Because of its accessibility and flexibility, cloud technology is among the most notable innovations in today's world. Having many service platforms, such as GoogleApps by Google, Amazon, Apple, and so on, is well accepted by large enterprises. Distributed cloud computing is a concept for enabling every-time, convenient, on-demand network access to processing resources including servers, storage devices, networks, and services that may be mutually configured. The major security risks for cloud computing as identified by the Cloud security alliance (CSA) have been examined in this study. Also, methods for resolving issues with cloud computing technology's data security and privacy protection were systematically examined.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
Deployment of using cloud services as a new approach to keep people's platforms, Infrastructure and applications has become an important issue in the world of communications technology. This is a very useful paradigm for humans to obtain their essential needs simpler, faster ,more flexible, and safer than before. But there are many concerns about this system challenge. Security is the most important challenge for cloud systems. In this paper we design and explain the procedure of implementation of a new method for cloud services based on multi clouds on our platform which supplies security and privacy more than other clouds. We introduce some confidentiality and security methods in each layer to have a secure access to requirements. The architecture of our method and the implementation of method on our selected platform for each layer are introduced in this paper.
Design and implement a new cloud security method based on multi clouds on ope...csandit
Deployment of using cloud services as a new approach to keep people's platforms,
Infrastructure and applications has become an important issue in the world of communications
technology. This is a very useful paradigm for humans to obtain their essential needs simpler,
faster ,more flexible, and safer than before. But there are many concerns about this system
challenge. Security is the most important challenge for cloud systems. In this paper we design
and explain the procedure of implementation of a new method for cloud services based on multi
clouds on our platform which supplies security and privacy more than other clouds. We
introduce some confidentiality and security methods in each layer to have a secure access to
requirements. The architecture of our method and the implementation of method on our selected
platform for each layer are introduced in this paper.
Today, in the world of communication, connected systems is growing at a rapid pace. To accommodate this growth the need for computational power and storage is also increasing at a similar rate. Companies are investing a large amount of resources in buying, maintaining and ensuring availability of the system to their customers. To mitigate these issues, cloud computing is playing a major role [1]. The underlying concept of cloud computing dates back to the ‘50s but the term entering into widespread usage can be traced to 2006 when Amazon.com announced the Elastic Compute Cloud. In this paper, we will discuss about cloud security approaches. We have used the term “CloudDrain” to define data leakage in case of security compromise.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
Deployment of using cloud services as a new approach to keep people's platforms, Infrastructure and applications has become an important issue in the world of communications technology. This is a very useful paradigm for humans to obtain their essential needs simpler, faster ,more flexible, and safer than before. But there are many concerns about this system challenge. Security is the most important challenge for cloud systems. In this paper we design and explain the procedure of implementation of a new method for cloud services based on multi clouds on our platform which supplies security and privacy more than other clouds. We introduce some confidentiality and security methods in each layer to have a secure access to requirements. The architecture of our method and the implementation of method on our selected platform for each layer are introduced in this paper.
Design and implement a new cloud security method based on multi clouds on ope...csandit
Deployment of using cloud services as a new approach to keep people's platforms,
Infrastructure and applications has become an important issue in the world of communications
technology. This is a very useful paradigm for humans to obtain their essential needs simpler,
faster ,more flexible, and safer than before. But there are many concerns about this system
challenge. Security is the most important challenge for cloud systems. In this paper we design
and explain the procedure of implementation of a new method for cloud services based on multi
clouds on our platform which supplies security and privacy more than other clouds. We
introduce some confidentiality and security methods in each layer to have a secure access to
requirements. The architecture of our method and the implementation of method on our selected
platform for each layer are introduced in this paper.
Today, in the world of communication, connected systems is growing at a rapid pace. To accommodate this growth the need for computational power and storage is also increasing at a similar rate. Companies are investing a large amount of resources in buying, maintaining and ensuring availability of the system to their customers. To mitigate these issues, cloud computing is playing a major role [1]. The underlying concept of cloud computing dates back to the ‘50s but the term entering into widespread usage can be traced to 2006 when Amazon.com announced the Elastic Compute Cloud. In this paper, we will discuss about cloud security approaches. We have used the term “CloudDrain” to define data leakage in case of security compromise.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Challenges and Proposed Solutions for Cloud ForensicIJERA Editor
Cloud computing is a heavily evolving topic in information technology (IT). Rather than creating, deploying and managing a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. Due to this large scale, in case an attack over the network of cloud, it’s a great challenge to investigate to cloud. There is a very low research done to develop the theory and practice of cloud forensic. The investigator has huge challenge of getting the IP address of the culprit as there is dynamic IP in cloud computing. Also one among many problems is that the customer is only concerned of security and threat of unknown. The cloud service provider never lets customer see what is behind "virtual curtain" which leads customer more doubting for the security and threat issue. In cloud forensics, the lack of physical access leads to big challenge for investigator. In this paper we are presenting few common challenges which arise in cloud forensic and proposed solution to it. We will also discuss the in brief about cloud computing and cloud forensic.
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
In this study, survey questions were sent to different non-profit and government organizations, which
assisted in collecting fundamental information. The data was acquired by conducting surveys in OpenStack
Company to identify the critical vulnerabilities in the cloud computing platform in order to provide the
recommended solutions.
So, analysis will be made on how the cloud’s characteristics such as the nature of the architecture,
attractiveness, as well as, vulnerability are tightly related to privacy and security issues. Privacy and
security are complex issues for which there is no standard and the relationship between them is necessarily
complicated. The study also highlight on the inherent challenge to data privacy because it typically results
in data to be presented in an encryption from the data owner. Thus, the study aimed at obtaining a common
goal to provide a comprehensive review of the existing security and privacy issues in cloud environments,
and identify and describe the most representative of the security and privacy attributes and present a
relationship among them.
Finally, in order to ensure that the standard measure of validity is achieved, validity test was conducted in
order to ensure that the study is free from errors. Various recommendations were provided. The study also
explored various areas that require future directions for each attribute, which comprise of multi-domain
policy integration and a secure service composition to design a comprehensive policy-based management
framework in the cloud environments.
Lastly, the recommendations will provide the potential for security and privacy approaches that can be
implemented to improve the cloud computing environment to ensure that a level of trust is achieved
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
Cloud computing is set of resources and services offered through the Internet. Cloud
services are delivered from data centers located throughout the world. Cloud computing
facilitates its consumers by providing virtual resources via internet. The biggest challenge in
cloud computing is the security and privacy problems caused by its multi-tenancy nature and the
outsourcing of infrastructure, sensitive data and critical applications. Enterprises are rapidly adopting
cloud services for their businesses, measures need to be developed so that organizations can be assured
of security in their businesses and can choose a suitable vendor for their computing needs. Cloud
computing depends on the internet as a medium for users to access the required services at any time on
pay-per-use pattern. However this technology is still in its initial stages of development, as it suffers
from threats and vulnerabilities that prevent the users from trusting it. Various malicious activities
from illegal users have threatened this technology such as data misuse, inflexible access control and
limited monitoring. The occurrence of these threats may result into damaging or illegal access of
critical and confidential data of users. In this paper we identify the most vulnerable security
threats/attacks in cloud computing, which will enable both end users and vendors to know a bout
the k ey security threats associated with cloud computing and propose relevant solution directives to
strengthen security in the Cloud environment. We also propose secure cloud architecture for
organizations to strengthen the security.
Abstract: Cloud computing model are obtaining ubiquitous authorization due to the heterogeneous convenience they provide. Although, the
security & privacy problems are the main considerable encumbrance holding back the universal adoption of this new emerging technology.
