Cloud computing is one of the fastest growing and popular technology in the field of computing. As the concept of cloud computing was introduced in 2006. Since then large number of IT industries join the queue to develop many cloud services and put sensitive information over cloud. In fact cloud computing is no doubt the great innovation in the field of computing but at the same time also poses many challenges. Since a large number of organizations migrate their business to cloud and hence it appears as an attractive target for the malicious attack. The purpose of the paper is to review the available literature for security concerns and highlight a relationship between vulnerabilities, attacks and threats in SaaS model. A mapping is being presented to highlight the impact of vulnerabilities and attacks.
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...IJERA Editor
Cloud computing, undoubtedly, is a path to expand the limits or add powerful capabilities on-demand with
almost no investment in new framework, training new staff, or authorizing new software. Though today
everyone is talking about cloud but, organizations are still in dilemma whether it’s safe to deploy their business
on cloud. The reason behind it; is nothing but Security. No cloud service provider provides 100% security
assurance to its customers and therefore, businesses are hesitant to accept cloud and the vast benefits that come
along with it. The absence of proper security controls delimits the benefits of cloud. In this paper, a review on
different cloud service models and a survey of the different security challenges and issues while providing
services in cloud is presented .The paper focuses on the security issues specific to service delivery model (SaaS,
IaaS and PaaS) of cloud environment. This paper also explores the various security solutions currently being
applied to protect cloud from various kinds of intruders.
Cloud computing has changed the entire process that distributed computing used to present e.g. Grid
computing, server client computing. Cloud computing describes recent developments in many existing IT
technologies and separates application and information resources from the underlying infrastructure.
Cloud computing security is an important aspect of quality of service from cloud service providers.
Security concerns arise as soon as one begins to run applications beyond the designated firewall and move
closer towards the public domain. In violation of security in any component in the cloud can be disaster for
the organization (the customer) as well as for the provider. In this paper, we propose a cloud security
model and security framework that identifies security challenges in cloud computing.
A traditional computing environment requires a costly
infrastructure to offer a better service to users. The introduction
of cloud computing has changed the working environment from
traditional to virtual. A larger number of IT companies are
utilizing the cloud. On the one hand, the cloud attracts more
number of consumers by offering services with minimized
capital cost and virtual infrastructure. On the other hand, there
are a risk and security challenges in cloud computing that
makes the user not to move completely towards it. The cloud
environment is more vulnerable to security breaches and data
theft. Moreover, insider attacks are more frequent in larger
enterprises. An unauthenticated user can cause more damage
to company reputation. The cloud service providers are trying
to provide a secure work environment for users. However,
there is a lack of global standards and policies to invoke
security measures in cloud computing. This study aims to
highlight and classify security challenges and trust issues in the
cloud environment.
The survey was conducted in various institutions and
governmental organizations in Saudi Arabia to study the
opinions of stakeholders on cloud computing security
challenges and risks.
Links:
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
The paradigm called “Cloud computing” acts as a mechanism for attaining the resources of shared technology and infrastructure cost-effectively. The on-demand services are accomplished to execute the various operations across the network. Regularly, the last client doesn't know about the area of open physical assets and devices. Developing, using, and dealing with their applications 'on the cloud', which includes virtualization of assets that keeps and guides itself are led by arranged activities to clients. Calculation experience the new methodology of cloud computing which perhaps keeps the world and can set up all the human necessities. At the end of the day, cloud computing is the ensuing normal step in the development of on-request data innovation administrations and items. The Cloud is an allegory for the Internet and is an idea for the secured confused foundation; it likewise relies upon drawing network graphs on a computer. In this work, thorough investigations of distributed computing security and protection concerns are given. The work distinguishes both the identified and unidentified attacks, vulnerabilities in the cloud, security attacks and also the solutions to control these threats and attacks. Moreover, the restrictions of the present solutions and offers various perceptions of security viewpoints are distinguished and explored. At long last, a cloud security system is given in which the different lines of protection and the reliance levels among them are identified.
