Because of its accessibility and flexibility, cloud technology is among the most notable innovations in today's world. Having many service platforms, such as GoogleApps by Google, Amazon, Apple, and so on, is well accepted by large enterprises. Distributed cloud computing is a concept for enabling every-time, convenient, on-demand network access to processing resources including servers, storage devices, networks, and services that may be mutually configured. The major security risks for cloud computing as identified by the Cloud security alliance (CSA) have been examined in this study. Also, methods for resolving issues with cloud computing technology's data security and privacy protection were systematically examined
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
Deployment of using cloud services as a new approach to keep people's platforms, Infrastructure and applications has become an important issue in the world of communications technology. This is a very useful paradigm for humans to obtain their essential needs simpler, faster ,more flexible, and safer than before. But there are many concerns about this system challenge. Security is the most important challenge for cloud systems. In this paper we design and explain the procedure of implementation of a new method for cloud services based on multi clouds on our platform which supplies security and privacy more than other clouds. We introduce some confidentiality and security methods in each layer to have a secure access to requirements. The architecture of our method and the implementation of method on our selected platform for each layer are introduced in this paper.
Design and implement a new cloud security method based on multi clouds on ope...csandit
Deployment of using cloud services as a new approach to keep people's platforms,
Infrastructure and applications has become an important issue in the world of communications
technology. This is a very useful paradigm for humans to obtain their essential needs simpler,
faster ,more flexible, and safer than before. But there are many concerns about this system
challenge. Security is the most important challenge for cloud systems. In this paper we design
and explain the procedure of implementation of a new method for cloud services based on multi
clouds on our platform which supplies security and privacy more than other clouds. We
introduce some confidentiality and security methods in each layer to have a secure access to
requirements. The architecture of our method and the implementation of method on our selected
platform for each layer are introduced in this paper.
Today, in the world of communication, connected systems is growing at a rapid pace. To accommodate this growth the need for computational power and storage is also increasing at a similar rate. Companies are investing a large amount of resources in buying, maintaining and ensuring availability of the system to their customers. To mitigate these issues, cloud computing is playing a major role [1]. The underlying concept of cloud computing dates back to the ‘50s but the term entering into widespread usage can be traced to 2006 when Amazon.com announced the Elastic Compute Cloud. In this paper, we will discuss about cloud security approaches. We have used the term “CloudDrain” to define data leakage in case of security compromise.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
Deployment of using cloud services as a new approach to keep people's platforms, Infrastructure and applications has become an important issue in the world of communications technology. This is a very useful paradigm for humans to obtain their essential needs simpler, faster ,more flexible, and safer than before. But there are many concerns about this system challenge. Security is the most important challenge for cloud systems. In this paper we design and explain the procedure of implementation of a new method for cloud services based on multi clouds on our platform which supplies security and privacy more than other clouds. We introduce some confidentiality and security methods in each layer to have a secure access to requirements. The architecture of our method and the implementation of method on our selected platform for each layer are introduced in this paper.
Design and implement a new cloud security method based on multi clouds on ope...csandit
Deployment of using cloud services as a new approach to keep people's platforms,
Infrastructure and applications has become an important issue in the world of communications
technology. This is a very useful paradigm for humans to obtain their essential needs simpler,
faster ,more flexible, and safer than before. But there are many concerns about this system
challenge. Security is the most important challenge for cloud systems. In this paper we design
and explain the procedure of implementation of a new method for cloud services based on multi
clouds on our platform which supplies security and privacy more than other clouds. We
introduce some confidentiality and security methods in each layer to have a secure access to
requirements. The architecture of our method and the implementation of method on our selected
platform for each layer are introduced in this paper.
Today, in the world of communication, connected systems is growing at a rapid pace. To accommodate this growth the need for computational power and storage is also increasing at a similar rate. Companies are investing a large amount of resources in buying, maintaining and ensuring availability of the system to their customers. To mitigate these issues, cloud computing is playing a major role [1]. The underlying concept of cloud computing dates back to the ‘50s but the term entering into widespread usage can be traced to 2006 when Amazon.com announced the Elastic Compute Cloud. In this paper, we will discuss about cloud security approaches. We have used the term “CloudDrain” to define data leakage in case of security compromise.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Challenges and Proposed Solutions for Cloud ForensicIJERA Editor
Cloud computing is a heavily evolving topic in information technology (IT). Rather than creating, deploying and managing a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. Due to this large scale, in case an attack over the network of cloud, it’s a great challenge to investigate to cloud. There is a very low research done to develop the theory and practice of cloud forensic. The investigator has huge challenge of getting the IP address of the culprit as there is dynamic IP in cloud computing. Also one among many problems is that the customer is only concerned of security and threat of unknown. The cloud service provider never lets customer see what is behind "virtual curtain" which leads customer more doubting for the security and threat issue. In cloud forensics, the lack of physical access leads to big challenge for investigator. In this paper we are presenting few common challenges which arise in cloud forensic and proposed solution to it. We will also discuss the in brief about cloud computing and cloud forensic.
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
In this study, survey questions were sent to different non-profit and government organizations, which
assisted in collecting fundamental information. The data was acquired by conducting surveys in OpenStack
Company to identify the critical vulnerabilities in the cloud computing platform in order to provide the
recommended solutions.
So, analysis will be made on how the cloud’s characteristics such as the nature of the architecture,
attractiveness, as well as, vulnerability are tightly related to privacy and security issues. Privacy and
security are complex issues for which there is no standard and the relationship between them is necessarily
complicated. The study also highlight on the inherent challenge to data privacy because it typically results
in data to be presented in an encryption from the data owner. Thus, the study aimed at obtaining a common
goal to provide a comprehensive review of the existing security and privacy issues in cloud environments,
and identify and describe the most representative of the security and privacy attributes and present a
relationship among them.
Finally, in order to ensure that the standard measure of validity is achieved, validity test was conducted in
order to ensure that the study is free from errors. Various recommendations were provided. The study also
explored various areas that require future directions for each attribute, which comprise of multi-domain
policy integration and a secure service composition to design a comprehensive policy-based management
framework in the cloud environments.
Lastly, the recommendations will provide the potential for security and privacy approaches that can be
implemented to improve the cloud computing environment to ensure that a level of trust is achieved
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
Cloud computing is set of resources and services offered through the Internet. Cloud
services are delivered from data centers located throughout the world. Cloud computing
facilitates its consumers by providing virtual resources via internet. The biggest challenge in
cloud computing is the security and privacy problems caused by its multi-tenancy nature and the
outsourcing of infrastructure, sensitive data and critical applications. Enterprises are rapidly adopting
cloud services for their businesses, measures need to be developed so that organizations can be assured
of security in their businesses and can choose a suitable vendor for their computing needs. Cloud
computing depends on the internet as a medium for users to access the required services at any time on
pay-per-use pattern. However this technology is still in its initial stages of development, as it suffers
from threats and vulnerabilities that prevent the users from trusting it. Various malicious activities
from illegal users have threatened this technology such as data misuse, inflexible access control and
limited monitoring. The occurrence of these threats may result into damaging or illegal access of
critical and confidential data of users. In this paper we identify the most vulnerable security
threats/attacks in cloud computing, which will enable both end users and vendors to know a bout
the k ey security threats associated with cloud computing and propose relevant solution directives to
strengthen security in the Cloud environment. We also propose secure cloud architecture for
organizations to strengthen the security.
Abstract: Cloud computing model are obtaining ubiquitous authorization due to the heterogeneous convenience they provide. Although, the
security & privacy problems are the main considerable encumbrance holding back the universal adoption of this new emerging technology.