Various researches are concentrated on enhancing the security on Software as well as Hardware levels on the cloud. But these interpretations do
not mainly furnish the complete security way and therefore the data security compute (measure) are still kept under the access control of service
provider. Trusted Computing is another research concept. In actuality, these furnish a set of tools controlled by the third party technologies to
secure the Virtual Machines from the cloud computing providers. These approaches provides the tools to its consumers to assess and monitor the
aspects of security their data, they don’t allocate the cloud consumers with high control capability. While as the new emerging DCS approach
aims to provide the security of data owners of their data. But the DCS approach concept is elucidate in many ways and there is not a
standardized framework of cloud computing environment model for applying this approach.
This presentation gives a detailed overview about Cloud Computing, its features and challenges faced by it in the market. It gives an insight into cloud security and privacy issues and its measures.
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
Ubiquitous computing has revolutionized interaction of humans and machines. Cloud computing has been mainly used for storing data and various computational purposes. It has changed the face of using the internet. But, as we know every technology has its pros and cons. Securing cloud environment is the most challenging issue for the researchers and developers. Main aspects which cloud security should cover are authentication, authorization, data protection etc. Establishing trust between cloud service providers (CSP) is the biggest challenge, when someone is discussing about cloud security. Trust is a critical factor which mainly depends on perception of reputation and self-assessment done by both user and CSP. The trust model can act as security strength evaluator and ranking service for cloud application and services. For establishing trust relationship between two parties, mutual trust mechanism is reliable, as it does verification from both sides. There are various trust models which mainly focuses on securing one party i.e., they validate either user or service node. In this survey paper, the study of various trust models and their various parameters are discussed.
https://jst.org.in/index.html
Our Journals has a act as vehicles for the dissemination of knowledge, making research findings accessible to a wide audience. This accessibility is vital for the progress of education, as it allows students, educators, and professionals to stay informed about the latest developments in their respective fields.
Cloud Computing Security Issues and ChallengesCSCJournals
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
The cloud is a network of virtual computers that are linked together and may exhibit and offer computational capabilities continuously depending on certain Service Level Agreements (SLAs) that have been agreed between the parties to a contract between the clients and the internet provider. Cloud computing has several benefits, including endless computational resources, cheap cost, security controls, hypervisor protection, instantaneous elasticity, high throughput, and fault-tolerant solutions with increased performance. Since cloud computing is a comparatively recent computing model, there exists a lot of uncertainty about how well confidentiality of all levels, including host, network, data levels, and implementation, can be achieved. As a result, there still are important obstacles to cloud computing adoption. These constraints include security issues concerning privacy, compliance, and legal issues. When databases and software applications are moved from the cloud to large data centers, data management becomes a major challenge. Numerous security issues may develop while using cloud computing, including issues with privacy and control, virtualization and accessibility issues, confidentiality, management of credentials and identities, authentication of responding devices, and authenticity. In this paper, an effort is made to offer a comprehensive review of data security and threats in cloud computing.
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
The cloud is a network of virtual computers that are linked together and may exhibit and offer computational capabilities continuously depending on certain Service Level Agreements (SLAs) that have been agreed between the parties to a contract between the clients and the internet provider. Cloud computing has several benefits, including endless computational resources, cheap cost, security controls, hypervisor protection, instantaneous elasticity, high throughput, and fault-tolerant solutions with increased performance. Since cloud computing is a comparatively recent computing model, there exists a lot of uncertainty about how well confidentiality of all levels, including host, network, data levels, and implementation, can be achieved. As a result, there still are important obstacles to cloud computing adoption. These constraints include security issues concerning privacy, compliance, and legal issues. When databases and software applications are moved from the cloud to large data centers, data management becomes a major challenge. Numerous security issues may develop while using cloud computing, including issues with privacy and control, virtualization and accessibility issues, confidentiality, management of credentials and identities, authentication of responding devices, and authenticity. In this paper, an effort is made to offer a comprehensive review of data security and threats in cloud computing.
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTUREcscpconf
Cloud computing is a computing environment consisting of different facilitating components likehardware, software, firmware, networking, and services. Internet or a private network providesthe required backbone to deliver the cloud services. The benefits of cloud computing like “ondemand,
customized resource availability and performance management” are overpowered bythe associated security risks to the cloud system, particularly to the cloud users or clients.Existing traditional IT and enterprise security are not adequate to address the cloud securityissues. In order to deploy different cloud applications, it is understood that security concerns of
cloud computing are to be effectively addressed. Cloud security is such an area which deals with the concerns and ulnerabilities of cloud computing for ensuring safer computing environment. This paper explores the challenges and issues of security concerns of cloud computing through different standard and novel solutions. This paper proposes architecture for
incorporating different security schemes, techniques and protocols for cloud computing,particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems.
The proposed architecture is generic in nature, not dependent on the type of cloud deployment,application agnostic and is not coupled with the underlying backbone. This would facilitate to
manage the cloud system more effectively and provide the administrator to include the specific solution to counter the threat.
In the early twentieth century, major representatives of the Jadid movement became active participants in the socio-political processes in the Turkestan region. Usmonkhoja Polatkhoja, a progressive from Bukhara, was one of the beams not only in the Emirate of Bukhara, but also in Turkestan. He first participated in the reforms and progressives, and later in the national liberation movements, and fought for the prosperity and independence of the country.This article provides information about Usmonkhoja's life and work in Jadidism, revolts, national liberation struggles, and emmigiration.
Flood is one of the natural disaster known to be part of the earth biophysical processes, which its occurrence can be devastating; due to mostly anthropogenic activities and climatological factors. The aim of the research is to identify and map the extent at which the impact of flood due to intense rainfall and rise in water in the study area using geospatial techniques and the specific objectives are to carry out terrain analysis of the study area and to generate flood indicator maps of the study area. The study analyzed rain fall data;, the drainage system and Shuttle Radar Topographic Mission (SRTM 30m) of the area. ArcGIS 10.8 was to modelled and to generate the contributing factors map of the study area. The drainage system was generated through on-screen digitization of topographic map of scale 1:50,000 of Ondo South-West. The mean annual rainfall of Lagos State was generated in the ArcGIS environment from the rainfall data through spatial analysis tool. The SRTM was used in terrain analysis of the study area. The results generated showed the lowest mean annual rain fall of the area 1,700mm and the highest mean annual rain fall was 2,440mm. Digital elevation model (DEM), slope, flow direction were generated from the SRTM. Drainage density of the area was generated using the drainage system. The slope map of the entire area which are classified into five slope classes of very high (14%-48.5%) to high (7.6%-13.9%) to moderately high (4.2%-7.6%) to low (1.5%-4.2%) and very low (0. % - 1.2%).
More Related Content
Similar to Methodologies for Resolving Data Security and Privacy Protection Issues in Cloud Computing Technology
Challenges and Proposed Solutions for Cloud ForensicIJERA Editor
Cloud computing is a heavily evolving topic in information technology (IT). Rather than creating, deploying and managing a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. Due to this large scale, in case an attack over the network of cloud, it’s a great challenge to investigate to cloud. There is a very low research done to develop the theory and practice of cloud forensic. The investigator has huge challenge of getting the IP address of the culprit as there is dynamic IP in cloud computing. Also one among many problems is that the customer is only concerned of security and threat of unknown. The cloud service provider never lets customer see what is behind "virtual curtain" which leads customer more doubting for the security and threat issue. In cloud forensics, the lack of physical access leads to big challenge for investigator. In this paper we are presenting few common challenges which arise in cloud forensic and proposed solution to it. We will also discuss the in brief about cloud computing and cloud forensic.
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
In this study, survey questions were sent to different non-profit and government organizations, which
assisted in collecting fundamental information. The data was acquired by conducting surveys in OpenStack
Company to identify the critical vulnerabilities in the cloud computing platform in order to provide the
recommended solutions.
So, analysis will be made on how the cloud’s characteristics such as the nature of the architecture,
attractiveness, as well as, vulnerability are tightly related to privacy and security issues. Privacy and
security are complex issues for which there is no standard and the relationship between them is necessarily
complicated. The study also highlight on the inherent challenge to data privacy because it typically results
in data to be presented in an encryption from the data owner. Thus, the study aimed at obtaining a common
goal to provide a comprehensive review of the existing security and privacy issues in cloud environments,
and identify and describe the most representative of the security and privacy attributes and present a
relationship among them.