Abstract: Distributed computing is a situated of IT administrations that are given to a client more than a system on a rented premise and with the capacity to scale up or down their administration necessities. Generally cloud registering administrations are conveyed by an outsider supplier who possesses the foundation. It favorable circumstances to specify yet a couple incorporate versatility, strength, adaptability, productivity and outsourcing non-center exercises. Distributed computing offers an imaginative plan of action for associations to receive IT benefits without forthright speculation. Notwithstanding the potential increases accomplished from the distributed computing, the associations are moderate in tolerating it because of security issues and difficulties connected with it. Security is one of the significant issues which hamper the development of cloud. The thought of giving over vital information to another organization is troubling; such that the shoppers should be cautious in comprehension the dangers of information breaks in this new environment. This paper presents a point by point examination of the distributed computing security issues furthermore, difficulties concentrating on the distributed computing sorts and the administration conveyance sorts.Keywords: Cloud Computing, Scalability, Infrastructure, IT.
Title: Cloud Computing Security Issues and Challenges
Author: Nishant Katiyar
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Security in Cloud Computing For Service Delivery Models: Challenges and Solut...IJERA Editor
Cloud computing, undoubtedly, is a path to expand the limits or add powerful capabilities on-demand with
almost no investment in new framework, training new staff, or authorizing new software. Though today
everyone is talking about cloud but, organizations are still in dilemma whether it’s safe to deploy their business
on cloud. The reason behind it; is nothing but Security. No cloud service provider provides 100% security
assurance to its customers and therefore, businesses are hesitant to accept cloud and the vast benefits that come
along with it. The absence of proper security controls delimits the benefits of cloud. In this paper, a review on
different cloud service models and a survey of the different security challenges and issues while providing
services in cloud is presented .The paper focuses on the security issues specific to service delivery model (SaaS,
IaaS and PaaS) of cloud environment. This paper also explores the various security solutions currently being
applied to protect cloud from various kinds of intruders.
Cloud computing has changed the entire process that distributed computing used to present e.g. Grid
computing, server client computing. Cloud computing describes recent developments in many existing IT
technologies and separates application and information resources from the underlying infrastructure.
Cloud computing security is an important aspect of quality of service from cloud service providers.
Security concerns arise as soon as one begins to run applications beyond the designated firewall and move
closer towards the public domain. In violation of security in any component in the cloud can be disaster for
the organization (the customer) as well as for the provider. In this paper, we propose a cloud security
model and security framework that identifies security challenges in cloud computing.
A traditional computing environment requires a costly
infrastructure to offer a better service to users. The introduction
of cloud computing has changed the working environment from
traditional to virtual. A larger number of IT companies are
utilizing the cloud. On the one hand, the cloud attracts more
number of consumers by offering services with minimized
capital cost and virtual infrastructure. On the other hand, there
are a risk and security challenges in cloud computing that
makes the user not to move completely towards it. The cloud
environment is more vulnerable to security breaches and data
theft. Moreover, insider attacks are more frequent in larger
enterprises. An unauthenticated user can cause more damage
to company reputation. The cloud service providers are trying
to provide a secure work environment for users. However,
there is a lack of global standards and policies to invoke
security measures in cloud computing. This study aims to
highlight and classify security challenges and trust issues in the
cloud environment.
The survey was conducted in various institutions and
governmental organizations in Saudi Arabia to study the
opinions of stakeholders on cloud computing security
challenges and risks.
Links:
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
The paradigm called “Cloud computing” acts as a mechanism for attaining the resources of shared technology and infrastructure cost-effectively. The on-demand services are accomplished to execute the various operations across the network. Regularly, the last client doesn't know about the area of open physical assets and devices. Developing, using, and dealing with their applications 'on the cloud', which includes virtualization of assets that keeps and guides itself are led by arranged activities to clients. Calculation experience the new methodology of cloud computing which perhaps keeps the world and can set up all the human necessities. At the end of the day, cloud computing is the ensuing normal step in the development of on-request data innovation administrations and items. The Cloud is an allegory for the Internet and is an idea for the secured confused foundation; it likewise relies upon drawing network graphs on a computer. In this work, thorough investigations of distributed computing security and protection concerns are given. The work distinguishes both the identified and unidentified attacks, vulnerabilities in the cloud, security attacks and also the solutions to control these threats and attacks. Moreover, the restrictions of the present solutions and offers various perceptions of security viewpoints are distinguished and explored. At long last, a cloud security system is given in which the different lines of protection and the reliance levels among them are identified.
