions are not
adequate to address the cloud security issues. This paper explores the challenges and issues of security
concerns of cloud computing through different standard and novel solutions. We propose analysis and
architecture for incorporating different security schemes, techniques and protocols for cloud computing,
particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed
architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and
is not coupled with the underlying backbone. This would facilitate to manage the cloud system more
effectively and provide the administrator to include the specific solution to counter the threat. We have also
shown using experimental data how a cloud service provider can estimate the charging based on the
security service it provides and security-related cost-benefit analysis can be estimated.
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...IJERA Editor
Cloud computing, undoubtedly, is a path to expand the limits or add powerful capabilities on-demand with
almost no investment in new framework, training new staff, or authorizing new software. Though today
everyone is talking about cloud but, organizations are still in dilemma whether it’s safe to deploy their business
on cloud. The reason behind it; is nothing but Security. No cloud service provider provides 100% security
assurance to its customers and therefore, businesses are hesitant to accept cloud and the vast benefits that come
along with it. The absence of proper security controls delimits the benefits of cloud. In this paper, a review on
different cloud service models and a survey of the different security challenges and issues while providing
services in cloud is presented .The paper focuses on the security issues specific to service delivery model (SaaS,
IaaS and PaaS) of cloud environment. This paper also explores the various security solutions currently being
applied to protect cloud from various kinds of intruders.
This presentation gives a detailed overview about Cloud Computing, its features and challenges faced by it in the market. It gives an insight into cloud security and privacy issues and its measures.
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware,
networking, and services integrate to offer different computational facilities, while Internet or a private
network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud
system delimit the benefits of cloud computing like “on-demand, customized resource availability and
performance management”. It is understood that current IT and enterprise security solutions are not
adequate to address the cloud security issues. This paper explores the challenges and issues of security
concerns of cloud computing through different standard and novel solutions. We propose analysis and
architecture for incorporating different security schemes, techniques and protocols for cloud computing,
particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed
architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and
is not coupled with the underlying backbone. This would facilitate to manage the cloud system more
effectively and provide the administrator to include the specific solution to counter the threat. We have also
shown using experimental data how a cloud service provider can estimate the charging based on the
security service it provides and security-related cost-benefit analysis can be estimated.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
Ubiquitous computing has revolutionized interaction of humans and machines. Cloud computing has been mainly used for storing data and various computational purposes. It has changed the face of using the internet. But, as we know every technology has its pros and cons. Securing cloud environment is the most challenging issue for the researchers and developers. Main aspects which cloud security should cover are authentication, authorization, data protection etc. Establishing trust between cloud service providers (CSP) is the biggest challenge, when someone is discussing about cloud security. Trust is a critical factor which mainly depends on perception of reputation and self-assessment done by both user and CSP. The trust model can act as security strength evaluator and ranking service for cloud application and services. For establishing trust relationship between two parties, mutual trust mechanism is reliable, as it does verification from both sides. There are various trust models which mainly focuses on securing one party i.e., they validate either user or service node. In this survey paper, the study of various trust models and their various parameters are discussed.
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhShah Sheikh
ISACA Journal Publication Volume 5 written by Shah Sheikh - published in Q4 2013. Based on the Cloud Security Alliance Framework whitepaper titled "Does your Cloud have a Secure Lining?"
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
Cloud computing provides many benefits to the users such as accessibility and availability. As the data is available over the cloud, it can be accessed by different users. There may be sensitive data of organization. This is the one issue to provide access to authenticated users only. But the data can be accessed by the owner of the cloud. So to avoid getting data being accessed by the cloud owner, we will use the intrusion detection system to provide security to the data. The other issue is to save the data backup in other cloud in encrypted form so that load balancing can be done. This will help the user with data availability in case of failure of one cloud.
A traditional computing environment requires a costly
infrastructure to offer a better service to users. The introduction
of cloud computing has changed the working environment from
traditional to virtual. A larger number of IT companies are
utilizing the cloud. On the one hand, the cloud attracts more
number of consumers by offering services with minimized
capital cost and virtual infrastructure. On the other hand, there
are a risk and security challenges in cloud computing that
makes the user not to move completely towards it. The cloud
environment is more vulnerable to security breaches and data
theft. Moreover, insider attacks are more frequent in larger
enterprises. An unauthenticated user can cause more damage
to company reputation. The cloud service providers are trying
to provide a secure work environment for users. However,
there is a lack of global standards and policies to invoke
security measures in cloud computing. This study aims to
highlight and classify security challenges and trust issues in the
cloud environment.
The survey was conducted in various institutions and
governmental organizations in Saudi Arabia to study the
opinions of stakeholders on cloud computing security
challenges and risks.
Links:
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Establishing applications on on-demand infrastructures rather of building applica-tions on fixed and rigid infrastructures was provided by cloud computing provides. By merely exploiting into the cloud, initiatives can gain fast access to business applications or infrastructure resources with decreased Capital Expenditure (CAPEX). The more and more information is placed into the cloud by someone and initiatives, security issues begins to develop and raised. This paper discusses the different security issues that rise up about how secure the mo-bile cloud computing environment.