Finally, in order to ensure that the standard measure of validity is achieved, validity test was conducted in
order to ensure that the study is free from errors. Various recommendations were provided. The study also
explored various areas that require future directions for each attribute, which comprise of multi-domain
policy integration and a secure service composition to design a comprehensive policy-based management
framework in the cloud environments.
Lastly, the recommendations will provide the potential for security and privacy approaches that can be
implemented to improve the cloud computing environment to ensure that a level of trust is achieved
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
Cloud computing is set of resources and services offered through the Internet. Cloud
services are delivered from data centers located throughout the world. Cloud computing
facilitates its consumers by providing virtual resources via internet. The biggest challenge in
cloud computing is the security and privacy problems caused by its multi-tenancy nature and the
outsourcing of infrastructure, sensitive data and critical applications. Enterprises are rapidly adopting
cloud services for their businesses, measures need to be developed so that organizations can be assured
of security in their businesses and can choose a suitable vendor for their computing needs. Cloud
computing depends on the internet as a medium for users to access the required services at any time on
pay-per-use pattern. However this technology is still in its initial stages of development, as it suffers
from threats and vulnerabilities that prevent the users from trusting it. Various malicious activities
from illegal users have threatened this technology such as data misuse, inflexible access control and
limited monitoring. The occurrence of these threats may result into damaging or illegal access of
critical and confidential data of users. In this paper we identify the most vulnerable security
threats/attacks in cloud computing, which will enable both end users and vendors to know a bout
the k ey security threats associated with cloud computing and propose relevant solution directives to
strengthen security in the Cloud environment. We also propose secure cloud architecture for
organizations to strengthen the security.
Abstract: Cloud computing model are obtaining ubiquitous authorization due to the heterogeneous convenience they provide. Although, the
security & privacy problems are the main considerable encumbrance holding back the universal adoption of this new emerging technology.
Various researches are concentrated on enhancing the security on Software as well as Hardware levels on the cloud. But these interpretations do
not mainly furnish the complete security way and therefore the data security compute (measure) are still kept under the access control of service
provider. Trusted Computing is another research concept. In actuality, these furnish a set of tools controlled by the third party technologies to
secure the Virtual Machines from the cloud computing providers. These approaches provides the tools to its consumers to assess and monitor the
aspects of security their data, they don’t allocate the cloud consumers with high control capability. While as the new emerging DCS approach
aims to provide the security of data owners of their data. But the DCS approach concept is elucidate in many ways and there is not a
standardized framework of cloud computing environment model for applying this approach.
This presentation gives a detailed overview about Cloud Computing, its features and challenges faced by it in the market. It gives an insight into cloud security and privacy issues and its measures.
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
Ubiquitous computing has revolutionized interaction of humans and machines. Cloud computing has been mainly used for storing data and various computational purposes. It has changed the face of using the internet. But, as we know every technology has its pros and cons. Securing cloud environment is the most challenging issue for the researchers and developers. Main aspects which cloud security should cover are authentication, authorization, data protection etc. Establishing trust between cloud service providers (CSP) is the biggest challenge, when someone is discussing about cloud security. Trust is a critical factor which mainly depends on perception of reputation and self-assessment done by both user and CSP. The trust model can act as security strength evaluator and ranking service for cloud application and services. For establishing trust relationship between two parties, mutual trust mechanism is reliable, as it does verification from both sides. There are various trust models which mainly focuses on securing one party i.e., they validate either user or service node. In this survey paper, the study of various trust models and their various parameters are discussed.
https://jst.org.in/index.html
Our Journals has a act as vehicles for the dissemination of knowledge, making research findings accessible to a wide audience. This accessibility is vital for the progress of education, as it allows students, educators, and professionals to stay informed about the latest developments in their respective fields.
Cloud Computing Security Issues and ChallengesCSCJournals
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
The cloud is a network of virtual computers that are linked together and may exhibit and offer computational capabilities continuously depending on certain Service Level Agreements (SLAs) that have been agreed between the parties to a contract between the clients and the internet provider. Cloud computing has several benefits, including endless computational resources, cheap cost, security controls, hypervisor protection, instantaneous elasticity, high throughput, and fault-tolerant solutions with increased performance. Since cloud computing is a comparatively recent computing model, there exists a lot of uncertainty about how well confidentiality of all levels, including host, network, data levels, and implementation, can be achieved. As a result, there still are important obstacles to cloud computing adoption. These constraints include security issues concerning privacy, compliance, and legal issues. When databases and software applications are moved from the cloud to large data centers, data management becomes a major challenge. Numerous security issues may develop while using cloud computing, including issues with privacy and control, virtualization and accessibility issues, confidentiality, management of credentials and identities, authentication of responding devices, and authenticity. In this paper, an effort is made to offer a comprehensive review of data security and threats in cloud computing.
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
The cloud is a network of virtual computers that are linked together and may exhibit and offer computational capabilities continuously depending on certain Service Level Agreements (SLAs) that have been agreed between the parties to a contract between the clients and the internet provider. Cloud computing has several benefits, including endless computational resources, cheap cost, security controls, hypervisor protection, instantaneous elasticity, high throughput, and fault-tolerant solutions with increased performance. Since cloud computing is a comparatively recent computing model, there exists a lot of uncertainty about how well confidentiality of all levels, including host, network, data levels, and implementation, can be achieved. As a result, there still are important obstacles to cloud computing adoption. These constraints include security issues concerning privacy, compliance, and legal issues. When databases and software applications are moved from the cloud to large data centers, data management becomes a major challenge. Numerous security issues may develop while using cloud computing, including issues with privacy and control, virtualization and accessibility issues, confidentiality, management of credentials and identities, authentication of responding devices, and authenticity. In this paper, an effort is made to offer a comprehensive review of data security and threats in cloud computing.
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTUREcscpconf
Cloud computing is a computing environment consisting of different facilitating components likehardware, software, firmware, networking, and services. Internet or a private network providesthe required backbone to deliver the cloud services. The benefits of cloud computing like “ondemand,
customized resource availability and performance management” are overpowered bythe associated security risks to the cloud system, particularly to the cloud users or clients.Existing traditional IT and enterprise security are not adequate to address the cloud securityissues. In order to deploy different cloud applications, it is understood that security concerns of
cloud computing are to be effectively addressed. Cloud security is such an area which deals with the concerns and ulnerabilities of cloud computing for ensuring safer computing environment. This paper explores the challenges and issues of security concerns of cloud computing through different standard and novel solutions. This paper proposes architecture for
incorporating different security schemes, techniques and protocols for cloud computing,particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems.
The proposed architecture is generic in nature, not dependent on the type of cloud deployment,application agnostic and is not coupled with the underlying backbone. This would facilitate to
manage the cloud system more effectively and provide the administrator to include the specific solution to counter the threat.
Similar to Methodologies for Resolving Data Security and Privacy Protection Issues in Cloud Computing Technology (20)
In the early twentieth century, major representatives of the Jadid movement became active participants in the socio-political processes in the Turkestan region. Usmonkhoja Polatkhoja, a progressive from Bukhara, was one of the beams not only in the Emirate of Bukhara, but also in Turkestan. He first participated in the reforms and progressives, and later in the national liberation movements, and fought for the prosperity and independence of the country.This article provides information about Usmonkhoja's life and work in Jadidism, revolts, national liberation struggles, and emmigiration.