Abstract: Distributed computing is a situated of IT administrations that are given to a client more than a system on a rented premise and with the capacity to scale up or down their administration necessities. Generally cloud registering administrations are conveyed by an outsider supplier who possesses the foundation. It favorable circumstances to specify yet a couple incorporate versatility, strength, adaptability, productivity and outsourcing non-center exercises. Distributed computing offers an imaginative plan of action for associations to receive IT benefits without forthright speculation. Notwithstanding the potential increases accomplished from the distributed computing, the associations are moderate in tolerating it because of security issues and difficulties connected with it. Security is one of the significant issues which hamper the development of cloud. The thought of giving over vital information to another organization is troubling; such that the shoppers should be cautious in comprehension the dangers of information breaks in this new environment. This paper presents a point by point examination of the distributed computing security issues furthermore, difficulties concentrating on the distributed computing sorts and the administration conveyance sorts.Keywords: Cloud Computing, Scalability, Infrastructure, IT.
Title: Cloud Computing Security Issues and Challenges
Author: Nishant Katiyar
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware,
networking, and services integrate to offer different computational facilities, while Internet or a private
network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud
system delimit the benefits of cloud computing like “on-demand, customized resource availability and
performance management”. It is understood that current IT and enterprise security solutions are not
adequate to address the cloud security issues. This paper explores the challenges and issues of security
concerns of cloud computing through different standard and novel solutions. We propose analysis and
architecture for incorporating different security schemes, techniques and protocols for cloud computing,
particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed
architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and
is not coupled with the underlying backbone. This would facilitate to manage the cloud system more
effectively and provide the administrator to include the specific solution to counter the threat. We have also
shown using experimental data how a cloud service provider can estimate the charging based on the
security service it provides and security-related cost-benefit analysis can be estimated.
Assurance of Security and Privacy Requirements for Cloud Deployment ModelIJMTST Journal
Regardless of the few advantages of relocating endeavor basic resources for the Cloud, there are challenges particularly identified with security and protection. It is imperative that Cloud Users comprehend their security and protection needs, in light of their particular setting and select cloud show best fit to help these requirements. The writing gives works that attention on talking about security and protection issues for cloud frameworks yet such works don't give a nitty gritty methodological way to deal with evoke security and security necessities neither one of the to choose cloud arrangement models in view of fulfillment of these prerequisites by Cloud Service Providers. This work propels the present best in class towards this bearing. Specifically, we consider necessities designing ideas to inspire and dissect security and protection prerequisites and their related instruments utilizing an applied structure and an orderly procedure. The work presents confirmation as proof for fulfilling the security and protection necessities as far as culmination and reportable of security occurrence through review. This enables point of view cloud clients to characterize their confirmation prerequisites with the goal that proper cloud models can be chosen for a given setting. To exhibit our work, we display comes about because of a genuine contextual analysis in view of the Greek National Gazette.
In cloud computing IT (Information Technology) related resources like infrastructure, platform and software can be utilized using web based tools and application through internet. Here Organizations are moving to the cloud computing some faster than others. However, moving to the cloud presents the organization with a number of risks to assess. Information security is the most critical risk for many organizations. This is because the intellectual property, trade secrets, personally identifiable information,
or other sensitive information can be powered by protecting information. This paper classified cloud
security based on the three service models of cloud computing SaaS, PaaS and IaaS. Attributes for each
type of security has also identified and briefly described here. We compared securities provided in different
services by world's best known cloud service providing companies such as Amazon AWS, Google App Engine, Windows Azure etc. considering cloud security category. Furthermore, we included recommendations for organizations who have decided to move their data into the cloud, but confused to choose the best service provider for their organization regarding information security.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
Abstract: Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. We propose a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge questions, we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user’s real data. Experiments conducted in a local file setting provide evidence that this approach may provide unprecedented levels of user data security in a Cloud environment.