I want to thank everyone who attended this presentation at AFCOM Data Center World Fall 2011 in Orlando, FL.
Studies show the number of data centers deploying virtual cloud computing will rapidly increase in the next five years. Other studies show that the number of Internet attacks and their level of sophistication will also grow significantly. This session identifies approaches to reduce the risk of business disruptions resulting from inadequate virtual security controls in a data center. It will cover utilizing best practices for security configurations, measuring information security status, and making rational decisions about security investments.
Connect with me if you have any questions or need additional information.
Please favorite this if you like it. I look forward to seeing you again soon.
Regards,
Hector Del Castillo
http://linkd.in/hdelcastillo
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
Abstract: Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. We propose a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge questions, we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user’s real data. Experiments conducted in a local file setting provide evidence that this approach may provide unprecedented levels of user data security in a Cloud environment.
Keywords: Mist, Insider data stealing, Bait information, Lure Files, Validating user
In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Now, recession-hit companies are increasingly realizing that simply by tapping into the cloud they can gain fast access to best-of-breed business applications or drastically boost their infrastructure resources, all at negligible cost. But as more and more information on individuals and companies is placed in the cloud, concerns are beginning to grow about just how safe an environment it is. This paper discusses security issues, requirements and challenges that cloud service providers (CSP) face during cloud engineering. Recommended security standards and management models to address these are suggested for technical and business community.
In today’s cloud-first environment, enterprises are embracing a heterogeneous cloud strategy that spans multiple public clouds as well as private clouds. This creates complexities for enterprise IT teams who need to ensure security across all of their applications and all of their infrastructure resources. This webinar will help you understand how to approach multi-cloud security.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
Ubiquitous computing has revolutionized interaction of humans and machines. Cloud computing has been mainly used for storing data and various computational purposes. It has changed the face of using the internet. But, as we know every technology has its pros and cons. Securing cloud environment is the most challenging issue for the researchers and developers. Main aspects which cloud security should cover are authentication, authorization, data protection etc. Establishing trust between cloud service providers (CSP) is the biggest challenge, when someone is discussing about cloud security. Trust is a critical factor which mainly depends on perception of reputation and self-assessment done by both user and CSP. The trust model can act as security strength evaluator and ranking service for cloud application and services. For establishing trust relationship between two parties, mutual trust mechanism is reliable, as it does verification from both sides. There are various trust models which mainly focuses on securing one party i.e., they validate either user or service node. In this survey paper, the study of various trust models and their various parameters are discussed.
ISACA Journal Publication - Does your Cloud have a Secure Lining? Shah SheikhShah Sheikh
ISACA Journal Publication Volume 5 written by Shah Sheikh - published in Q4 2013. Based on the Cloud Security Alliance Framework whitepaper titled "Does your Cloud have a Secure Lining?"
Cloud Computing Using Encryption and Intrusion Detectionijsrd.com
Cloud computing provides many benefits to the users such as accessibility and availability. As the data is available over the cloud, it can be accessed by different users. There may be sensitive data of organization. This is the one issue to provide access to authenticated users only. But the data can be accessed by the owner of the cloud. So to avoid getting data being accessed by the cloud owner, we will use the intrusion detection system to provide security to the data. The other issue is to save the data backup in other cloud in encrypted form so that load balancing can be done. This will help the user with data availability in case of failure of one cloud.
A traditional computing environment requires a costly
infrastructure to offer a better service to users. The introduction
of cloud computing has changed the working environment from
traditional to virtual. A larger number of IT companies are
utilizing the cloud. On the one hand, the cloud attracts more
number of consumers by offering services with minimized
capital cost and virtual infrastructure. On the other hand, there
are a risk and security challenges in cloud computing that
makes the user not to move completely towards it. The cloud
environment is more vulnerable to security breaches and data
theft. Moreover, insider attacks are more frequent in larger
enterprises. An unauthenticated user can cause more damage
to company reputation. The cloud service providers are trying
to provide a secure work environment for users. However,
there is a lack of global standards and policies to invoke
security measures in cloud computing. This study aims to
highlight and classify security challenges and trust issues in the
cloud environment.
The survey was conducted in various institutions and
governmental organizations in Saudi Arabia to study the
opinions of stakeholders on cloud computing security
challenges and risks.
Links:
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Establishing applications on on-demand infrastructures rather of building applica-tions on fixed and rigid infrastructures was provided by cloud computing provides. By merely exploiting into the cloud, initiatives can gain fast access to business applications or infrastructure resources with decreased Capital Expenditure (CAPEX). The more and more information is placed into the cloud by someone and initiatives, security issues begins to develop and raised. This paper discusses the different security issues that rise up about how secure the mo-bile cloud computing environment.
I want to thank everyone who attended this presentation at AFCOM Data Center World Fall 2011 in Orlando, FL.