Flood is one of the natural disaster known to be part of the earth biophysical processes, which its occurrence can be devastating; due to mostly anthropogenic activities and climatological factors. The aim of the research is to identify and map the extent at which the impact of flood due to intense rainfall and rise in water in the study area using geospatial techniques and the specific objectives are to carry out terrain analysis of the study area and to generate flood indicator maps of the study area. The study analyzed rain fall data;, the drainage system and Shuttle Radar Topographic Mission (SRTM 30m) of the area. ArcGIS 10.8 was to modelled and to generate the contributing factors map of the study area. The drainage system was generated through on-screen digitization of topographic map of scale 1:50,000 of Ondo South-West. The mean annual rainfall of Lagos State was generated in the ArcGIS environment from the rainfall data through spatial analysis tool. The SRTM was used in terrain analysis of the study area. The results generated showed the lowest mean annual rain fall of the area 1,700mm and the highest mean annual rain fall was 2,440mm. Digital elevation model (DEM), slope, flow direction were generated from the SRTM. Drainage density of the area was generated using the drainage system. The slope map of the entire area which are classified into five slope classes of very high (14%-48.5%) to high (7.6%-13.9%) to moderately high (4.2%-7.6%) to low (1.5%-4.2%) and very low (0. % - 1.2%).
Work study is a catch-all phrase encompassing a variety of methodologies, including method research and work measurement, that are applied in a variety of contexts and lead to a systematic assessment of all elements that affect the efficiency and economy of the situation under evaluation that is meant to be improved. The main aim of this study is to examine and enhance the process token in manufacturing a Perfume of the famous, well-known, aromatic, and beautiful Taif Roses. Some changes in the process has been suggested using method study and time study method which lead to reduction in process time, labor cost and production cost.
Workers are the maximum precious method of an association. Their importance to institutions requires not most effective the want to draw the trendy bents but additionally the need to preserve them for a long term. This paper specializes in reviewing the findings of former research carried out with the aid of colourful experimenters with the quit to identify determinants factors of hand retention. This exploration almost looked at the subsequent broad factors improvement openings, reimbursement, work- lifestyles balance, operation/ management, work terrain, social aid, autonomy, training and improvement.
Watering plants during the correct time is very important due to scientific reasons. Both underwatering, as well as overwatering, can lead to the growth of unhealthy plants or in extreme cases, the death of the plant/tree. These issues which are the case with most self-gardeners and plant lovers can be solved using the smart irrigation technique. The main purpose of this innovation is to assist plant lovers to continue their passion to grow plants at home with ease. Smart irrigation system helps in monitoring the moisture level which majorly affects plant growth besides other factors such as sunlight, fertility of the soil, etc. The digital planting pot has been designed in a way that it effectively incorporates the idea of smart irrigation. Arduino Uno R3 has been used as the main chip in this project along with a few other components like a soil moisture sensor, relay, and water pump. This project requires coding to synchronize all the components, and function properly. A required test has been carried out to review the functioning of the mechanism. The project was tested by once using the soil with enough moisture in the pot and then the soil with the least moisture. Both times, it worked exactly how it was supposed to function. When the soil with the least moisture was tested, there was a clear indication of a low level of moisture and accordingly, the water pump got triggered to water the plant, and when the soil with enough moisture was tested, there was again the clear indication of the correct level of moisture and the water pump was inactive. All the readings which were displayed on the LCD were checked back and forth during the project. The outcomes were the same as expected. Hence, it shows that every component in this project is actively functioning and the whole project is effectively designed.
This study's goal is to present Solutions for Determining the importance level of criteria in creating cultural resources’ attractiveness from tourists’ evaluation. Data were collected from 558 international tourists who chose Vietnam as the destination for tourism.
The study points out that we need to resolve challenges such as: building a safe, friendly destination, etc., destinations need to review and re-evaluate the services of their products and tourist attractions to prepare for the largest number of visitors and stimulate the domestic tourism market is a good solution: To boost the domestic tourism market, it is necessary to increase domestic flights and train connections to major tourist destinations.
A new convenient and efficient route for the synthesis of two very important hydroxo-bridged stepped-cubane copper complexes viz: [Cu4(bpy)4Cl2(OH)4]Cl2.6H2O (1) and [Cu4(phen)4Cl2(OH)4]Cl2.6H2O (2) have been obtained. This synthetic route from the mononuclear CubpyCl2 complex is easier, more reproducible and afforded the complex in a much higher yield than the other two previously reported procedures which were equally serendipitously discovered. The purity and formation of the complexes were confirmed with elemental (C,H,N) analysis and the details of the UV-Vis, Fourier transform infrared, electrospray ionization mass spectra of both complexes and the single crystal X-ray crystallography of 1 are presented and discussed. X-ray crystallography confirms the absolute structure of the complexes. The complexes were formed via the connection of four copper atoms to four hydroxide bridging ligands and four bipyridyl ligands with two chloride ligands. There are two coordinate environments around two pairs of copper atoms (CuN2ClO2 and CuN2O3) and each copper atom is pentacoordinate with square pyramidal geometry.
Artocarpus heterophyllus Lam., which is commonly known as jackfruit is a tropical fruit, belonging to Moraceae family, native to Western Ghats of India and common in Asia, Africa, and some regions in South America. It is known to be the largest edible fruit in the world. The Jackfruit is an extremely versatile and sweet tasting fruit that possess high nutritional value. Jackfruit is rich in nutrients including carbohydrates, proteins, vitamins, minerals, and phytochemicals. The jackfruit has diverse medicinal uses especially antioxidant, anti-inflammatory, antimicrobial and antiviral properties, anticancer and antifungal activity, anthelminthic activity. Traditionally, this plant is used in the treatment of various diseases especially for treatment against inflammation, malarial fever, diarrhoea, diabetes and tapeworm infection. Jackfruit is a good natural source of phytochemicals such as phenolics, flavonoids and tannins, saponins. The health benefits of jackfruit have been attributed to its wide range of physicochemical applications. The use of jackfruit bulbs and its parts has also been reported since ancient times for their therapeutic qualities. The beneficial physiological effects may also have preventive application in a variety of pathologies.
Myogenic differentiation requires to be exactly explored for the effective treatment of fracture. The speed of healing is affected by skeletal muscle, linked to activation of specific myogenic transcription factors during the repair process. In previous study, we discovered that psoralen enhanced differentiation of osteoblast in primary mouse. In the current study, we show that psoralen stimulates myogenic differentiation through the secretion of factors to hone the quality of repair in fractured mice. 3-month old mice were treated with corn oil or psoralen followed by a tibial fracture surgery. Fractures were tested 7, 14, and 21 days respectively later by histology and images observation. Skeletal muscles including soleus muscle and posterior tibial muscle around the damaged bone were collected for quantitative real-time PCR, HE staining, as well as western blot. Daily treatment with psoralen at seven, fourteen days or twenty-one days improves protein or mRNA levels responsible for the whole myogenic differentiation process, makes the muscle fibers more tightly aligned, and promotes callus formation and development. This data shows that high levels of myogenic transcription factors in the process of fracture healing in mice foster the repair of damaged muscles, and indicates a pharmacological approach that targets myogenic differentiation to improve fracture repair. This also reflects the academic thought of "paying equal attention to both muscles and bones" in the prevention and treatment of fracture healing.
The current pandemic has generated the search for new reliable and economic alternatives for the detection of SARS-CoV-2, which produces the COVID-19 disease, one of the recommendations by the World Health Organization, is the detection of the virus by RT-qPCR methods from upper respiratory tract samples. The discomfort of the pharyngeal nasopharyngeal swab described by patients, the requirement of trained personnel, and the generation of aerosols, are factors that increase the risk of infections in this type of intake. It is known that the main means of transmission of SARS-CoV-2 is through aerosols or small droplets, which is why saliva is important as a relevant means of detecting COVID-19. In this study, a modified method based on SARS-CoV-2 RNA release from saliva is described, avoiding the isolation and purification of the genetic material and its quantification of viral copies; the results are compared with paired pharyngeal/nasopharyngeal swab samples (EF/EN). Results showed good agreement in saliva samples compared to EF/EN samples. On average, a sensitivity for virus detection of 80% was demonstrated in saliva samples competing with EF/EN samples. The use of saliva is a reliable alternative for the detection of SARS-CoV-2 by means of RT-PCR in the first days of infection, having important advantages over the conventional method. Saliva still needs to be studied completely to evaluate the detection capacity of the SARS-CoV-2 nucleic acid, however, the described process is viable, due to the decrease in materials and supplies, process times, the increment in the sampling and improvement of laboratory performance.