Keywords: Mist, Insider data stealing, Bait information, Lure Files, Validating user
IT Solutions for 3 Common Small Business ProblemsBrooke Bordelon
Many time consuming IT problems can be side-stepped by establishing a solid network from the get-go rather than playing catch up with problems as they arise..find out how with these IT solutions.
Cloud Computing has emerged as the premier infrastructure for creating affordable, scalable and reliable IT solutions for companies of all sizes. However, as with all new technologies, Cloud Computing poses many demanding security considerations, and each must be addressed to ensure the confidentiality, integrity, availability, authenticity, and privacy of a developer’s product.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
Cloud Computing Security Issues and ChallengesCSCJournals
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware, networking, and services integrate to offer different computational facilities, while Internet or a private network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud system delimit the benefits of cloud computing like “on-demand, customized resource availability and performance management”. It is understood that current IT and enterprise security solutions are not adequate to address the cloud security issues. This paper explores the challenges and issues of security concerns of cloud computing through different standard and novel solutions. We propose analysis and architecture for incorporating different security schemes, techniques and protocols for cloud computing, particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and is not coupled with the underlying backbone. This would facilitate to manage the cloud system more effectively and provide the administrator to include the specific solution to counter the threat. We have also shown using experimental data how a cloud service provider can estimate the charging based on the security service it provides and security-related cost-benefit analysis can be estimated.
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
In this study, survey questions were sent to different non-profit and government organizations, which
assisted in collecting fundamental information. The data was acquired by conducting surveys in OpenStack
Company to identify the critical vulnerabilities in the cloud computing platform in order to provide the
recommended solutions.
So, analysis will be made on how the cloud’s characteristics such as the nature of the architecture,
attractiveness, as well as, vulnerability are tightly related to privacy and security issues. Privacy and
security are complex issues for which there is no standard and the relationship between them is necessarily
complicated. The study also highlight on the inherent challenge to data privacy because it typically results
in data to be presented in an encryption from the data owner. Thus, the study aimed at obtaining a common
goal to provide a comprehensive review of the existing security and privacy issues in cloud environments,
and identify and describe the most representative of the security and privacy attributes and present a
relationship among them.
Finally, in order to ensure that the standard measure of validity is achieved, validity test was conducted in
order to ensure that the study is free from errors. Various recommendations were provided. The study also
explored various areas that require future directions for each attribute, which comprise of multi-domain
policy integration and a secure service composition to design a comprehensive policy-based management
framework in the cloud environments.
Lastly, the recommendations will provide the potential for security and privacy approaches that can be
implemented to improve the cloud computing environment to ensure that a level of trust is achieved
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware,
networking, and services integrate to offer different computational facilities, while Internet or a private
network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud
system delimit the benefits of cloud computing like “on-demand, customized resource availability and
performance management”. It is understood that current IT and enterprise security solutions are not
adequate to address the cloud security issues. This paper explores the challenges and issues of security
concerns of cloud computing through different standard and novel solutions. We propose analysis and
architecture for incorporating different security schemes, techniques and protocols for cloud computing,
particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed
architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and
is not coupled with the underlying backbone. This would facilitate to manage the cloud system more
effectively and provide the administrator to include the specific solution to counter the threat. We have also
shown using experimental data how a cloud service provider can estimate the charging based on the
security service it provides and security-related cost-benefit analysis can be estimated.
Assurance of Security and Privacy Requirements for Cloud Deployment ModelIJMTST Journal
Regardless of the few advantages of relocating endeavor basic resources for the Cloud, there are challenges particularly identified with security and protection. It is imperative that Cloud Users comprehend their security and protection needs, in light of their particular setting and select cloud show best fit to help these requirements. The writing gives works that attention on talking about security and protection issues for cloud frameworks yet such works don't give a nitty gritty methodological way to deal with evoke security and security necessities neither one of the to choose cloud arrangement models in view of fulfillment of these prerequisites by Cloud Service Providers. This work propels the present best in class towards this bearing. Specifically, we consider necessities designing ideas to inspire and dissect security and protection prerequisites and their related instruments utilizing an applied structure and an orderly procedure. The work presents confirmation as proof for fulfilling the security and protection necessities as far as culmination and reportable of security occurrence through review. This enables point of view cloud clients to characterize their confirmation prerequisites with the goal that proper cloud models can be chosen for a given setting. To exhibit our work, we display comes about because of a genuine contextual analysis in view of the Greek National Gazette.