Studies show the number of data centers deploying virtual cloud computing will rapidly increase in the next five years. Other studies show that the number of Internet attacks and their level of sophistication will also grow significantly. This session identifies approaches to reduce the risk of business disruptions resulting from inadequate virtual security controls in a data center. It will cover utilizing best practices for security configurations, measuring information security status, and making rational decisions about security investments.
Connect with me if you have any questions or need additional information.
Please favorite this if you like it. I look forward to seeing you again soon.
Regards,
Hector Del Castillo
http://linkd.in/hdelcastillo
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
Abstract: Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. We propose a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge questions, we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user’s real data. Experiments conducted in a local file setting provide evidence that this approach may provide unprecedented levels of user data security in a Cloud environment.
Keywords: Mist, Insider data stealing, Bait information, Lure Files, Validating user
In the last few years, cloud computing has grown from being a promising business concept to one of the fastest growing segments of the IT industry. Now, recession-hit companies are increasingly realizing that simply by tapping into the cloud they can gain fast access to best-of-breed business applications or drastically boost their infrastructure resources, all at negligible cost. But as more and more information on individuals and companies is placed in the cloud, concerns are beginning to grow about just how safe an environment it is. This paper discusses security issues, requirements and challenges that cloud service providers (CSP) face during cloud engineering. Recommended security standards and management models to address these are suggested for technical and business community.
In today’s cloud-first environment, enterprises are embracing a heterogeneous cloud strategy that spans multiple public clouds as well as private clouds. This creates complexities for enterprise IT teams who need to ensure security across all of their applications and all of their infrastructure resources. This webinar will help you understand how to approach multi-cloud security.
Steve Pappas shares his views on enabling Call Center Agents to become SME Rockstars from Day One. This was initially delivered as part of the last CRM Roundtable webinar sponsored by CRM Magazine.
Cloud computing is set of resources and services offered through the Internet. Cloud
services are delivered from data centers located throughout the world. Cloud computing
facilitates its consumers by providing virtual resources via internet. The biggest challenge in
cloud computing is the security and privacy problems caused by its multi-tenancy nature and the
outsourcing of infrastructure, sensitive data and critical applications. Enterprises are rapidly adopting
cloud services for their businesses, measures need to be developed so that organizations can be assured
of security in their businesses and can choose a suitable vendor for their computing needs. Cloud
computing depends on the internet as a medium for users to access the required services at any time on
pay-per-use pattern. However this technology is still in its initial stages of development, as it suffers
from threats and vulnerabilities that prevent the users from trusting it. Various malicious activities
from illegal users have threatened this technology such as data misuse, inflexible access control and
limited monitoring. The occurrence of these threats may result into damaging or illegal access of
critical and confidential data of users. In this paper we identify the most vulnerable security
threats/attacks in cloud computing, which will enable both end users and vendors to know a bout
the k ey security threats associated with cloud computing and propose relevant solution directives to
strengthen security in the Cloud environment. We also propose secure cloud architecture for
organizations to strengthen the security.
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
In this study, survey questions were sent to different non-profit and government organizations, which
assisted in collecting fundamental information. The data was acquired by conducting surveys in OpenStack
Company to identify the critical vulnerabilities in the cloud computing platform in order to provide the
recommended solutions.
So, analysis will be made on how the cloud’s characteristics such as the nature of the architecture,
attractiveness, as well as, vulnerability are tightly related to privacy and security issues. Privacy and
security are complex issues for which there is no standard and the relationship between them is necessarily
complicated. The study also highlight on the inherent challenge to data privacy because it typically results
in data to be presented in an encryption from the data owner. Thus, the study aimed at obtaining a common
goal to provide a comprehensive review of the existing security and privacy issues in cloud environments,
and identify and describe the most representative of the security and privacy attributes and present a
relationship among them.
Finally, in order to ensure that the standard measure of validity is achieved, validity test was conducted in
order to ensure that the study is free from errors. Various recommendations were provided. The study also
explored various areas that require future directions for each attribute, which comprise of multi-domain
policy integration and a secure service composition to design a comprehensive policy-based management
framework in the cloud environments.
Lastly, the recommendations will provide the potential for security and privacy approaches that can be
implemented to improve the cloud computing environment to ensure that a level of trust is achieved
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
Methodologies for Resolving Data Security and Privacy Protection Issues in Cl...AJASTJournal
Because of its accessibility and flexibility, cloud technology is among the most notable innovations in today's world. Having many service platforms, such as GoogleApps by Google, Amazon, Apple, and so on, is well accepted by large enterprises. Distributed cloud computing is a concept for enabling every-time, convenient, on-demand network access to processing resources including servers, storage devices, networks, and services that may be mutually configured. The major security risks for cloud computing as identified by the Cloud security alliance (CSA) have been examined in this study. Also, methods for resolving issues with cloud computing technology's data security and privacy protection were systematically examined
Because of its accessibility and flexibility, cloud technology is among the most notable innovations in today's world. Having many service platforms, such as GoogleApps by Google, Amazon, Apple, and so on, is well accepted by large enterprises. Distributed cloud computing is a concept for enabling every-time, convenient, on-demand network access to processing resources including servers, storage devices, networks, and services that may be mutually configured. The major security risks for cloud computing as identified by the Cloud security alliance (CSA) have been examined in this study. Also, methods for resolving issues with cloud computing technology's data security and privacy protection were systematically examined.