Various researches are concentrated on enhancing the security on Software as well as Hardware levels on the cloud. But these interpretations do
not mainly furnish the complete security way and therefore the data security compute (measure) are still kept under the access control of service
provider. Trusted Computing is another research concept. In actuality, these furnish a set of tools controlled by the third party technologies to
secure the Virtual Machines from the cloud computing providers. These approaches provides the tools to its consumers to assess and monitor the
aspects of security their data, they don’t allocate the cloud consumers with high control capability. While as the new emerging DCS approach
aims to provide the security of data owners of their data. But the DCS approach concept is elucidate in many ways and there is not a
standardized framework of cloud computing environment model for applying this approach.
This presentation gives a detailed overview about Cloud Computing, its features and challenges faced by it in the market. It gives an insight into cloud security and privacy issues and its measures.
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
Ubiquitous computing has revolutionized interaction of humans and machines. Cloud computing has been mainly used for storing data and various computational purposes. It has changed the face of using the internet. But, as we know every technology has its pros and cons. Securing cloud environment is the most challenging issue for the researchers and developers. Main aspects which cloud security should cover are authentication, authorization, data protection etc. Establishing trust between cloud service providers (CSP) is the biggest challenge, when someone is discussing about cloud security. Trust is a critical factor which mainly depends on perception of reputation and self-assessment done by both user and CSP. The trust model can act as security strength evaluator and ranking service for cloud application and services. For establishing trust relationship between two parties, mutual trust mechanism is reliable, as it does verification from both sides. There are various trust models which mainly focuses on securing one party i.e., they validate either user or service node. In this survey paper, the study of various trust models and their various parameters are discussed.
https://jst.org.in/index.html
Our Journals has a act as vehicles for the dissemination of knowledge, making research findings accessible to a wide audience. This accessibility is vital for the progress of education, as it allows students, educators, and professionals to stay informed about the latest developments in their respective fields.
Cloud Computing Security Issues and ChallengesCSCJournals
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
The cloud is a network of virtual computers that are linked together and may exhibit and offer computational capabilities continuously depending on certain Service Level Agreements (SLAs) that have been agreed between the parties to a contract between the clients and the internet provider. Cloud computing has several benefits, including endless computational resources, cheap cost, security controls, hypervisor protection, instantaneous elasticity, high throughput, and fault-tolerant solutions with increased performance. Since cloud computing is a comparatively recent computing model, there exists a lot of uncertainty about how well confidentiality of all levels, including host, network, data levels, and implementation, can be achieved. As a result, there still are important obstacles to cloud computing adoption. These constraints include security issues concerning privacy, compliance, and legal issues. When databases and software applications are moved from the cloud to large data centers, data management becomes a major challenge. Numerous security issues may develop while using cloud computing, including issues with privacy and control, virtualization and accessibility issues, confidentiality, management of credentials and identities, authentication of responding devices, and authenticity. In this paper, an effort is made to offer a comprehensive review of data security and threats in cloud computing.
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
The cloud is a network of virtual computers that are linked together and may exhibit and offer computational capabilities continuously depending on certain Service Level Agreements (SLAs) that have been agreed between the parties to a contract between the clients and the internet provider. Cloud computing has several benefits, including endless computational resources, cheap cost, security controls, hypervisor protection, instantaneous elasticity, high throughput, and fault-tolerant solutions with increased performance. Since cloud computing is a comparatively recent computing model, there exists a lot of uncertainty about how well confidentiality of all levels, including host, network, data levels, and implementation, can be achieved. As a result, there still are important obstacles to cloud computing adoption. These constraints include security issues concerning privacy, compliance, and legal issues. When databases and software applications are moved from the cloud to large data centers, data management becomes a major challenge. Numerous security issues may develop while using cloud computing, including issues with privacy and control, virtualization and accessibility issues, confidentiality, management of credentials and identities, authentication of responding devices, and authenticity. In this paper, an effort is made to offer a comprehensive review of data security and threats in cloud computing.
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTUREcscpconf
Cloud computing is a computing environment consisting of different facilitating components likehardware, software, firmware, networking, and services. Internet or a private network providesthe required backbone to deliver the cloud services. The benefits of cloud computing like “ondemand,
customized resource availability and performance management” are overpowered bythe associated security risks to the cloud system, particularly to the cloud users or clients.Existing traditional IT and enterprise security are not adequate to address the cloud securityissues. In order to deploy different cloud applications, it is understood that security concerns of
cloud computing are to be effectively addressed. Cloud security is such an area which deals with the concerns and ulnerabilities of cloud computing for ensuring safer computing environment. This paper explores the challenges and issues of security concerns of cloud computing through different standard and novel solutions. This paper proposes architecture for
incorporating different security schemes, techniques and protocols for cloud computing,particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems.
The proposed architecture is generic in nature, not dependent on the type of cloud deployment,application agnostic and is not coupled with the underlying backbone. This would facilitate to
manage the cloud system more effectively and provide the administrator to include the specific solution to counter the threat.
The Primary Source of Mercury in the Subsoil and Environmental Impacts AJASTJournal
The paper aims to figure out the primary source of mercury in the subsoil and environmental impacts.
By using descriptive method for primary model, synthesis methods and process analysis and analysis of difficulties and discussion, The study of this problem point that, The primary source of mercury in the subsoil is considered to be deep exhalations coming from with the activation of deep processes - geothermal, eruptive, etc., and its intensive rocks enriched with organic matter become an accumulator in the sedimentary cover -carbonaceous formations and soil layer. It is from the latter that she again enters biocycle with a new stage of intravital accumulation in plant and animal organisms in the greater the amount, the higher its content in the environment. Moreover, it is also observed.
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...AJASTJournal
The cloud can be created, monitored, and disseminated with slight disruption or service provider involvement. Among the most rapidly evolving phenomenon, cloud computing provides users with a variety of low-cost solutions. By putting the ideas of confidentiality, authentication, encryption techniques, non-repudiation, intrusion prevention, and effectiveness into practice, the challenge of cloud information security for computers and cloud storage security has been resolved in its totality. As cloud security has become a growing problem, cloud technology is prominent throughout many emerging disciplines of study in which a significant amount of research is conducted in this field. Each of these efforts uses a cryptography approach. Current solutions to these issues have certain important drawbacks. To protect sensitive information stored in the cloud, one needs to design programs that implement hybrid cryptographic mechanisms using challenging encryption algorithms. This research elaborates on an examination of using cryptographic techniques to mitigate the integrity problems in cloud computing.
More Related Content
Similar to Methodologies for Resolving Data Security and Privacy Protection Issues in Cloud Computing Technology
Challenges and Proposed Solutions for Cloud ForensicIJERA Editor
Cloud computing is a heavily evolving topic in information technology (IT). Rather than creating, deploying and managing a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. Due to this large scale, in case an attack over the network of cloud, it’s a great challenge to investigate to cloud. There is a very low research done to develop the theory and practice of cloud forensic. The investigator has huge challenge of getting the IP address of the culprit as there is dynamic IP in cloud computing. Also one among many problems is that the customer is only concerned of security and threat of unknown. The cloud service provider never lets customer see what is behind "virtual curtain" which leads customer more doubting for the security and threat issue. In cloud forensics, the lack of physical access leads to big challenge for investigator. In this paper we are presenting few common challenges which arise in cloud forensic and proposed solution to it. We will also discuss the in brief about cloud computing and cloud forensic.
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
In this study, survey questions were sent to different non-profit and government organizations, which
assisted in collecting fundamental information. The data was acquired by conducting surveys in OpenStack
Company to identify the critical vulnerabilities in the cloud computing platform in order to provide the
recommended solutions.