In cloud computing IT (Information Technology) related resources like infrastructure, platform and software can be utilized using web based tools and application through internet. Here Organizations are moving to the cloud computing some faster than others. However, moving to the cloud presents the organization with a number of risks to assess. Information security is the most critical risk for many organizations. This is because the intellectual property, trade secrets, personally identifiable information,
or other sensitive information can be powered by protecting information. This paper classified cloud
security based on the three service models of cloud computing SaaS, PaaS and IaaS. Attributes for each
type of security has also identified and briefly described here. We compared securities provided in different
services by world's best known cloud service providing companies such as Amazon AWS, Google App Engine, Windows Azure etc. considering cloud security category. Furthermore, we included recommendations for organizations who have decided to move their data into the cloud, but confused to choose the best service provider for their organization regarding information security.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
Abstract: Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. We propose a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge questions, we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user’s real data. Experiments conducted in a local file setting provide evidence that this approach may provide unprecedented levels of user data security in a Cloud environment.
Keywords: Mist, Insider data stealing, Bait information, Lure Files, Validating user
IT Solutions for 3 Common Small Business ProblemsBrooke Bordelon
Many time consuming IT problems can be side-stepped by establishing a solid network from the get-go rather than playing catch up with problems as they arise..find out how with these IT solutions.
Cloud Computing has emerged as the premier infrastructure for creating affordable, scalable and reliable IT solutions for companies of all sizes. However, as with all new technologies, Cloud Computing poses many demanding security considerations, and each must be addressed to ensure the confidentiality, integrity, availability, authenticity, and privacy of a developer’s product.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
Cloud Computing Security Issues and ChallengesCSCJournals
Cloud computing is a set of IT services that are provided to a customer over a network on a leased basis and with the ability to scale up or down their service requirements. Usually cloud computing services are delivered by a third party provider who owns the infrastructure. It advantages to mention but a few include scalability, resilience, flexibility, efficiency and outsourcing non-core activities. Cloud computing offers an innovative business model for organizations to adopt IT services without upfront investment. Despite the potential gains achieved from the cloud computing, the organizations are slow in accepting it due to security issues and challenges associated with it. Security is one of the major issues which hamper the growth of cloud. The idea of handing over important data to another company is worrisome; such that the consumers need to be vigilant in understanding the risks of data breaches in this new environment. This paper introduces a detailed analysis of the cloud computing security issues and challenges focusing on the cloud computing types and the service delivery types.
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware, networking, and services integrate to offer different computational facilities, while Internet or a private network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud system delimit the benefits of cloud computing like “on-demand, customized resource availability and performance management”. It is understood that current IT and enterprise security solutions are not adequate to address the cloud security issues. This paper explores the challenges and issues of security concerns of cloud computing through different standard and novel solutions. We propose analysis and architecture for incorporating different security schemes, techniques and protocols for cloud computing, particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and is not coupled with the underlying backbone. This would facilitate to manage the cloud system more effectively and provide the administrator to include the specific solution to counter the threat. We have also shown using experimental data how a cloud service provider can estimate the charging based on the security service it provides and security-related cost-benefit analysis can be estimated.
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
In this study, survey questions were sent to different non-profit and government organizations, which
assisted in collecting fundamental information. The data was acquired by conducting surveys in OpenStack
Company to identify the critical vulnerabilities in the cloud computing platform in order to provide the
recommended solutions.