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
Cloud computing is utility-based computing provides many benefits to its clients but security is one aspect which is delaying its adoptions. Security challenges include data security, network security and infrastructure security. Data security can be achieved using Cryptography. If we include location information in the encryption and decryption process then we can bind access to data with the location so that data can be accessed only from the specified locations. In this paper, we propose a method based on the symmetric cryptography, location-based cryptography and ciphertext policy – Attribute-based encryption (CP-ABE) to implements secure access control to the outsourced data. The Symmetric key is used to encrypt that data whereas CP-ABE is used to encrypt the secret key and the location lock value before uploading on the server. User will download encrypted data and the symmetric secret key XORed with the Location Lock value, using his attributes based secret key he can obtain first XORed value of Symmetric secret key and location lock value. Using anti-spoof GPS Location lock value can be obtained which can be used to retrieve the symmetric secret key. We have adopted Massage Authentication Code (MAC) to ensure Integrity and Availability of the data. This protocol can be used in the Bank, government organization, military services or any other industry those are having their offices/work location at a fixed place, so data access can be bounded to that location.
Single Sign-on Authentication Model for Cloud Computing using KerberosDeepak Bagga
ABSTRACT
In today’s organizations need for several new resources and storage requirements for terabytes of data is generated every day. Cloud computing provides solution for this in a cost effective and efficient manner. Cloud computing provides on demand resources as services to clients. Cloud is highly scalable and flexible. Although it is benefiting the clients in several ways but as data is stored remotely it has many security loopholes like attacks, data lose, other security and authentication issues. In this paper we are proposing an authentication model for cloud computing based on the Kerberos protocol to provide single sign-on and to prevent against DDOS attacks. This model can benefit by filtering against unauthorized access and to reduce the burden, computation and memory usage of cloud against authentication checks for each client. It acts as a third party between cloud servers and clients to allow secure access to cloud services. In this paper we will see some of the related work for cloud security issues and attacks. Then in next section we will discuss the proposed architecture, its working and sequential process of message transmission. Next we will see how it can prevent against DDOS attacks, some benefits and how it provides single sign-on.
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
The Most great challenging in Cloud computing is Security. Here Security plays key role
in this paper proposed concept mainly deals with security at the end user access. While coming to the
end user access that are connected through the public networks. Here the end user wants to access his
application or services protected by the unauthorized persons. In this area if we want to apply
encryption or decryption methods such as RSA, 3DES, MD5, Blow fish. Etc.,
Whereas we can utilize these services at the end user access in cloud computing. Here there is
problem of encryption and decryption of the messages, services and applications. They are is lot of
time to take encrypt as well as decrypt and more number of processing capabilities are needed to use
the mechanism. For that problem we are introducing to use of cloud computing in SaaS model. i.e.,
scalable is applicable in this area so whenever it requires we can utilize the SaaS model.
In Cloud computing use of computing resources (hardware and software) that are delivered as a
service over Internet network. In advance earlier there is problem of using key size in various
algorithm like 64 bit it take some long period to encrypt the data.
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware, networking, and services integrate to offer different computational facilities, while Internet or a private network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud system delimit the benefits of cloud computing like “on-demand, customized resource availability and performance management”. It is understood that current IT and enterprise security solutions are not adequate to address the cloud security issues. This paper explores the challenges and issues of security concerns of cloud computing through different standard and novel solutions. We propose analysis and architecture for incorporating different security schemes, techniques and protocols for cloud computing, particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and is not coupled with the underlying backbone. This would facilitate to manage the cloud system more effectively and provide the administrator to include the specific solution to counter the threat. We have also shown using experimental data how a cloud service provider can estimate the charging based on the security service it provides and security-related cost-benefit analysis can be estimated.
Cloud computing is a distributed computing system that offers managed, scalable and secured and high available computation resources and software as a service. Mobile computing is the combination of the heterogeneous domains like Mobile computing, Cloud computing & wireless networks.This paper mainly discusses the literature review on Cloud and the Mobile cloud computing. Here in this paper we analyse existing security challenges and issues involved in the cloud computing and Mobile cloud environment. This paper identifies key issues, which are believed to have long-term significance in cloud computing & mobile cloud security and privacy, based on documented problems and exhibited weaknesses.
Similar to Design and implement a new cloud security method based on multi clouds on open stack platform (20)
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
2. 84 Computer Science & Information Technology (CS & IT)
Data that is stored on cloud must be secured while at rest, in transit, and inuse, and access to the
data needs to be controlled. Standards for communications protocols and public key certificates
allow data transfers to be protected using cryptography.Currently, the responsibility for
cryptographic key management falls mainly on the cloud service subscriber.