So, analysis will be made on how the cloud’s characteristics such as the nature of the architecture,
attractiveness, as well as, vulnerability are tightly related to privacy and security issues. Privacy and
security are complex issues for which there is no standard and the relationship between them is necessarily
complicated. The study also highlight on the inherent challenge to data privacy because it typically results
in data to be presented in an encryption from the data owner. Thus, the study aimed at obtaining a common
goal to provide a comprehensive review of the existing security and privacy issues in cloud environments,
and identify and describe the most representative of the security and privacy attributes and present a
relationship among them.
Finally, in order to ensure that the standard measure of validity is achieved, validity test was conducted in
order to ensure that the study is free from errors. Various recommendations were provided. The study also
explored various areas that require future directions for each attribute, which comprise of multi-domain
policy integration and a secure service composition to design a comprehensive policy-based management
framework in the cloud environments.
Lastly, the recommendations will provide the potential for security and privacy approaches that can be
implemented to improve the cloud computing environment to ensure that a level of trust is achieved
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
Cloud computing is set of resources and services offered through the Internet. Cloud
services are delivered from data centers located throughout the world. Cloud computing
facilitates its consumers by providing virtual resources via internet. The biggest challenge in
cloud computing is the security and privacy problems caused by its multi-tenancy nature and the
outsourcing of infrastructure, sensitive data and critical applications. Enterprises are rapidly adopting
cloud services for their businesses, measures need to be developed so that organizations can be assured
of security in their businesses and can choose a suitable vendor for their computing needs. Cloud
computing depends on the internet as a medium for users to access the required services at any time on
pay-per-use pattern. However this technology is still in its initial stages of development, as it suffers
from threats and vulnerabilities that prevent the users from trusting it. Various malicious activities
from illegal users have threatened this technology such as data misuse, inflexible access control and
limited monitoring. The occurrence of these threats may result into damaging or illegal access of
critical and confidential data of users. In this paper we identify the most vulnerable security
threats/attacks in cloud computing, which will enable both end users and vendors to know a bout
the k ey security threats associated with cloud computing and propose relevant solution directives to
strengthen security in the Cloud environment. We also propose secure cloud architecture for
organizations to strengthen the security.
Abstract: Cloud computing model are obtaining ubiquitous authorization due to the heterogeneous convenience they provide. Although, the
security & privacy problems are the main considerable encumbrance holding back the universal adoption of this new emerging technology.
Various researches are concentrated on enhancing the security on Software as well as Hardware levels on the cloud. But these interpretations do
not mainly furnish the complete security way and therefore the data security compute (measure) are still kept under the access control of service
provider. Trusted Computing is another research concept. In actuality, these furnish a set of tools controlled by the third party technologies to
secure the Virtual Machines from the cloud computing providers. These approaches provides the tools to its consumers to assess and monitor the
aspects of security their data, they don’t allocate the cloud consumers with high control capability. While as the new emerging DCS approach
aims to provide the security of data owners of their data. But the DCS approach concept is elucidate in many ways and there is not a
standardized framework of cloud computing environment model for applying this approach.
This presentation gives a detailed overview about Cloud Computing, its features and challenges faced by it in the market. It gives an insight into cloud security and privacy issues and its measures.
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
Ubiquitous computing has revolutionized interaction of humans and machines. Cloud computing has been mainly used for storing data and various computational purposes. It has changed the face of using the internet. But, as we know every technology has its pros and cons. Securing cloud environment is the most challenging issue for the researchers and developers. Main aspects which cloud security should cover are authentication, authorization, data protection etc. Establishing trust between cloud service providers (CSP) is the biggest challenge, when someone is discussing about cloud security. Trust is a critical factor which mainly depends on perception of reputation and self-assessment done by both user and CSP. The trust model can act as security strength evaluator and ranking service for cloud application and services. For establishing trust relationship between two parties, mutual trust mechanism is reliable, as it does verification from both sides. There are various trust models which mainly focuses on securing one party i.e., they validate either user or service node. In this survey paper, the study of various trust models and their various parameters are discussed.
https://jst.org.in/index.html
Our Journals has a act as vehicles for the dissemination of knowledge, making research findings accessible to a wide audience. This accessibility is vital for the progress of education, as it allows students, educators, and professionals to stay informed about the latest developments in their respective fields.
Cloud Computing Security Issues and ChallengesCSCJournals
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
The cloud is a network of virtual computers that are linked together and may exhibit and offer computational capabilities continuously depending on certain Service Level Agreements (SLAs) that have been agreed between the parties to a contract between the clients and the internet provider. Cloud computing has several benefits, including endless computational resources, cheap cost, security controls, hypervisor protection, instantaneous elasticity, high throughput, and fault-tolerant solutions with increased performance. Since cloud computing is a comparatively recent computing model, there exists a lot of uncertainty about how well confidentiality of all levels, including host, network, data levels, and implementation, can be achieved. As a result, there still are important obstacles to cloud computing adoption. These constraints include security issues concerning privacy, compliance, and legal issues. When databases and software applications are moved from the cloud to large data centers, data management becomes a major challenge. Numerous security issues may develop while using cloud computing, including issues with privacy and control, virtualization and accessibility issues, confidentiality, management of credentials and identities, authentication of responding devices, and authenticity. In this paper, an effort is made to offer a comprehensive review of data security and threats in cloud computing.
A Comprehensive Review on Data Security and Threats for Data Management in Cl...AJASTJournal
The cloud is a network of virtual computers that are linked together and may exhibit and offer computational capabilities continuously depending on certain Service Level Agreements (SLAs) that have been agreed between the parties to a contract between the clients and the internet provider. Cloud computing has several benefits, including endless computational resources, cheap cost, security controls, hypervisor protection, instantaneous elasticity, high throughput, and fault-tolerant solutions with increased performance. Since cloud computing is a comparatively recent computing model, there exists a lot of uncertainty about how well confidentiality of all levels, including host, network, data levels, and implementation, can be achieved. As a result, there still are important obstacles to cloud computing adoption. These constraints include security issues concerning privacy, compliance, and legal issues. When databases and software applications are moved from the cloud to large data centers, data management becomes a major challenge. Numerous security issues may develop while using cloud computing, including issues with privacy and control, virtualization and accessibility issues, confidentiality, management of credentials and identities, authentication of responding devices, and authenticity. In this paper, an effort is made to offer a comprehensive review of data security and threats in cloud computing.
SECURITY POLICY ENFORCEMENT IN CLOUD INFRASTRUCTUREcscpconf
Cloud computing is a computing environment consisting of different facilitating components likehardware, software, firmware, networking, and services. Internet or a private network providesthe required backbone to deliver the cloud services. The benefits of cloud computing like “ondemand,
customized resource availability and performance management” are overpowered bythe associated security risks to the cloud system, particularly to the cloud users or clients.Existing traditional IT and enterprise security are not adequate to address the cloud securityissues. In order to deploy different cloud applications, it is understood that security concerns of
cloud computing are to be effectively addressed. Cloud security is such an area which deals with the concerns and ulnerabilities of cloud computing for ensuring safer computing environment. This paper explores the challenges and issues of security concerns of cloud computing through different standard and novel solutions. This paper proposes architecture for
incorporating different security schemes, techniques and protocols for cloud computing,particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems.
The proposed architecture is generic in nature, not dependent on the type of cloud deployment,application agnostic and is not coupled with the underlying backbone. This would facilitate to
manage the cloud system more effectively and provide the administrator to include the specific solution to counter the threat.
Similar to Methodologies for Resolving Data Security and Privacy Protection Issues in Cloud Computing Technology (20)
The Primary Source of Mercury in the Subsoil and Environmental Impacts AJASTJournal
The paper aims to figure out the primary source of mercury in the subsoil and environmental impacts.