A recent study establishes that since 1970, there has been an ecological gap between human needs and the planet's resources, with annual resource demand exceeding the bio-productivity of the planet. Specifically, humanity utilises equivalent of 1.75 earths to produce the ecological resources used, with half of this attributable to food consumption. The present work therefore seeks to provide an empirically-based insight into the environmental sustainability of the EF of food consumption in Ijebu Ode. A descriptive cross-sectional approach was used, and primary data were collected from 400 systemically sampled households via structured questionnaires and analysed descriptively using Microsoft Excel and inferentially using mathematical models for calculating ecological footprints. Findings revealed that the household EF of food consumption in Ijebu Ode is 0.05gha per capita, with the footprint of cereal consumption (0.17gha; 37%) taking the major share, followed by meat with a footprint of 0.11gha (23.9%). As a result, it was concluded that Ijebu Ode has sustainable food consumption, which is necessary for its environmental sustainability. However, the sustenance of the former requires creating awareness of the need for sustainable consumption and prioritisation of integrated and population-wide policies and food intervention initiatives to encourage attitudinal change in favour of sustainable food consumption while fostering sustainable food production strategies amidst current environmental realities.
The symmetry occurs in most of the phenomena explained by physics, for example, a particle has positive or negative charges, and the electric dipoles that have the charge (+q) and (-q) which are at a certain distance (d), north or south magnetic poles and for a magnetic bar or magnetic compass with two poles: North (N) and South (S) poles, spins up or down of the electron at the atom and for the nucleons in the nucleus In this form, the particle should also have mass symmetry. For convenience and due to later explanations, I call this mass symmetry or mass duality as follows: mass and mass cloud. The mass cloud is located in the respective orbitals given by the Schrödinger equation. The orbitals represent the possible locations or places of the particle which are determined probabilistically by the respective Schröndiger equation.
Metal-organic molybdenum complexes were synthesized by the hydrothermal method using ammonium heptamolybdate as the metallic source, and as the organic ligand terephthalic acid (BDC) or bis(2-hydroxyethyl) terephthalate (BHET), obtained via glycolysis of poly(ethylene)terephthalate (PET). The BDC-Mo and BHET-Mo complexes were characterized by XRD, N2 physisorption, TGA, ATR-FTIR, SEM, XPS and their in vitro biocompatibility was tested by porcine fibroblasts viability. The results show that molybdates (MoO4-2) are coordinated to the carbonyl functional groups of BDC and BHET by urea bonding (-NH-CO-NH-) which is related to their high biocompatibility and high thermal stability. These organic molybdate complexes possess rectangular prism particles made up of rods arrays characteristics of molybdenum oxides (MoO3). The organic complexes BDC-Mo and BHET-Mo do not show to be cytotoxic for porcine dermal fibroblasts growing on their surface for up to 48 h of culture.
Exercise training with varying intensity increases maximal oxygen intake (VO2max), a strong predictor of cardiovascular and all-cause mortality. Purpose: The aim of this study was to find out the influence of low intensity aerobic training on the vo2 max in 11 to 14 years school girls in Hyderabad district. Methodology: The research scholar has randomly selected thirty (N=30) high school girls were selected as subjects and their age ranged between 11 to 14 years. The subjects were divided into two equal groups, each group consist of 15 total 30. Group one acted as experimental group (EG) and group two acted as control group (CG). The dependent variable vo2 max was selected and it is measured by manual test. Statistical Tool: The statistical tool paired sample ‘t’ test was used for analysing of the data and the obtained ‘t’ ratio was tested for significance at 0.05 level of confidence. Results: The analysis of the data revealed that there was a significant improvement on vo2 max by the application of low intensity aerobic.
Hybrid rice has the potential to outperform existing inbred rice and was said to have the potential to produce 14-20 % more yield. In response, Malaysia Government has introduced its very own first Hybrid Rice Variety knew as Kadaria 1 developed by MARDI. This is in line with one of the strategies outlined in Dasar Agromakanan Negara (DAN) 2011-2020 as an approach to increasing rice productivity within Malaysia. The next step would be developing our hybrid seed rice production system. Therefore, an experiment to determine the planting ratio and planting distance between 0025A (A)-a hybrid with MR283 (R)-inbreed variety was carried out. Planting ratios studied in this study were 2:4, 2:6, 2:8, and 2:10 while planting distance was 14 x 30 cm, 16 x 30 cm, and 18 x 30 cm. Statistical analyses suggested that yield R, yield A, and panicle number A were significantly affected by planting ratios while yield A was significantly affected by an interaction between planting distance and planting ratios. Panicle number A performed significantly higher at planting ratios of 2:4 compared to 2:10. Yield R shows higher significant performance under ratio 2:6 compared to 2:4 and 2:8. Relatively, yield A performed the best under planting distance of 18 x 30 cm. Furthermore, under this particular planting distance, the planting ratio of 2:10 shows the highest significant figure while 2:8 exhibits statistical parity. Both yield R and yield A were significantly affected by planting ratios and have a significant positive association with each other. Therefore, the planting ratio of 2:10 should be the best since it contributed to significantly highest value for yield A while yield R under 2:10 shows statistical parity with 2:6 which was the highest significant value. In conclusion, the combination of 2:10 with a planting distance of 18 x 30 cm was the best since it shows best potential for both yields A and yield R
Cassava plays an important role in improving food security and reducing poverty in rural areas. Despite its importance, its production in Senegal remains low compared to other African countries. Nowadays, it is confronted with numerous constraints. It is in this context that a study was conducted on the cassava production system in the Thiès "cassava granary" region, with the objective of examining farmers' cultivation practices. It was conducted in eight communes located in the department of Tivaouane, some of which are located in the Niayes agro-ecological zone and others in the central-northern groundnut basin. Surveys were conducted among the largest cassava producers in these communes. Analysis of the results showed that cassava is only grown in the rainy season with the same cultivation practices that have been used for years. Of the five varieties listed by the President of the Senegalese Cassava Interprofession, only four are grown in the areas surveyed. The Terrasse (43%) and Kombo (36%) varieties are grown more by our respondents in the Niayes area. Soya (75%) and Wallet "Parydiey" (20% of our sample) dominate in the central-northern groundnut basin.
Cassava plays an important role in improving food security and reducing poverty in rural areas. Despite its importance, its production in Senegal remains low compared to other African countries. Nowadays, it is confronted with numerous constraints. It is in this context that a study was conducted on the cassava production system in the Thiès "cassava granary" region, with the objective of examining farmers' cultivation practices. It was conducted in eight communes located in the department of Tivaouane, some of which are located in the Niayes agro-ecological zone and others in the central-northern groundnut basin. Surveys were conducted among the largest cassava producers in these communes. Analysis of the results showed that cassava is only grown in the rainy season with the same cultivation practices that have been used for years. Of the five varieties listed by the President of the Senegalese Cassava Interprofession, only four are grown in the areas surveyed. The Terrasse (43%) and Kombo (36%) varieties are grown more by our respondents in the Niayes area. Soya (75%) and Wallet "Parydiey" (20% of our sample) dominate in the central-northern groundnut basin.