Threewidely referenced service models have evolved:
• Software-as-a-Service (SaaS) enables a software deployment model in which one or
more applications and the computing resources that run them are provided for use on
demand as a turnkey service. It can reduce the total cost of hardware and software
development, maintenance, and operations.
• Platform-as-a-Service (PaaS) enables a software deployment model in which the
computing platform is provided as an on-demand service which applications can be
developed upon and deployed. It can reduce the cost and complexity of buying, housing,
and the managing of hardware and software components of the platform.
• Infrastructure-as-a-Service (IaaS) enables a software deployment model in which the
basic computing infrastructure of servers, software, and network equipment is provided
as an on-demand service upon which a platform to develop and execute applications can
be founded. It can be used to avoid buying, housing, and managing the basic hardware
and software infrastructure components.
In September2009, IDC Enterprise Panel held its annual survey on cloud computing
organizations about the most important challenges of cloud services. The result of this survey
showed security among people who want to use cloud services is the most important challenge.
Figure 1 shows the result in percentage of the survey's concerns.
So if we want cloud computing as a useful service we should provide confidentiality and security
for it to reduce this concern. Otherwise clouds can't reach a good position among people for
using.
Cloud users and providers have many concerns about using it as a new technology. When
considering using a cloud service, the user must be aware of the fact that all data given to the
cloud provider leaves his/her own control and protection sphere.
Figure 1. Result of percentage of survey's concerns by IDC, 2009
3. Computer Science & Information Technology (CS & IT) 85
Even more so, if deploying data-processing applications to the cloud (via IaaS or PaaS),a cloud
provider gains full control on these processes. If an attacker is able to intrude the cloud system,
all of the data and processes of users operating on that cloud system, may become subject to
malicious actions by that attacker. So the methods that cloud providers use to protect their clouds
from threats and also the policy for accessing to the cloud by the users must be declared.
2. SECURITY THREATS FOR CLOUDS
As described security is the most important concern in cloud computing. This issue is organized
into several general categories: trust, architecture, identity management, software isolation, data
protection, and availability. So many threats to cloud computing can exist.
CSA(Cloud Security Alliance) is a research group on cloud security. They released their research
results as “Top Threats to Cloud Computing” in 2010 in which they introduce the 7 top threats to
clouds security challenges. The top threats they released consist of :
• Abuse and Nefarious Use of Cloud Computing
• Insecure Application Programming Interfaces
• Malicious Insiders
• Shared Technology Vulnerabilities
• Data Loss/Leakage
• Account, Service & Traffic Hijacking
• Unknown Risk Profile
The purpose of these are to provide desirable context to assist organizations in making educated
risk management decisions regarding their cloud adoption strategies.
For the common case of a cloud provider hosting and processing all of its user’s data, an
intrusion would immediately affect all security requirements: accessibility, integrity, and
confidentiality of data and processes may become violated,and further malicious actions may be
performed on behalf of the cloud user’s identity.
So providing a strong trusting relationship between the cloud providers and the cloud users is still
indispensable.Providers should make and represent their security solutions for cloud threats to
decrease consumer and organization's concerns.
Security must be provided in each layers of clouds. If we only have a safe physical layer, users
will still have concerns about network layers, application layers and others. Although security
approach should being applied on all cloud services contains infrastructure-as-a-service (IaaS)
security, providers’ platform-as-a-service (PaaS) security and software-as-a-service (SaaS)
security.
So our method should be complete and shouldn’t allow any attackers to access or change our
cloud's content.
Security problems for clouds do not have any real comprehensive solutions and existing cloud
security is in its infancy. There is a need for an approach to cloud security that is holistic,
adaptable, and reflects client requirements.
4. 86 Computer Science & Information Technology (CS & IT)
Cloud providers and researchers all over the world worked on this issue and tried many solutions
to reduce security risks of the cloud and they reached some solutions for each threat such as
authentication, authorization and identification to provide confidentiality, isolation and
encryption of cloud data in other layer. But cloud computing becomes bigger and bigger and its
challenges grow too.
3. SECURE CLOUD BASED ON MULTICLOUDS METHODOLOGY
Cloud costumers and users worry about using this phenomenon today. We decided to suggest a
useful method to decrease cloud's security threats of which we then designed its architecture. And
last,we used a platform to implement our security model . We will now explain these steps.
Our method is based on multiple clouds. In other words we use this model to create a secure
cloud. We think this model increases our cloud's transparency for consumers and decreases some
user's concern about the complexity of clouds and their type of needs of our requests for variety
of access level. We have some clouds in our model's architecture that user's data has been put on
them. Our clouds are nested and each of them have an access level that according to the needs,
this data put on each of them.