By using descriptive method for primary model, synthesis methods and process analysis and analysis of difficulties and discussion, The study of this problem point that, The primary source of mercury in the subsoil is considered to be deep exhalations coming from with the activation of deep processes - geothermal, eruptive, etc., and its intensive rocks enriched with organic matter become an accumulator in the sedimentary cover -carbonaceous formations and soil layer. It is from the latter that she again enters biocycle with a new stage of intravital accumulation in plant and animal organisms in the greater the amount, the higher its content in the environment. Moreover, it is also observed.
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...AJASTJournal
The cloud can be created, monitored, and disseminated with slight disruption or service provider involvement. Among the most rapidly evolving phenomenon, cloud computing provides users with a variety of low-cost solutions. By putting the ideas of confidentiality, authentication, encryption techniques, non-repudiation, intrusion prevention, and effectiveness into practice, the challenge of cloud information security for computers and cloud storage security has been resolved in its totality. As cloud security has become a growing problem, cloud technology is prominent throughout many emerging disciplines of study in which a significant amount of research is conducted in this field. Each of these efforts uses a cryptography approach. Current solutions to these issues have certain important drawbacks. To protect sensitive information stored in the cloud, one needs to design programs that implement hybrid cryptographic mechanisms using challenging encryption algorithms. This research elaborates on an examination of using cryptographic techniques to mitigate the integrity problems in cloud computing.
Transformation of Youth and the System of Values AJASTJournal
The article analyzes the values specific to the youth social group, their system, changes in this system, globalization, transformation of the society in the process of modernization, forms of this transformational process, and integration concepts. The research used meta-analysis, definition of concepts, and axiological methods. Researches conducted at the international level on the subject have been analyzed along with the researches conducted in Uzbekistan over the years, and appropriate conclusions have been drawn.
Reserves of Heavy Oil and Concentrations of Toxicants in the Environment and ...AJASTJournal
The paper aims to figure out Reserves of heavy oil and concentrations of toxicants in the environment and environmental impacts.
By using descriptive method for primary model, synthesis methods and process analysis and analysis of difficulties and discussion, The study of this problem point that, The Hanford plant and the results of its activities are a good illustration of the situation that even small concentrations of toxicants in the environment can be intensively accumulated living organisms permanently living in it.
Reinforced Brick Masonry in Urbanization of Rwanda Secondary Cities AJASTJournal
To ensure equitable development for all the regions of Rwanda and to limit migration into and prevent congestion of Kigali, the capital city of Rwanda, the Rwandan government has embarked on the development of secondary cities. Consequently, there is the need to provide affordable and safe buildings in the proposed secondary cities. This study investigated the feasibility of using reinforced masonry bricks (RBM) for constructing buildings in the Rwandan secondary city in Muhanga District as an alternative to using reinforced concrete (RC) presently in use in the Kigali based on the availability of clay as the raw material for the production of masonry bricks needed for RBM. Questionnaires were administered and interviews were conducted to establish the level of acceptance of RBM for constructing building in Muhanga. The comparison of the costs of construction building using RBM and RC and the other advantages of RBM over RC for constructing buildings the Rwandan secondary city in Muhanga District are presented.
Composition and Characteristics in Hydrocarbons, Oil and Gas Fields AJASTJournal
The paper aims to describe Composition and characteristics in hydrocarbons, oil and gas fields. By using descriptive method for primary model, synthesis methods and process analysis and analysis of difficulties and discussion, The study of this problem point that No less active influence on the properties and composition of oil, including their metallogeny, was also exerted by inversion processes. They manifested themselves especially brightly in the Varandey-Adzva zone.
Therefore, when it comes to the unfavorable environmental situation in these areas, then a significant contribution to its formation belongs to the extracted and utilized oil with PTE.
Determine the Importance Level of Criteria in Creating Cultural Resources’ At...AJASTJournal
This study's goal is to present Solutions for Determining the importance level of criteria in creating cultural resources’ attractiveness from tourists’ evaluation. Data were collected from 558 international tourists who chose Vietnam as the destination for tourism.
The study points out that we need to resolve challenges such as: building a safe, friendly destination, etc., destinations need to review and re-evaluate the services of their products and tourist attractions to prepare for the largest number of visitors and stimulate the domestic tourism market is a good solution: To boost the domestic tourism market, it is necessary to increase domestic flights and train connections to major tourist destinations.
New One-Pot Synthetic Route and Spectroscopic Characterization of Hydroxo-Bri...AJASTJournal
A new convenient and efficient route for the synthesis of two very important hydroxo-bridged stepped-cubane copper complexes viz: [Cu4(bpy)4Cl2(OH)4]Cl2.6H2O (1) and [Cu4(phen)4Cl2(OH)4]Cl2.6H2O (2) have been obtained. This synthetic route from the mononuclear CubpyCl2 complex is easier, more reproducible and afforded the complex in a much higher yield than the other two previously reported procedures which were equally serendipitously discovered. The purity and formation of the complexes were confirmed with elemental (C,H,N) analysis and the details of the UV-Vis, Fourier transform infrared, electrospray ionization mass spectra of both complexes and the single crystal X-ray crystallography of 1 are presented and discussed. X-ray crystallography confirms the absolute structure of the complexes. The complexes were formed via the connection of four copper atoms to four hydroxide bridging ligands and four bipyridyl ligands with two chloride ligands. There are two coordinate environments around two pairs of copper atoms (CuN2ClO2 and CuN2O3) and each copper atom is pentacoordinate with square pyramidal geometry.
A Review on the Distribution, Nutritional Status and Biological Activity of V...AJASTJournal
Artocarpus heterophyllus Lam., which is commonly known as jackfruit is a tropical fruit, belonging to Moraceae family, native to Western Ghats of India and common in Asia, Africa, and some regions in South America. It is known to be the largest edible fruit in the world. The Jackfruit is an extremely versatile and sweet tasting fruit that possess high nutritional value. Jackfruit is rich in nutrients including carbohydrates, proteins, vitamins, minerals, and phytochemicals. The jackfruit has diverse medicinal uses especially antioxidant, anti-inflammatory, antimicrobial and antiviral properties, anticancer and antifungal activity, anthelminthic activity. Traditionally, this plant is used in the treatment of various diseases especially for treatment against inflammation, malarial fever, diarrhoea, diabetes and tapeworm infection. Jackfruit is a good natural source of phytochemicals such as phenolics, flavonoids and tannins, saponins. The health benefits of jackfruit have been attributed to its wide range of physicochemical applications. The use of jackfruit bulbs and its parts has also been reported since ancient times for their therapeutic qualities. The beneficial physiological effects may also have preventive application in a variety of pathologies.
Researching How Cloud Computing Enhances the Businesses GrowthAJASTJournal
The Internet of Things (IoT) changes several sectors, including education, logistics, and manufacturing. The IoT is a web-based system that integrates and syncs a wide range of machines or appliances with gates, third-party technologies, and apps on machinery and cloud computing networks. Cloud computing performs a significant part in the framework layer with the thriving development of IoT. In a range of industries cloud computing technology was built into unique forms of cloud computing: Everything-as-a-Sevice (Xaas), Education-as-a-Service (EaaS), Logistics-as-a-Service (LaaS), and Manufacturing-as-a-Service (MaaS). Researchers and professionals have drawn substantial attention to the applicability of cloud computing in different sectors. Essential evaluation, framework architecture, and structural study are the primary forms of science. Large data, computational technology, service orientation, and IoT refer to cloud computing systems (e.g., XaaS, EaaS, LaaS, MaaS). This research analyzed the technological patterns in new cloud computing technology and examined cloud computing studies. The results demonstrate that knowledge and innovation are the main concerns guiding cloud science.