We are witnessing very demanding and stressful times in which we live, and an occupation that is particularly exposed to stress and different working conditions is the job of a nurse. Exposing themselves to everyday challenges and stressful situations, nurses reach a stage of great emotional and physical exhaustion, lethargy, dissatisfaction, and poorer work achievements, which we know as burnout. The aim of this paper was to determine whether there is and to what extent professional burnout is present in nurses and technicians working in nursing homes across Slovenia and Croatia. The paper is answering the questions of the extent of the burnout influenced by individual characteristics (age, education, years of service and work experience at the current workplace). The study involved a validated questionnaire “The Oldenburg Burnout Inventory (OLBI)” to measure professional burnout. Surveying of the nurses was conducted online at their home institutions. The results show that all respondents have a medium or high level of professional burnout, while no one has a low level or shows no signs of burnout. In terms of age, the group from 55-65 years of age had the highest relative level of burnout in the age group category. With regard to education, the highest burnout was measured in registered nurses.
Hepatitis B and C are one of the most commonly transmitted viral infections through needlestick injury apart from HIV. It is highly prevalent in India and many other developing countries. It accounts for high mortality rate globally amongst low socio-economic groups of individuals. Healthcare workers, especially dental professionals are at higher risk of infection due to high exposure to saliva, blood and sharps. Accidental occupational exposure to non-sterile conditions and its development to more critical and fatal conditions can be reduced through vaccination, prophylactic medications and practicing high safety measures.
This review article focuses on transmission of hepatitis through sharps injuries in medicine, especially dentistry, its prevention, management, post-exposure prophylaxis and the corresponding content.
Radicular cysts are the most common cystic lesions affecting the jaws. They are most commonly found at the apices of the involved teeth, however they may also be found on the lateral aspects of the roots in relation to lateral accessory root canals. Quite often a radicular cyst remains behind in the jaws after removal of the offending tooth and this is referred to as a residual cyst. Radicular cysts are the most common of all jaw cysts and comprise about 52% to 68% of all the cysts affecting the human jaws.
More from Associate Professor in VSB Coimbatore (20)
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
2. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 4, Pages 40-49, October-December 2022
ISSN: 2456-883X
41
1.2. Network Threats
The network has a significant impact on how well cloud solutions run and interact with clients. Some businesses do
not place a high priority on cybersecurity while creating cloud solutions [12]. Lack of cybersecurity opens up attack
routes for strangers and malevolent users, posing a variety of network dangers [13-16]. Accounts or service
hijacking and denial of service attacks are the two main serious network dangers in the cloud.
1.3. Cloud Environment-specific Threats
The management of the cloud infrastructure is mostly the responsibility of cloud providers. According to a study
published by Alert Logic, approximately 50% of cloud customers view service provider problems as a significant
danger to cloud computing. Challenges to cloud computing, aside from those posed by service providers, include
those posed by hostile cloud users, unsecured interface design and application programming interfaces (APIs),
shared technical vulnerabilities, and improper usage of the public cloud.
░ 2. LITERATURE REVIEW
Despite directly receiving them, the investigation was carried out on cloud computing services such as networks,
storage, servers, software, and applications. According to research findings, the likelihood of data leakage and
other issues has decreased for large systems. On-demand online services are provided through cloud computing.
Cloud computing is the ideal option for people who do not want to set up infrastructure in their system if a firm that
offers internet services has to invest significant capital funds in infrastructure and issues like machine failure, disc
failure, software bugs, etc. This study suggests that cloud users just need to pay for the services they consume rather
than spending money on infrastructure.
Researchers have explored the security threats associated with the cloud computing system, its features, the cloud
delivery paradigm, and the cloud stakeholders since the cloud's storage of data are expanding quickly, but the safety
of open-ended and relatively easily accessible resource is still in doubt. Cloud security was briefly explored by the
researchers. These days, more and more individuals use clouds, sending, receiving, and storing sensitive
information through networks, making cloud network cybersecurity a key concern. The researchers discuss some
of these difficulties. Risk factors that affect cloud security include data corruption, man-in-the-middle attacks, and
violation of sensitive data.
Considering clients and servers, the cloud is currently one of the most technologically advanced study areas.
Researchers go into detail to make certain that a reputation management solution is used to handle robust security
and privacy and to maintain the information-containing transactions table. Virtualization is essential for cloud
computing, but its privacy has not received enough attention. This research on cloud security focuses on the impact
of virtualization threats on various cloud computing service models. With the aid of virtualization, cloud computing
provides a mechanism for the allocation of resources, including applications and infrastructure, and deliberating
cloud environments encourage service providers to be adaptable and trustworthy. Cloud security offers a security
pattern that cloud service providers must follow. Cloud data is encrypted using the RSA method and a digital
signature. To strengthen the privacy of cloud data while it is being moved over networks, security management
models, security protocols, and the RSA algorithm with digital signature are described.
3. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 4, Pages 40-49, October-December 2022
ISSN: 2456-883X
42
The scientific community has discovered that using several cloud providers to handle security has received less
emphasis than using a single cloud provider. The focus of this study is on using multiple clouds to lower safety risks
and improve information security. Due to the movement of information outside of inter-organizational and internet
connectivity, cloud users put the host's control at risk. Researchers give a quick explanation of data security, which
has grown to be a major concern for cloud service providers, as well as how to preserve a degree of trust among data
owners. Instead of carrying out physical attacks, the miscreants get the choice to harm people's confidential
information by committing cybercrime, and it takes time and effort to secure businesses, individuals, and the
country in order to avoid these attacks. Data mining and techniques play a significant role in this study's discussion
on ensuring the security of cloud data.
The Internet of Things (IoT) and cloud technology are the two most important technologies in modern life. They
are anticipated to be licensed and used more, making them the most essential factor of the world wide web. As a
result, the focus will be paid to the combination of IoT with cloud computing, known as Cloud IoT. The cloud
offers virtual pools of assets to customers via a web interface. These assets encompass architecture, networks,
platforms, software, and storage. Since the majority of organizations are trying to migrate their information to the
cloud, it is critical to guarantee the security and integrity of cloud consumers' data. This is why it is necessary to
discuss the risks associated with data stored in the cloud. The variety of a denial-of-service (DOS) attack and its
more significant aspect, distributed denial-of-service (DDOS), are the various kinds of intrusion in cloud
computing environments that suggest a technique that is capable of filtering and identifying most struck traffic
within a very short amount of time.
One of these main problems is the distributed denial of service attack, which is a type of breach in which several
invaders target a single target to stop users of the target network from using its facilities. This attack is characterized
by varied methods for detecting and preventing distributed denial of service attacks. In contrast to digital forensics,
going to investigate cloud security presents so many difficulties for investigators. For example, when attempting to
retrieve evidence from the cloud, forensic investigations may become increasingly challenging.
Researchers discussed why cloud complexity impacts digital investigations. The purpose of this study is to discuss
different unresolved security risks that impact cloud computing, as well as the benefits and drawbacks of current
cloud security measures. Cloud security concerns like data segregation, security, and data integrity are indeed
presented.
Cloud is a type of distributed computing where resources and applications are conveyed over the internet and cloud
users can pay on a usage basis. Anything that can send data across a network and is linked to the Internet is referred
to as the IoT. However, faulty technological implementation and deployment might result in security issues.
Researchers discussed the Internet of Things’ security concerns and subsequently suggested a security architecture
to lessen the vulnerabilities. Cloud computing is a dynamic technique that transforms data and relieves customers
of a load of maintaining local storage. Cloud consumers have suggested a technique to ensure security by utilizing
stenography and cryptographic methods. Users may easily connect to the network via an internet browser
according to the Security-as-a-Service (SaaS) model, which delivers secure communication architecture. The
technique is effective since it breaks encryption up into different encryptions. The platforms offer safe access for
4. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 4, Pages 40-49, October-December 2022
ISSN: 2456-883X
43
different users and complete logical dissociation of data resources and computation related to different
organizations. It is constructed by using the OpenStack framework, allowing access to multimodal advancements,
and trying to exploit fingerprints is a novel fingerprint method for user authentication. The study explained a cloud
computing system that is incorporated and constructed to use software applications and distribute via the internet.