For choosing which cloud layer we want to put our data in, first after connecting to the server it
asks us about which cloud we want to save our data. In other word we design a contract that
forces clients to choose their level of storage and give their username and convert it to hash and
save it. The server should sign an international security communication protocol mutuall to
ensure user data security and save or recover their data in any circumstances. As we described
one of the most common compliance issues facing an organization is data location. In our method
we use external audits and security certifications to alleviate this concern. These certifications are
different in various countries and it depends on where our method swere used for example
DSS(Data Security Standards), The EC Data Protection Directive, GLBA (The Gramm-Leach
Bliley Act), CPNI (The FCC Customer Proprietary Network Information rules) and so on.
Availability is one of our main targets for our secure cloud method. Availability means that an
organization has its full set of computing resources accessible and usable at all times. It can be
affected temporarily or permanently, and a loss can bepartial or complete. Denial of service
attacks,equipment outages, and natural disasters are all threatsto availability.The level of
reliability of our cloud service and also its capabilities forbackup and recovery is taken into
account inthe organization’s contingency planning to address the restoration and recovery of
disrupted cloud layers and operations, using alternate services, equipment,and locations.
In our method we describe a cloud that is in the outer surface. We named this cloud "Cloud by
public access" and called it CBPA as abbreviation. This is a public cloud. All of our clouds are in
this. Data and application that put in CBPA don’t have any protection. So in this layer of our
cloud, typically, we have some costumer's data, open source programs and applications and
platforms which they don’t want to do any security method or authentication on it. (So
developers don't put any preventive method from intruders attack on it. Here is a diagram of our
cloud in which CBPA is determined.
Notice that everyone can have access to all things that are put in this layer so all of the data that’s
put in this layer is not secure and costumers shouldn't put their important data on it. This is
5. Computer Science & Information Technology (CS & IT) 87
appropriate for only open source applications or infrastructures or data that they want to show to
all costumers. This access level can increase transparency of our cloud and access to this layer is
faster than other layers but it has less security than other layers of our method.
Besides authentication, the capability to adapt user privileges and maintain control over access to
resources is also required, as part of identity management. Standards like the Extensible Access
Control Markup Language (XACML) can be employed to control access to cloud resources,
instead of using a service provider’s proprietary interface. XACML focuses on the mechanism
for arriving at authorization decisions, which complements SAML’s focus on the means for
transferring authentication and authorization decisions between cooperating entities. Messages
transmitted between XACML entities are susceptible to attack by malicious third parties, making
it important to have safeguards in place to protect decision requests and authorization decisions
from possible attacks, including unauthorized disclosure, replay, deletion and modification.
Figure 2. Secure Cloud Architecture base on Multi Clouds
This cloud type includes two types of private clouds: "cloud by group access (CBGA)" and
"cloud by personal access (CBPeA)"that_are in the CBPA.
Another cloud in our model that we want to define is "cloud by group access (CBGA)" that
located in CBPA. In other wordsthis layer is a branch of our multi cloud model that is in cloud by
public access and provides different access level for data.In this layer we considered some
security solutions for accessing the contents.
Group access means having some users in a group by identical access level. This model is useful
for companies, organizations or any groups that want to have a cloud to put their data in
platforms on it for their clients to read, write and edit their information. In our design for this
cloud we put some security proceeding to have a more secure level. As we explained before for
access to secure clouds we should provide confidentiality. So in this level we
supplyconfidentiality by three security methods: Identification, authentication and authorization
and supply cloud security by isolation of data. As a service provider we have to ensure dynamic
flexible delivery of service and isolation of user resources. For doing this security level we used
OpenStack platform and it used two layers for isolating data.
This method here is performed in two levels: first we do these work to authenticate the user that
was in this CBGA which this level eliminate one of the most important concerns of cloud
consumers but after this security level because we want attackers or Intruders can't access to
group's information or to prevent information access by illegal clients, when one of our privileged
6. 88 Computer Science & Information Technology (CS & IT)
clients loses his/her public keys we introduce a second level for this type of cloud that is used to
authenticate person who is in the group. This authentication method is used for group members to
secure their access on groups and make group safe.
Figure 3. Architecture of CBPeA and ABGA
Another cloud _ we designed is "cloud by personal access (CBPeA)" that is suitable for saving
personal data.
In this cloud we have some solutions to keep data secure too. Usage of this type of cloud is more
than other types because all of the consumers can save their information on this cloud layer
which only they can access and it provides confidentiality and isolation of data like CBPA. But
we have some difference in this cloud designing. CBPeAconsists another cloud in itself named
"cloud by secure personal access (CBSPeA) that is more secure than normal personal access. In
this type we designed encryptionfor data that consumers want to save in addition to the
authentication, authorization, identification and isolation.
So we have a secure cloud in this layer that no one can access _ unless main users whose data it
is. This cloud is appropriate for user information that is personal and they want to be more secure
than other information for example they can put their confidential documents, personal tools or
anything that they don't want anyone to access _. Here is the view of this cloud type in our model.
4. IMPELEMENTATION OF METHOD ON OPENSTACK PLATFORM
So we designed our method and explained our architecture.For implementing our cloud model we
use OpenStack platform. OpenStack offers open source software to build public and private
clouds.This platform has three main components: Compute, Object Storage, and Image Service.