Triclosan Persistence in Environment and Its Potential Toxic Effects on AlgaeAJASTJournal
Triclosan (TCS) is widely used as an antibacterial agent in various industrial products, such as textile goods, soap, shampoo, liquid toothpaste and cosmetics, and often detected in wastewater effluent. Triclosan is highly toxic to aquatic animals, and is particularly highly toxic to the algae, which was used as a test organism in this study. Algae represent the first nutritional base on the aquatic food chain due to their ability to synthesize organic molecules using sunlight and carbon dioxide. Thus, the cultivation of algae has been an integral part for the production of commercially important species on aquaculture. This has been the reason to make great efforts in order to understand effect of triclosan to natural periphyton communities (algae). However, there is a paucity of data on the toxicity of triclosan and its effects on aquatic organisms. In this study, the toxicity of triclosan to a microalga was examined. The present investigation showed that “chlorophyll a” pigment in control algae was 5.92 mg/L and it decreased, when algae was treated with different concentration of triclosan (10-50 ppm). The study revealed that, as the concentration of triclosan increased then algae growth declined. It was observed that conductivity also increased because of decreased “chlorophyll a” and decreased phytoplankton levels. This result indicates that triclosan exerts a marked influence on algae, which are important organisms being the first-step producers in the ecosystem; therefore, the possible destruction of the balance of the ecosystem is expected if triclosan is discharged into the environment at high levels. The bioaccumulation of TCS in human impregnation from foodstuff exposure (in particular fish) and likely risk for human population also.
Calsiara Tablets: A Clinical Study on Calcium Citrate malate for Bone HealthAJASTJournal
Calcium citrate malate is most easily absorbed by the body. Calcium is essential for many diverse processes in the body, including bone formation, muscle contraction, and enzyme and hormone functioning. Calcium is very essential in muscle contraction, oocyte activation, building strong bones and teeth, blood clotting, nerve impulse, transmission, regulating heart beat and fluid balance within cells. Calcium supplementation in pregnancy has the potential to reduce adverse gestational outcomes, in particular by decreasing the risk of developing hypertensive disorders during pregnancy, which are associated with a significant number of maternal deaths and considerable risk of preterm birth, the leading cause of early. Calcium citrate maleate and other nutrients are essential for cell growth and the production and functioning of DNA – the body's genetic blueprint. Based on clinical evidences Calsiara™ is essential for Pregnancy Mother and Fetal development. Along with to improve the mineral density of bone.
An Analysis on the Application of Information and Communication Technology (I...AJASTJournal
The paper sought to analyse the application of Information and Communication Technology (ICT) in teaching Health Education students in tertiary institutions in Adamawa State. A survey research design was used for the study. The population for the study comprised of 4 tertiary institutions offering Health Education out of which 2 were sampled. A simple random sampling was used in selecting 150 students from each of the institutions sampled making a total of 300 respondents. Data was collected with the use of questionnaire which was subjected to validity and reliability test. The mean and ANOVA was used in establishing the correlation between the variables in the study. The researcher accepts a result if the average mean is above 2.6 which is on the high side and shows a significant relationship. The researchers also reject a result if the average mean is below 2.5 which is on the low side and shows no significant relationship. Based on the findings of this study, it is recommended that: institutions and their management should have more ICT training centers on campus, the management of the institutions should urgently make sure ICT facilities are available for students’ use, the students should be given assignments, course project, group work, which will involve sourcing for information from the internet, lecturers should encourage students to organize mini seminars for presentation of assignments through the use of power point among others.
Design and Construction of an Installation for Testing Bubble Generators Used...AJASTJournal
The paper presents an installation comprising four fine bubble generators each with a circular perforated plate with ∅ 0.2 mm orifices. There is a water tank inside the installation in which compressed air is introduced. The installation is designed so as to ensure the monitoring of the following parameters: 1 - The size of the air bubbles; 2 - The appearance of bubble coalescence; 3 - Increasing the dissolved oxygen concentration in water; 4 - The amount of pressure loss that occurs when air passes through the bubble generator; 5 - The efficiency of the aeration process; 6 - Efficacity of the aeration process; 7 - Air consumption; 8 - Electricity consumption; 9 - Air temperature; 10 - Water temperature; 11 - Compressed air pressure; 12 - Hydrostatic load (H).
Innovative Fluid Machine that Can Operate both as a Turbine and as a PumpAJASTJournal
The Integrated turbine electric generator (ITEG) machine has been designed by Stefano Farné and Vito Lavanga and it is the subject of a registered patent that has also received WIPO positive research reports. ITEG allows to integrate a fluid dynamic machine and an electric motor into a single device, making it versatile and allowing a wide range of use both as a pump, giving prevalence to a fluid, and as a turbine, generating electric power. Thanks to the extreme simplicity of installation and to the low maintenance request, since it is gearless, ITEG can be more convenient than traditional machines, both for hydroelectric energy production and for pumping purposes. The present paper shows the various aspects of the design of this innovative machine, presents the literature review examined in terms of scientific articles and patents and illustrates the mathematical model that allows ITEG sizing and the simulation of its operation.
Design of Circularly Polarized Transmit array Antenna using Low-Profile Dual-...AJASTJournal
A low-profile dual-linearly-polarized unit cell in X-band, and its capability is demonstrated by a circularly polarized transmit array. The unit cell comprises three metallic layers etched on two dielectric slabs without air gap. Cross strips are inserted in cross slots on the top and bottom layers, and the T-slot structure is etched on the middle layer. The proposed unit cell has high isolation between the dual polarizations, and its total thickness of the unit cell is only 1 mm. Prototype of a 341-element transmit array, the incoming incident linearly polarized wave is transformed into the outgoing circularly polarized wave, is simulated. The measured results show that the proposed transmit array realizes 3.5% (9.8-10.15 GHz), axial ratio bandwidth and 4% (9.7-10.1 GHz) 1-dB gain bandwidth. The measured peak gain at 10 GHz is 21.9 dBi, with the aperture efficiency of 36%.
Stature Estimation from Index and Ring Finger in Kashmiri PopulationAJASTJournal
Background: Estimation of stature plays a very important role in personal identification and medico legal examination in activities like mass disaster, bomb explosive, air crash, terror etc. For the purpose of identification, it becomes quite easy when whole of the body is available but in cases where the only the fragments of body found, it becomes extreme difficult to continue with the process of identification. Aim: The aim of this study is to find regression equation through hand various measurements particularly in Kashmiri Pandit’s with pure trait residing in territory of Jammu, India. Subject and Method: For this study, 126 females and 144 males with age groups 20-45 years were taken. Length of both the hand was done with the help of vernier caliper from bracelet crease to the tip of middle finger, length of index and ring finger was measured from proximal flexion to their respective tips while the hand breadth was taken with vernier caliper from meta carpel radiale to meta carpel ulnar. The total height of the individual was measured with anthropometric scale and all these measurements were done after informed consent. Data was analyzed with the help of SPSS-16 using basic statistics -linear regression, multiple regression and t-test. Results: Significant co-relations between stature and entire hand dimensions were established except the hand breadth. The highest co relation with the stature was observed with hand length and ring finger than the other variables. Linear and multiple regression were calculated separately for males and females. Conclusion: The present study has provided with regression equations from various hand parameters that can be applied for stature estimation only in Kashmiri Pandit population only.
Development and Performance Evaluation of Power Driven ChopperAJASTJournal
Maize and sorghum stalk considered among the most fodder materials in Ethiopia. Therefore the chop machine was adapted and evaluated. The research was conducted at Asella Agricultural Engineering Research Center (AAERC), Arsi Negelle and Zuway Dugda districts to evaluate the machine performance in terms of chopping efficiency, throughput capacity, cutting efficiency and fuel consumption at different speed of cutter shaft. The output of chopper was found to be remarkable achievement. The chopping efficiency was decreased from 97.28 to 92.43 % on maize stalk and 95 to 90.2 % on sorghum stalk as rpm increases from 1150 to 1850 respectively. Throughput capacity of chopper was increases from 8.13 to 12.6 kg/min on maize stalk and 10.26 to 14.5 kg/min on sorghum stalk as rpm increases from 1150 to 1850 respectively. The mean of chopping length and cutting efficiency of 3.5 cm and 96.64 % on maize and also 2.53 cm and 97.63 % on sorghum stalk respectively.