Multi-cloud storage serves as one of the essential services in the cloud that is utilized to manage and access cloud
data from anywhere.
As per cloud users' suggested new security architecture for cloud framework that provides better secure
information processing and protects information from loss, cloud security has emerged as the main issue for cloud
experts. This is because unwanted activities are increasing. A self-governing process is necessary to ensure that
cloud data is hosted correctly in the cloud server and also that various security methodologies have been mentioned
for data storage on the cloud. Data providers and cloud services have unique qualities, and this structure provides
data storage and has various security issues. Cloud computing relies on "Utility Computing" and
"Software-as-a-Service" to deliver the services that users need; cloud security is a key factor and has many
connected challenges and problems. Data privacy, security concerns, and corrupted applications are just a few of
the characteristics that have an impact on security. Such problems affect both cloud service providers and
customers.
Due to the frequent changes in participation, few studies were able to resolve the difficult problem of data exchange
in a multi-proprietor approach using identity privacy and data preservation from an unreliable cloud. For
established groups in the cloud, the study presents the Mona secure multi-owner information dissemination
structure. Consequently, the user can share data with the network without revealing the cloud's distinctive secret.
Additionally, Mona offers quick client cancelation and new client joining. The memory overhead, computation
costs, and acceptable security criteria are all met while also guaranteeing efficiency. Huge storage is required for
passkey decoding in devices with limited resources, such as smart cards, mobile sensors, and cellphone knobs. For
instance, these private passkeys are usually kept in an expensive, tamper-proof memory. This analysis's successes
mainly aim to cut down on contact requirements like periodicity and looping connections like composite stamps.
To get around this problem, researchers developed a special type of open key encryption called Key Aggregate
Cryptosystem (KAC). The classes must conform to a few established hierarchical associations, but the similar
attribute displays a consistent size decoding key. The assumption that this control is eliminated is flexible, meaning
that no particular connection between the classes is necessary. The criteria model allows for the protection of whole
infrastructures.
░ 3. SECURITY TECHNIQUES FOR PROTECTION OF THREATS
In this paper, we outline the adoption of these security measures at several stages to protect clouds against
vulnerabilities.
3.1. Data Security
Protection against Data Breaches: To prevent data breaches in the cloud, several security methods and procedures
were suggested. One of them is to encrypt data before it is stored in the system and on the cloud.
5. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 4, Pages 40-49, October-December 2022
ISSN: 2456-883X
44
Effective key management algorithms and cloud-based key security are required for this. Implementing appropriate
isolation among virtual machines (VMs) to protect against data leaks, appropriate access controls to restrict access,
and performing a risk assessment of the cloud environment to understand where vulnerable data is stored and how
it is transmitted between various systems and networks are a few steps to be taken to protect security breaches in the
cloud.
3.2. Network Security
Protection against Service Hijacking: By implementing various areas of concern on cloud networks, accounts or
service hijacking may be prevented. To identify suspicious attacks, they also use intrusion detection systems (IDS)
in the cloud to monitor network traffic and nodes. The effectiveness, interoperability, and virtualization-based
environment of the cloud should be taken into consideration while designing intrusion detection and other network
security solutions. System-level virtualization and virtual machine monitor (responsible for controlling VMs)
approaches were combined to create an IDS system for the cloud. The IDSs in this design are built on virtual
machines, and the sensor connections are centered on the widely used IDS Snort. IDS keeps track of the activity
and condition of each VM, and its monitoring system allows for instant restarts, stops, and recoveries.
3.3. Security in Cloud Infrastructure
Security against Unprotected Interfaces and APIs - To guard the clouds against the risk posed by unsecured APIs,
programmers must build such APIs following trusted platform principles. Additionally, cloud service providers
must ensure that every API used in the cloud is developed effectively and is examined for any known
vulnerabilities before implementation. To protect information and services from unsecured interfaces and APIs, in
addition, it is necessary to build proper authentication procedures and network access. To create safe applications
which can aid in preventing these application threats, the Open Web Application Security Project (OWASP) offers
guidelines and specifications. Furthermore, while transferring the information to the cloud, clients must review the
interface and APIs of cloud service providers.
░ 4. DATA SECURITY AND PRIVACY PROTECTION ISSUES
Comparable to traditional data security and privacy protection, cloud-based data security and privacy protection
cover similar ground. Additionally, it participates in each phase of the data life cycle. Since the cloud is open and
includes several tenants, its data security and privacy protection policies have unique features. The data life cycle in
cloud computing can be seen in Figure 1. The following sections examine challenges with cloud data security and
privacy protection related to the data life cycle. The term data life cycle describes the full procedure between data
creation till data deletion.
4.1. Data Generation
The ownership of data includes the creation of data. In the conventional IT context, data is often owned and
managed by users or organizations. However, it has to be taken into account what to do to retain data ownership if
data is to be moved into the cloud. Data owners have a right to understand what personally-identifiable data is being
gathered about them, and in certain situations, to terminate such acquisition or use.
6. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 4, Pages 40-49, October-December 2022
ISSN: 2456-883X
45
Figure 1. Cloud Computing - Data Life Cycle
4.2. Data Transfer
Data transfer regularly occurs within a firm without security or only with a simple cryptographic technique. For
data transmission beyond corporate borders, data confidentiality and integrity must be ensured to avoid information
from being accessed and manipulated by unauthorized users. In other words, the encryption process by itself is
inadequate. Furthermore, data integrity should be ensured. It must guarantee the employment of transport layer
protocols to preserve simultaneously confidentiality and integrity. Confidentiality and integrity of data
transmission should be ensured not just from a business and cloud-based storage and also throughout different
types of cloud providers. To put it another way, the confidentiality and integrity of the entire data transfer process
should be guaranteed.
4.3. Data Use
Data encryption is possible when utilizing a basic storage service like Amazon S3 for static data. Data encryption is
frequently not practical for static data in use by cloud-based services in the PaaS or SaaS models. Static data used
by cloud-based apps are typically not secured since data encryption will create index and query issues. The data
getting handled is essentially not encrypted for every software to operate with, whether it is in a cloud environment
or a conventional IT infrastructure. Because cloud computing platforms support many tenants, the information
captured by cloud-based apps is kept with the data of other users. Process-related unencrypted data poses a major
risk to data security. Situations are more problematic when it comes to the utilization of private data. The
proprietors of private data must pay attention to and guarantee that the use of personal information is in line with the
data collection's goals and that it is not disclosed to third parties, such as cloud service providers.
4.4. Data Share
Data sharing widens the data's potential applications and complicates data permissions. The owner of the data may
grant access to the information to one client, who may then share the data with further parties without the owners'
permission. Consequently, while exchanging data, particularly with a third party, the data owners must take into
7. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 4, Pages 40-49, October-December 2022
ISSN: 2456-883X
46
account if the third party still adheres to the original security protocols and usage limitations. Sharing granularity
(all the data or partial data) and data transformation should also be taken into consideration when exchanging
private data, concerning data authorization. The granularity of sharing is determined by the content partition
granularity and the sharing policies. To isolate critical data from the original data is to alter the information. The
information is rendered irrelevant to the data owners as a result of this procedure.
4.5. Data Storage
Two ways to categorize the data in the cloud are (1) data in an IaaS environment, like Amazon's Simple Storage
Service, and (2) data in a PaaS or SaaS environment associated with cloud-based applications. Identical to data kept
elsewhere, cloud storage requires three components of information security to be taken into account:
confidentiality, integrity, and availability. Data encryption is an important means of maintaining data secrecy. The
usage of both the encryption algorithm and key strength must be taken into consideration to guarantee the
effectiveness of encryption. Computational time must be taken into account since the cloud computing
environment involves enormous volumes of data transfer, storage, and management.