OpenStack Compute is a cloud fabric controller, used to start up virtual instances for either a user
or a group. It's also used to configure networking for each instance or project that contains
multiple instances for a particular project. OpenStack Object Storage is a system to store objects
in a massively scalable large capacity system with built-in redundancy and failover. OpenStack
Image Service is a lookup and retrieval system for virtual machine images. Our public and
private clouds have these components. The OpenStack Compute component of our public cloud
can control & manage the inner private clouds. It connects to the compute component of the
private clouds. The following diagram shows the basic relationships between the projects, how
they relate to each other:
7. Computer Science & Information Technology (CS & IT)
Figure 4. Cloud Secure Architecture with cloud layers names
Figure 5. API Layer on openStack platform
In OpenStack compute component we
controller, and Node Controller.
controlling the current cloud & the other clouds which are connected to main cloud. This
component have a relation to other components. They are Cluster Controller(CLC),Object
Storage, and Image Service. These relat
protocol. Cluster Controller(CLC) is the manager of the clusters. A cluster is a collection of
computers(Nodes) which have been connected to a main server(Frontend). In a cloud we could
have one or some clusters. Object Storage has a server that manage the space of the storage of our
cloud, we name this server Storage Controller(SC). Image Service has a server for managing the
instances of virtual machines and saving of images, we name this server Instance
Controller(IC).Each of these server applications run as a daemon
background process) in a Linux base OS.
graphical user interface web application for accessing to it, we need a web se
running the web application scripts(We use PHP). This web server is usually in CC server, but it
could be in the other assigned server or an external server(Host).This web based interface has a
relation to the CC server and uses the prima
Computer Science & Information Technology (CS & IT)
Figure 4. Cloud Secure Architecture with cloud layers names
Figure 5. API Layer on openStack platform
In OpenStack compute component we have three subcomponents: Cloud controller,
controller, and Node Controller. The main task of Cloud Controller(CC) are management &
controlling the current cloud & the other clouds which are connected to main cloud. This
component have a relation to other components. They are Cluster Controller(CLC),Object
Storage, and Image Service. These relations are done by REST/SOAP messaging over http
protocol. Cluster Controller(CLC) is the manager of the clusters. A cluster is a collection of
computers(Nodes) which have been connected to a main server(Frontend). In a cloud we could
rs. Object Storage has a server that manage the space of the storage of our
cloud, we name this server Storage Controller(SC). Image Service has a server for managing the
instances of virtual machines and saving of images, we name this server Instance
roller(IC).Each of these server applications run as a daemon (A computer program runs as a
d process) in a Linux base OS. Since the each cloud computing service needs a
graphical user interface web application for accessing to it, we need a web server for saving &
running the web application scripts(We use PHP). This web server is usually in CC server, but it
could be in the other assigned server or an external server(Host).This web based interface has a
relation to the CC server and uses the primary authentications for accessing to it. In our model,
89
controller, Cluster
of Cloud Controller(CC) are management &
controlling the current cloud & the other clouds which are connected to main cloud. This
component have a relation to other components. They are Cluster Controller(CLC),Object
ions are done by REST/SOAP messaging over http
protocol. Cluster Controller(CLC) is the manager of the clusters. A cluster is a collection of
computers(Nodes) which have been connected to a main server(Frontend). In a cloud we could
rs. Object Storage has a server that manage the space of the storage of our
cloud, we name this server Storage Controller(SC). Image Service has a server for managing the
instances of virtual machines and saving of images, we name this server Instance
(A computer program runs as a
Since the each cloud computing service needs a
rver for saving &
running the web application scripts(We use PHP). This web server is usually in CC server, but it
could be in the other assigned server or an external server(Host).This web based interface has a
ry authentications for accessing to it. In our model,
8. 90 Computer Science & Information Technology (CS & IT)
the main cloud which is public(CBPA) has a CC server that has a connection to its CLCs,SCs &
ICs. We assigned for each server a static class C IP( eg. 192.168.100.1 for CC,192.168.100.2 for
CLC,192.168.100.3 for SC & 192.168.100.4 for IC). The inner clouds which are
private(CBGA,CBPeA,CBSpeA) have these components too. The CC of the main cloud has
connection to the CCs of these clouds. In fact one of the tasks of our main CC is management of
the inner clouds CC. The procedure is that the user enters his/her username & password in web
application UI and after a authentication He/She can se the cloud. In this mode the user can use
the public services in cloud such as a application programs(SaaS) ,Platforms(Paas) and a
resources(IaaS).If the user(Often a organization) want to has a private cloud, they can use the
inner private clouds. For accessing to these they are authenticated again. Each of the
authentication actions are done via the components of Object Compute(CC). The users of each
group or organization have access to their clouds by group access(CBGA) data jointly. For
accessing to each data we define a policy for each of them. It means that which user or group can
access to that data or instance. This is what we name it Authorization in security. These
authorization are done via the components of Object Storage(SC) and Image Service(IC). The
isolation of the data is done by these components too.