Unconventional Adulterants in Seized Heroin Samples: Forensic InsightAJASTJournal
Drug abuse is a global predicament. The illicit market of drugs consistently witnesses experiments to deceive law regulatory agencies during manufacturing and trading of these regulated drugs. Drug traders amalgamate core drug compound with other chemical moieties to deceive regulatory agencies, to enhance potency and to escalate the tempt for consumption. Diacetylmorphine, commonly called smack/heroin is substantially seized round the globe, which clearly indicates its large scale abuse. This study presents some unusual additives in 252 seized samples for suspected heroin, referred to Forensic Science Laboratory (FSL), Delhi in the year 2019. The samples were isolated, screened and identified using GC-MS technique. Besides other consistent additives, four unusual novel adulterants were detected in confiscated heroin samples in Delhi, India. The study will update forensic chemical experts in detection of new adulterants in seized drugs, besides disseminating awareness and knowledge among those concerned with drug regulation, monitoring and policy making.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
2. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 4, Pages 40-49, October-December 2022
ISSN: 2456-883X
41
1.2. Network Threats
The network has a significant impact on how well cloud solutions run and interact with clients. Some businesses do
not place a high priority on cybersecurity while creating cloud solutions [12]. Lack of cybersecurity opens up attack
routes for strangers and malevolent users, posing a variety of network dangers [13-16]. Accounts or service
hijacking and denial of service attacks are the two main serious network dangers in the cloud.
1.3. Cloud Environment-specific Threats
The management of the cloud infrastructure is mostly the responsibility of cloud providers. According to a study
published by Alert Logic, approximately 50% of cloud customers view service provider problems as a significant
danger to cloud computing. Challenges to cloud computing, aside from those posed by service providers, include
those posed by hostile cloud users, unsecured interface design and application programming interfaces (APIs),
shared technical vulnerabilities, and improper usage of the public cloud.
░ 2. LITERATURE REVIEW
Despite directly receiving them, the investigation was carried out on cloud computing services such as networks,
storage, servers, software, and applications. According to research findings, the likelihood of data leakage and
other issues has decreased for large systems. On-demand online services are provided through cloud computing.
Cloud computing is the ideal option for people who do not want to set up infrastructure in their system if a firm that
offers internet services has to invest significant capital funds in infrastructure and issues like machine failure, disc
failure, software bugs, etc. This study suggests that cloud users just need to pay for the services they consume rather
than spending money on infrastructure.
Researchers have explored the security threats associated with the cloud computing system, its features, the cloud
delivery paradigm, and the cloud stakeholders since the cloud's storage of data are expanding quickly, but the safety
of open-ended and relatively easily accessible resource is still in doubt. Cloud security was briefly explored by the
researchers. These days, more and more individuals use clouds, sending, receiving, and storing sensitive
information through networks, making cloud network cybersecurity a key concern. The researchers discuss some
of these difficulties. Risk factors that affect cloud security include data corruption, man-in-the-middle attacks, and
violation of sensitive data.
Considering clients and servers, the cloud is currently one of the most technologically advanced study areas.
Researchers go into detail to make certain that a reputation management solution is used to handle robust security
and privacy and to maintain the information-containing transactions table. Virtualization is essential for cloud
computing, but its privacy has not received enough attention. This research on cloud security focuses on the impact
of virtualization threats on various cloud computing service models. With the aid of virtualization, cloud computing
provides a mechanism for the allocation of resources, including applications and infrastructure, and deliberating
cloud environments encourage service providers to be adaptable and trustworthy. Cloud security offers a security
pattern that cloud service providers must follow. Cloud data is encrypted using the RSA method and a digital
signature. To strengthen the privacy of cloud data while it is being moved over networks, security management
models, security protocols, and the RSA algorithm with digital signature are described.
3. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 4, Pages 40-49, October-December 2022
ISSN: 2456-883X
42
The scientific community has discovered that using several cloud providers to handle security has received less
emphasis than using a single cloud provider. The focus of this study is on using multiple clouds to lower safety risks
and improve information security. Due to the movement of information outside of inter-organizational and internet
connectivity, cloud users put the host's control at risk. Researchers give a quick explanation of data security, which
has grown to be a major concern for cloud service providers, as well as how to preserve a degree of trust among data
owners. Instead of carrying out physical attacks, the miscreants get the choice to harm people's confidential
information by committing cybercrime, and it takes time and effort to secure businesses, individuals, and the
country in order to avoid these attacks. Data mining and techniques play a significant role in this study's discussion
on ensuring the security of cloud data.
The Internet of Things (IoT) and cloud technology are the two most important technologies in modern life. They
are anticipated to be licensed and used more, making them the most essential factor of the world wide web. As a
result, the focus will be paid to the combination of IoT with cloud computing, known as Cloud IoT. The cloud
offers virtual pools of assets to customers via a web interface. These assets encompass architecture, networks,
platforms, software, and storage. Since the majority of organizations are trying to migrate their information to the
cloud, it is critical to guarantee the security and integrity of cloud consumers' data. This is why it is necessary to
discuss the risks associated with data stored in the cloud. The variety of a denial-of-service (DOS) attack and its
more significant aspect, distributed denial-of-service (DDOS), are the various kinds of intrusion in cloud
computing environments that suggest a technique that is capable of filtering and identifying most struck traffic
within a very short amount of time.
One of these main problems is the distributed denial of service attack, which is a type of breach in which several
invaders target a single target to stop users of the target network from using its facilities. This attack is characterized
by varied methods for detecting and preventing distributed denial of service attacks. In contrast to digital forensics,
going to investigate cloud security presents so many difficulties for investigators. For example, when attempting to
retrieve evidence from the cloud, forensic investigations may become increasingly challenging.
Researchers discussed why cloud complexity impacts digital investigations. The purpose of this study is to discuss
different unresolved security risks that impact cloud computing, as well as the benefits and drawbacks of current
cloud security measures. Cloud security concerns like data segregation, security, and data integrity are indeed
presented.
Cloud is a type of distributed computing where resources and applications are conveyed over the internet and cloud
users can pay on a usage basis. Anything that can send data across a network and is linked to the Internet is referred
to as the IoT. However, faulty technological implementation and deployment might result in security issues.
Researchers discussed the Internet of Things’ security concerns and subsequently suggested a security architecture
to lessen the vulnerabilities. Cloud computing is a dynamic technique that transforms data and relieves customers
of a load of maintaining local storage. Cloud consumers have suggested a technique to ensure security by utilizing
stenography and cryptographic methods. Users may easily connect to the network via an internet browser
according to the Security-as-a-Service (SaaS) model, which delivers secure communication architecture. The
technique is effective since it breaks encryption up into different encryptions. The platforms offer safe access for
4. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 4, Pages 40-49, October-December 2022
ISSN: 2456-883X
43
different users and complete logical dissociation of data resources and computation related to different
organizations. It is constructed by using the OpenStack framework, allowing access to multimodal advancements,
and trying to exploit fingerprints is a novel fingerprint method for user authentication. The study explained a cloud
computing system that is incorporated and constructed to use software applications and distribute via the internet.
Multi-cloud storage serves as one of the essential services in the cloud that is utilized to manage and access cloud
data from anywhere.