4.6. Data Archival
Data archival is concerned with the storage medium, regardless of whether off-site storage is offered, and the length
of storage. The danger of data leaks increases if the data are kept on portable media and the media becomes
uncontrollable. The integrity of the data will be in danger if the cloud service providers do not offer off-site
archiving. Once more, the storage time commensurate with the needs of archives, If not, there may be hazards to the
availability or privacy.
4.7. Data Destruction
Whether the data has been destroyed when it is no longer required. The data that was erased may still be present and
be recoverable due to the physical properties of the storage media. Sensitive information may unintentionally be
disclosed as a consequence of this. By making just little service-related efforts or connecting with a services
provider, this may be quickly hosted and subsequently removed. The general public utilizes it to keep their
documents for a fair price or without charge. The many kinds of cloud services include Dropbox, Just Cloud, Baidu
Container, Google Drive, and others.
Such a setting enables customers to not demand the foundation for various processing services. They can be used to
access information from whatever computer is located anywhere in the globe. When related to prior traditional
computing techniques, this offers great adaptability by consolidating the elements providing high versatility and
multi-occupancy. In this paper, we have examined many factors including cloud security, data sharing, threats,
procedures, defensive measures, needs, and societal implications.
░ 5. ISSUES IN CLOUD ENVIRONMENT
The most crucial concern with cloud technology is security. All of it is accommodated on the properties of the
providers, which greatly increases the security of the data. It is a significant barrier to the adoption of cloud
computing. Security concerns are the top challenge confronting cloud computing, based on an IDC assessment on
8. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 4, Pages 40-49, October-December 2022
ISSN: 2456-883X
47
the subject. The risks associated with cloud computing include service interruptions, data breaches, privacy
invasion, and information destruction. These issues prohibit businesses from utilizing cloud computing services.
By using highly-regarded security mechanisms, they could be eliminated. The proportional rise in the number of
cybersecurity risks since 2020 is shown in Table 1.
Table 1. Percentages of cybersecurity threats targeted to different industries (2021)
Cybersecurity Threat
Industry
Manufacturing (No.) Healthcare (%) Financial (%)
Phishing 1396 29 46
Ransomware 2096 8 5
Trojan 696 46 31
Botnet 496 - 2
Cryptomining 4896 4 5
Others 996 13 11
░ 6. CONCLUSION
As new technology grows and advances, new kinds of cybersecurity dangers appear. Even if it is more vulnerable
to some risks than others, cloud computing is not impervious to conventional cybersecurity concerns. The integrity
of the data saved on the cloud is just another issue with cloud computing. Numerous places where cloud computing
resources are kept may be vulnerable to typical activities that compromise data integrity, like power outages, device
malfunctions, or natural disasters. All of these variables might have an impact on the integrity of the data, and if the
data is simply saved in the cloud without any additional backups or archiving, the data may be destroyed. Due to the
need for redundancies, a lot of individuals and businesses employ a multi-cloud solution, which replicates data
among many different cloud service providers. In this paper, the main security threats for cloud computing were
looked at. Moreover, methods for resolving issues with cloud computing technology's data security and privacy
protection were explored.
Declarations
Source of Funding
This research did not receive any grant from funding agencies in the public, commercial, or not-for-profit sectors.
Competing Interests Statement
The author declares no competing financial, professional, or personal interests.
Consent for publication
The author declares that he/she consented to the publication of this research work.
9. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 4, Pages 40-49, October-December 2022
ISSN: 2456-883X
48
References
[1] Wu H, Ding Y, Winer C, Yao L. (2010). Network Security for virtual machine in Cloud Computing. In 5th
International conference on computer sciences and convergence information technology (ICCIT). DC, USA: IEEE
Computer Society Washington, Pages 18–21.
[2] Xiaopeng G, Sumei W, Xianqin C. (2010). VNSS: a Network Security sandbox for virtual Computing
environment. In IEEE youth conference on information Computing and telecommunications (YC-ICT).
Washington DC, USA: IEEE Computer Society, Pages 395–398.
[3] Popovic K, Hocenski Z. (2010). Cloud Computing Security issues and challenges. In Proceedings of the 33rd
International Convention MIPRO. IEEE Computer Society Washington DC, USA, Pages 344–349.
[4] Carlin S, Curran K. (2011). Cloud Computing Security. International Journal of Ambient Computing and
Intelligence, 3(1): 38–46.
[5] Bisong A, Rahman S. (2011). An overview of the Security concerns in Enterprise Cloud Computing.
International Journal of Network Security & Its Applications, 3(1): 30–45. DOI: 10.5121/ijnsa.2011.3103.
[6] Townsend M. (2009). Managing a security program in a cloud computing environment. In Information Security
Curriculum Development Conference, Kennesaw, Georgia. NY, USA: ACM New York, Pages 128–133.
[7] Winkler V. (2011). Securing the Cloud: Cloud computer Security techniques and tactics. Waltham, MA:
Elsevier Inc.
[8] Ristenpart T, Tromer E, Shacham H, Savage S. (2009). Hey, you, get off of my cloud: exploring information
leakage in third-party compute clouds. In Proceedings of the 16th ACM conference on Computer and
communications security, Chicago, Illinois, USA. NY, USA: ACM New York, Pages 199–212.
[9] Zhang Y, Juels A, Reiter MK, Ristenpart T. (2012). Cross-VM side channels and their use to extract private
keys. In Proceedings of the 2012 ACM conference on Computer and communications security, New York, NY,
USA. NY, USA: ACM New York, Pages 305–316.
[10] Wang Z, Jiang X. (2010). HyperSafe: a lightweight approach to provide lifetime hypervisor control-flow
integrity. In Proceedings of the IEEE Symposium on Security and privacy. Washington, DC, USA: IEEE Computer
Society, Pages 380–395.
[11] Wang C, Wang Q, Ren K, Lou W. (2009). Ensuring data Storage Security in Cloud Computing. In The 17th
International workshop on quality of service. Washington, DC, USA: IEEE Computer Society, Pages 1–9.
[12] Fernandez EB, Yoshioka N, Washizaki H. (2009). Modeling Misuse Patterns. In Proceedings of the 4th Int.
Workshop on Dependability Aspects of Data Warehousing and Mining Applications (DAWAM 2009), in
conjunction with the 4th Int. Conf. on Availability, Reliability, and Security (ARES 2009), Fukuoka, Japan.
Washington, DC, USA: IEEE Computer Society, Pages 566–571.
[13] Santos N, Gummadi KP, Rodrigues R. (2009). Towards Trusted Cloud Computing. In Proceedings of the 2009
conference on Hot topics in cloud computing, San Diego, California. CA, USA: USENIX Association Berkeley.
10. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 4, Pages 40-49, October-December 2022
ISSN: 2456-883X
49
[14] Zhang F, Huang Y, Wang H, Chen H, Zang B. (2008). PALM: Security Preserving VM Live Migration for
Systems with VMM-enforced Protection. In Trusted Infrastructure Technologies Conference, 2008. APTC’08,
Third Asia-Pacific. Washington, DC, USA: IEEE Computer Society, Pages 9–18.
[15] Xiao S, Gong W. (2010). Mobility Can help: protect user identity with dynamic credential. In the Eleventh
International Conference on Mobile Data Management (MDM). Washington, DC, USA: IEEE Computer Society,
Pages 78–380.
[16] Somani U, Lakhani K, Mundra M. (2010). Implementing digital signature with RSA encryption algorithm to
enhance the data Security of Cloud in Cloud Computing. In 1st International conference on parallel distributed and
grid Computing (PDGC). IEEE Computer Society Washington, DC, USA, Pages 211–216.
░ Cite this article
Satinderjeet, S. Methodologies for Resolving Data Security and Privacy Protection Issues in Cloud
Computing Technology. Asian Journal of Applied Science and Technology 6(4), 40–49 (2022).
░ Publisher’s Note
Nemeth Publishers remain neutral with regard to jurisdictional claims in the published maps and
institutional affiliations.