5. CONCLUSION
Cloud computing will soon be a big approach in the entire world that conquers all ancient
technology. But it depends on removing all concern about this challenge. The migration to a
cloud computing environment isin many ways an exercise in risk management. Bothqualitative
and quantitative factors apply in ananalysis. An appropriate balancebetween the strength of
controls and the relative riskassociated with particular programs and operationsmust be ensured.
Nowadays Many companies, researchers and cloud developers are working on clouds and most
of them work spatially on cloud security as the biggest challenge of like Amazon, Google, IBM
and so on.They design their methods and publish them. Also they alwaystest their new method on
cloud systems or even big social networks but still they don't find a complete way to create a
secure cloud. Some organizations like ENISA, CSA and ISAKA survey the future of cloud
security.
We think our designed model has more secure levels than other models that can make clouds
more secure. But we don't claim our model is complete because several critical pieces of
technology, such as a solutionfor federated trust, are not yet fully realized, impingingon
successful deployments. In security issues completeness is an ultimate goal but no one can access
it.
REFERENCES
[1] Wayne A. Jansen, ―Cloud Hooks: Security and Privacy Issues in Cloud Computingǁ, 44th Hawaii
International Conference on System Sciesnces 2013.
[2] D. Hubbard and M. Sutton, “Top Threats to Cloud Computing V1.0,” Cloud Security Alliance, 2013.
Available:http://www.cloudsecurityalliance.org/topthreats
[3] P. Mell, T. Grance, The NIST Definition of Cloud Computing, Version 15, National Institute of
Standards and Technology, October 7, 2011,http://csrc.nist.gov/groups/SNS/cloud-computing
9. Computer Science & Information Technology (CS & IT) 91
[4] http://www.openstack.org/projects/openstack-security/
[5] L. Youseff, M. Butrico, D. D. Silva, Toward a Unified Ontology of Cloud Computing, Grid
Computing Environments Workshop, held with SC08, November 2014
http://www.cs.ucsb.edu/~lyouseff/CCOntology/CloudOntolo gy.pdf
[6] M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, “On technical security issues in cloud
compxuting,” in Proceedings of the IEEE International Conference on Cloud Computing (CLOUD-
II), 2012.
[7] D. Cappelli, A. Moore, R. Trzeciak, T. J. Shimeall, Common Sense Guide to Prevention and
Detection of Insider Threats, 3rd Edition, Version 3.1, CERT, January 2015,
http://www.cert.org/archive/pdf/CSG-V3.pdf
[8] M. Burkhart, M. Strasser, D. Many, and X. Dimitropoulos,“SEPIA: Privacy-Preserving Aggregation
of Multi-Domain Network Events and Statistics,” in USENIX Security Symposium, 2013.
[9] Y. Keleta, J. H. P. Eloff, H. S. Venter, Proposing a Secure XACML Architecture Ensuring Privacy
and Trust, Research in Progress Paper, University of Pretoria, 2005,
http://icsa.cs.up.ac.za/issa/2005/Proceedings/Research/093_A rticle.pdf
[10] http://docs.openstack.org/trunk/openstack/compute/admin/content/components-of-openstack.html
[11] S. Ramgovind, M.M. Eloff, and E. Smith, “The Management of Security in Cloud Computing,”
IEEE, 2010,
[12] X. Jing, and Z. Jian-jun, “A brief Survey on the Security model of Cloud Computing,” IEEE, 2013
[13] M. P. Eisenhauer, Privacy and Security Law Issues in Off-shore Outsourcing Transactions, Hunton&
Williams LLP, The Outsourcing Institute, February 15, 2012,
http://www.outsourcing.com/legal_corner/pdf/Outsourcing_Privacy.pdf
[14] B. R. Kandukuri, R. Paturi V, A. Rakshit, Cloud Security Issues, IEEE International Conference on
Services Computing, Bangalore, India, September 21-25, 2015
[15] S. Overby, How to Negotiate a Better Cloud Computing Contract, CIO, April 21, 2010,
http://www.cio.com/article/591629/How_to_Negotiate_aBetter_Cloud_Computing_Contract
[16] T. Ristenpart, E. Tromer, H. Shacham, S. Savage, Hey, You, Get Off of My Cloud: Exploring
Information Leakage in Third-Party Compute Clouds, ACM Conference on Computer and
Communications Security, November 2014
[17] C. Wang, “Forrester: A Close Look At Cloud Computing Security Issues,” CSO. 2009
[18] J. Somorovsky, M. Heiderich, M. Jensen, J. Schwenk, N. Gruschka, and L. Lo Iacono, “Breaking the
clouds – security analysis of cloud management interfaces,” (in submission),2014.
[19] S. Pearson, Taking Account of Privacy when Designing Cloud Computing Services, ICSE Workshop
on Software Engineering Challenges of Cloud Computing, May 23, 2013, Vancouver, Canada
[20] A. Greenberg, IBM's Blindfolded Calculator, Forbes Magazine, July 13, 2014