As per cloud users' suggested new security architecture for cloud framework that provides better secure
information processing and protects information from loss, cloud security has emerged as the main issue for cloud
experts. This is because unwanted activities are increasing. A self-governing process is necessary to ensure that
cloud data is hosted correctly in the cloud server and also that various security methodologies have been mentioned
for data storage on the cloud. Data providers and cloud services have unique qualities, and this structure provides
data storage and has various security issues. Cloud computing relies on "Utility Computing" and
"Software-as-a-Service" to deliver the services that users need; cloud security is a key factor and has many
connected challenges and problems. Data privacy, security concerns, and corrupted applications are just a few of
the characteristics that have an impact on security. Such problems affect both cloud service providers and
customers.
Due to the frequent changes in participation, few studies were able to resolve the difficult problem of data exchange
in a multi-proprietor approach using identity privacy and data preservation from an unreliable cloud. For
established groups in the cloud, the study presents the Mona secure multi-owner information dissemination
structure. Consequently, the user can share data with the network without revealing the cloud's distinctive secret.
Additionally, Mona offers quick client cancelation and new client joining. The memory overhead, computation
costs, and acceptable security criteria are all met while also guaranteeing efficiency. Huge storage is required for
passkey decoding in devices with limited resources, such as smart cards, mobile sensors, and cellphone knobs. For
instance, these private passkeys are usually kept in an expensive, tamper-proof memory. This analysis's successes
mainly aim to cut down on contact requirements like periodicity and looping connections like composite stamps.
To get around this problem, researchers developed a special type of open key encryption called Key Aggregate
Cryptosystem (KAC). The classes must conform to a few established hierarchical associations, but the similar
attribute displays a consistent size decoding key. The assumption that this control is eliminated is flexible, meaning
that no particular connection between the classes is necessary. The criteria model allows for the protection of whole
infrastructures.
░ 3. SECURITY TECHNIQUES FOR PROTECTION OF THREATS
In this paper, we outline the adoption of these security measures at several stages to protect clouds against
vulnerabilities.
3.1. Data Security
Protection against Data Breaches: To prevent data breaches in the cloud, several security methods and procedures
were suggested. One of them is to encrypt data before it is stored in the system and on the cloud.
5. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 4, Pages 40-49, October-December 2022
ISSN: 2456-883X
44
Effective key management algorithms and cloud-based key security are required for this. Implementing appropriate
isolation among virtual machines (VMs) to protect against data leaks, appropriate access controls to restrict access,
and performing a risk assessment of the cloud environment to understand where vulnerable data is stored and how
it is transmitted between various systems and networks are a few steps to be taken to protect security breaches in the
cloud.
3.2. Network Security
Protection against Service Hijacking: By implementing various areas of concern on cloud networks, accounts or
service hijacking may be prevented. To identify suspicious attacks, they also use intrusion detection systems (IDS)
in the cloud to monitor network traffic and nodes. The effectiveness, interoperability, and virtualization-based
environment of the cloud should be taken into consideration while designing intrusion detection and other network
security solutions. System-level virtualization and virtual machine monitor (responsible for controlling VMs)
approaches were combined to create an IDS system for the cloud. The IDSs in this design are built on virtual
machines, and the sensor connections are centered on the widely used IDS Snort. IDS keeps track of the activity
and condition of each VM, and its monitoring system allows for instant restarts, stops, and recoveries.
3.3. Security in Cloud Infrastructure
Security against Unprotected Interfaces and APIs - To guard the clouds against the risk posed by unsecured APIs,
programmers must build such APIs following trusted platform principles. Additionally, cloud service providers
must ensure that every API used in the cloud is developed effectively and is examined for any known
vulnerabilities before implementation. To protect information and services from unsecured interfaces and APIs, in
addition, it is necessary to build proper authentication procedures and network access. To create safe applications
which can aid in preventing these application threats, the Open Web Application Security Project (OWASP) offers
guidelines and specifications. Furthermore, while transferring the information to the cloud, clients must review the
interface and APIs of cloud service providers.
░ 4. DATA SECURITY AND PRIVACY PROTECTION ISSUES
Comparable to traditional data security and privacy protection, cloud-based data security and privacy protection
cover similar ground. Additionally, it participates in each phase of the data life cycle. Since the cloud is open and
includes several tenants, its data security and privacy protection policies have unique features. The data life cycle in
cloud computing can be seen in Figure 1. The following sections examine challenges with cloud data security and
privacy protection related to the data life cycle. The term data life cycle describes the full procedure between data
creation till data deletion.
4.1. Data Generation
The ownership of data includes the creation of data. In the conventional IT context, data is often owned and
managed by users or organizations. However, it has to be taken into account what to do to retain data ownership if
data is to be moved into the cloud. Data owners have a right to understand what personally-identifiable data is being
gathered about them, and in certain situations, to terminate such acquisition or use.
6. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 4, Pages 40-49, October-December 2022
ISSN: 2456-883X
45
Figure 1. Cloud Computing - Data Life Cycle
4.2. Data Transfer
Data transfer regularly occurs within a firm without security or only with a simple cryptographic technique. For
data transmission beyond corporate borders, data confidentiality and integrity must be ensured to avoid information
from being accessed and manipulated by unauthorized users. In other words, the encryption process by itself is
inadequate. Furthermore, data integrity should be ensured. It must guarantee the employment of transport layer
protocols to preserve simultaneously confidentiality and integrity. Confidentiality and integrity of data
transmission should be ensured not just from a business and cloud-based storage and also throughout different
types of cloud providers. To put it another way, the confidentiality and integrity of the entire data transfer process
should be guaranteed.
4.3. Data Use
Data encryption is possible when utilizing a basic storage service like Amazon S3 for static data. Data encryption is
frequently not practical for static data in use by cloud-based services in the PaaS or SaaS models. Static data used
by cloud-based apps are typically not secured since data encryption will create index and query issues. The data
getting handled is essentially not encrypted for every software to operate with, whether it is in a cloud environment
or a conventional IT infrastructure. Because cloud computing platforms support many tenants, the information
captured by cloud-based apps is kept with the data of other users. Process-related unencrypted data poses a major
risk to data security. Situations are more problematic when it comes to the utilization of private data. The
proprietors of private data must pay attention to and guarantee that the use of personal information is in line with the
data collection's goals and that it is not disclosed to third parties, such as cloud service providers.
4.4. Data Share
Data sharing widens the data's potential applications and complicates data permissions. The owner of the data may
grant access to the information to one client, who may then share the data with further parties without the owners'
permission. Consequently, while exchanging data, particularly with a third party, the data owners must take into
7. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 4, Pages 40-49, October-December 2022
ISSN: 2456-883X
46
account if the third party still adheres to the original security protocols and usage limitations. Sharing granularity
(all the data or partial data) and data transformation should also be taken into consideration when exchanging
private data, concerning data authorization. The granularity of sharing is determined by the content partition
granularity and the sharing policies. To isolate critical data from the original data is to alter the information. The
information is rendered irrelevant to the data owners as a result of this procedure.
4.5. Data Storage
Two ways to categorize the data in the cloud are (1) data in an IaaS environment, like Amazon's Simple Storage
Service, and (2) data in a PaaS or SaaS environment associated with cloud-based applications. Identical to data kept
elsewhere, cloud storage requires three components of information security to be taken into account:
confidentiality, integrity, and availability. Data encryption is an important means of maintaining data secrecy. The
usage of both the encryption algorithm and key strength must be taken into consideration to guarantee the
effectiveness of encryption. Computational time must be taken into account since the cloud computing
environment involves enormous volumes of data transfer, storage, and management.
4.6. Data Archival
Data archival is concerned with the storage medium, regardless of whether off-site storage is offered, and the length
of storage. The danger of data leaks increases if the data are kept on portable media and the media becomes
uncontrollable. The integrity of the data will be in danger if the cloud service providers do not offer off-site
archiving. Once more, the storage time commensurate with the needs of archives, If not, there may be hazards to the
availability or privacy.
4.7. Data Destruction
Whether the data has been destroyed when it is no longer required. The data that was erased may still be present and
be recoverable due to the physical properties of the storage media. Sensitive information may unintentionally be
disclosed as a consequence of this. By making just little service-related efforts or connecting with a services
provider, this may be quickly hosted and subsequently removed. The general public utilizes it to keep their
documents for a fair price or without charge. The many kinds of cloud services include Dropbox, Just Cloud, Baidu
Container, Google Drive, and others.
Such a setting enables customers to not demand the foundation for various processing services. They can be used to
access information from whatever computer is located anywhere in the globe. When related to prior traditional
computing techniques, this offers great adaptability by consolidating the elements providing high versatility and
multi-occupancy. In this paper, we have examined many factors including cloud security, data sharing, threats,
procedures, defensive measures, needs, and societal implications.
░ 5. ISSUES IN CLOUD ENVIRONMENT
The most crucial concern with cloud technology is security. All of it is accommodated on the properties of the
providers, which greatly increases the security of the data. It is a significant barrier to the adoption of cloud
computing. Security concerns are the top challenge confronting cloud computing, based on an IDC assessment on
8. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 4, Pages 40-49, October-December 2022
ISSN: 2456-883X
47
the subject. The risks associated with cloud computing include service interruptions, data breaches, privacy
invasion, and information destruction. These issues prohibit businesses from utilizing cloud computing services.
By using highly-regarded security mechanisms, they could be eliminated. The proportional rise in the number of
cybersecurity risks since 2020 is shown in Table 1.
Table 1. Percentages of cybersecurity threats targeted to different industries (2021)
Cybersecurity Threat
Industry
Manufacturing (No.) Healthcare (%) Financial (%)
Phishing 1396 29 46
Ransomware 2096 8 5
Trojan 696 46 31
Botnet 496 - 2
Cryptomining 4896 4 5
Others 996 13 11
░ 6. CONCLUSION
As new technology grows and advances, new kinds of cybersecurity dangers appear. Even if it is more vulnerable
to some risks than others, cloud computing is not impervious to conventional cybersecurity concerns. The integrity
of the data saved on the cloud is just another issue with cloud computing. Numerous places where cloud computing
resources are kept may be vulnerable to typical activities that compromise data integrity, like power outages, device
malfunctions, or natural disasters. All of these variables might have an impact on the integrity of the data, and if the
data is simply saved in the cloud without any additional backups or archiving, the data may be destroyed. Due to the
need for redundancies, a lot of individuals and businesses employ a multi-cloud solution, which replicates data
among many different cloud service providers. In this paper, the main security threats for cloud computing were
looked at. Moreover, methods for resolving issues with cloud computing technology's data security and privacy
protection were explored.
Declarations
Source of Funding
This research did not receive any grant from funding agencies in the public, commercial, or not-for-profit sectors.
Competing Interests Statement
The author declares no competing financial, professional, or personal interests.
Consent for publication
The author declares that he/she consented to the publication of this research work.
9. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 4, Pages 40-49, October-December 2022
ISSN: 2456-883X
48
References
[1] Wu H, Ding Y, Winer C, Yao L. (2010). Network Security for virtual machine in Cloud Computing. In 5th
International conference on computer sciences and convergence information technology (ICCIT). DC, USA: IEEE
Computer Society Washington, Pages 18–21.
[2] Xiaopeng G, Sumei W, Xianqin C. (2010). VNSS: a Network Security sandbox for virtual Computing
environment. In IEEE youth conference on information Computing and telecommunications (YC-ICT).
Washington DC, USA: IEEE Computer Society, Pages 395–398.
[3] Popovic K, Hocenski Z. (2010). Cloud Computing Security issues and challenges. In Proceedings of the 33rd
International Convention MIPRO. IEEE Computer Society Washington DC, USA, Pages 344–349.
[4] Carlin S, Curran K. (2011). Cloud Computing Security. International Journal of Ambient Computing and
Intelligence, 3(1): 38–46.
[5] Bisong A, Rahman S. (2011). An overview of the Security concerns in Enterprise Cloud Computing.
International Journal of Network Security & Its Applications, 3(1): 30–45. DOI: 10.5121/ijnsa.2011.3103.
[6] Townsend M. (2009). Managing a security program in a cloud computing environment. In Information Security
Curriculum Development Conference, Kennesaw, Georgia. NY, USA: ACM New York, Pages 128–133.
[7] Winkler V. (2011). Securing the Cloud: Cloud computer Security techniques and tactics. Waltham, MA:
Elsevier Inc.
[8] Ristenpart T, Tromer E, Shacham H, Savage S. (2009). Hey, you, get off of my cloud: exploring information
leakage in third-party compute clouds. In Proceedings of the 16th ACM conference on Computer and
communications security, Chicago, Illinois, USA. NY, USA: ACM New York, Pages 199–212.
[9] Zhang Y, Juels A, Reiter MK, Ristenpart T. (2012). Cross-VM side channels and their use to extract private
keys. In Proceedings of the 2012 ACM conference on Computer and communications security, New York, NY,
USA. NY, USA: ACM New York, Pages 305–316.
[10] Wang Z, Jiang X. (2010). HyperSafe: a lightweight approach to provide lifetime hypervisor control-flow
integrity. In Proceedings of the IEEE Symposium on Security and privacy. Washington, DC, USA: IEEE Computer
Society, Pages 380–395.
[11] Wang C, Wang Q, Ren K, Lou W. (2009). Ensuring data Storage Security in Cloud Computing. In The 17th
International workshop on quality of service. Washington, DC, USA: IEEE Computer Society, Pages 1–9.
[12] Fernandez EB, Yoshioka N, Washizaki H. (2009). Modeling Misuse Patterns. In Proceedings of the 4th Int.
Workshop on Dependability Aspects of Data Warehousing and Mining Applications (DAWAM 2009), in
conjunction with the 4th Int. Conf. on Availability, Reliability, and Security (ARES 2009), Fukuoka, Japan.
Washington, DC, USA: IEEE Computer Society, Pages 566–571.
[13] Santos N, Gummadi KP, Rodrigues R. (2009). Towards Trusted Cloud Computing. In Proceedings of the 2009
conference on Hot topics in cloud computing, San Diego, California. CA, USA: USENIX Association Berkeley.
10. Asian Journal of Applied Science and Technology (AJAST)
Volume 6, Issue 4, Pages 40-49, October-December 2022
ISSN: 2456-883X
49
[14] Zhang F, Huang Y, Wang H, Chen H, Zang B. (2008). PALM: Security Preserving VM Live Migration for
Systems with VMM-enforced Protection. In Trusted Infrastructure Technologies Conference, 2008. APTC’08,
Third Asia-Pacific. Washington, DC, USA: IEEE Computer Society, Pages 9–18.
[15] Xiao S, Gong W. (2010). Mobility Can help: protect user identity with dynamic credential. In the Eleventh
International Conference on Mobile Data Management (MDM). Washington, DC, USA: IEEE Computer Society,
Pages 78–380.
[16] Somani U, Lakhani K, Mundra M. (2010). Implementing digital signature with RSA encryption algorithm to
enhance the data Security of Cloud in Cloud Computing. In 1st International conference on parallel distributed and
grid Computing (PDGC). IEEE Computer Society Washington, DC, USA, Pages 211–216.
░ Cite this article
Satinderjeet, S. Methodologies for Resolving Data Security and Privacy Protection Issues in Cloud
Computing Technology. Asian Journal of Applied Science and Technology 6(4), 40–49 (2022).
░ Publisher’s Note
Nemeth Publishers remain neutral with regard to jurisdictional claims in the published maps and
institutional affiliations.