So, analysis will be made on how the cloud’s characteristics such as the nature of the architecture,
attractiveness, as well as, vulnerability are tightly related to privacy and security issues. Privacy and
security are complex issues for which there is no standard and the relationship between them is necessarily
complicated. The study also highlight on the inherent challenge to data privacy because it typically results
in data to be presented in an encryption from the data owner. Thus, the study aimed at obtaining a common
goal to provide a comprehensive review of the existing security and privacy issues in cloud environments,
and identify and describe the most representative of the security and privacy attributes and present a
relationship among them.
Finally, in order to ensure that the standard measure of validity is achieved, validity test was conducted in
order to ensure that the study is free from errors. Various recommendations were provided. The study also
explored various areas that require future directions for each attribute, which comprise of multi-domain
policy integration and a secure service composition to design a comprehensive policy-based management
framework in the cloud environments.
Lastly, the recommendations will provide the potential for security and privacy approaches that can be
implemented to improve the cloud computing environment to ensure that a level of trust is achieved
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
Cloud computing technology security and trust challengesijsptm
A let of exclusive features such as high functionality and low cost have made cloud computing a valuable
technology. These remarkable features give users and companies, countless opportunities to reach their
goals spending minimum cost and time. Looking at the literature of this technology, it can be claimed that
the main concerns of the users of cloud are security issues especially trust. Unfortunately these concerns
have not been tackled yet. Therefore we decided to introduce a useful and functioned way to create more
trust among consumers to use this technology .In this paper we suggest the foundation of an international
certification institute for the service providing companies in order to increase trust and enhance likeliness
of using this new and valuable technology among people. Practicality of the technology will improve it and
will make its security better by providers.
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Cloud computing is set of resources and services offered through the Internet. Cloud
services are delivered from data centers located throughout the world. Cloud computing
facilitates its consumers by providing virtual resources via internet. The biggest challenge in
cloud computing is the security and privacy problems caused by its multi-tenancy nature and the
outsourcing of infrastructure, sensitive data and critical applications. Enterprises are rapidly adopting
cloud services for their businesses, measures need to be developed so that organizations can be assured
of security in their businesses and can choose a suitable vendor for their computing needs. Cloud
computing depends on the internet as a medium for users to access the required services at any time on
pay-per-use pattern. However this technology is still in its initial stages of development, as it suffers
from threats and vulnerabilities that prevent the users from trusting it. Various malicious activities
from illegal users have threatened this technology such as data misuse, inflexible access control and
limited monitoring. The occurrence of these threats may result into damaging or illegal access of
critical and confidential data of users. In this paper we identify the most vulnerable security
threats/attacks in cloud computing, which will enable both end users and vendors to know a bout
the k ey security threats associated with cloud computing and propose relevant solution directives to
strengthen security in the Cloud environment. We also propose secure cloud architecture for
organizations to strengthen the security.
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
In the digital world using technology and new technologies require safe and reliable environment, and it also requires consideration to all the challenges that technology faces with them and address these challenges. Cloud computing is also one of the new technologies in the IT world in this rule there is no exception. According to studies one of the major challenges of this technology is the security and safety required for providing services and build trust in consumers to transfer their data into the cloud. In this paper we attempt to review and highlight security challenges, particularly the security of data storage in a cloud environment. Also, provides some offers to enhance the security of data storage in the cloud
computing systems that by using these opinions can be overcome somewhat on the problems.
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
In the IoT scenario, things at the edge can create significantly large amounts of data. Fog Computing has recently emerged as the paradigm to address the needs of edge computing in the Internet of Things (IoT) and Industrial Internet of Things (IIoT) applications. In a Fog Computing environment, much of the processing would take place closer to the edge in a router device, rather than having to be transmitted to the Fog. Authentication is an important issue for the security of fog computing since services are offered to massive-scale end users by front fog nodes.Fog computing faces new security and privacy challenges besides those inherited from cloud computing. Authentication helps to ensure and confirms a user's identity. The existing traditional password authentication does not provide enough security for the data and there have been instances when the password-based authentication has been manipulated to gain access into the data. Since the conventional methods such as passwords do not serve the purpose of data security, research worksare focused on biometric user authentication in fog computing environment. In this paper, we present biometric smartcard authentication to protect the fog computing environment.
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
In the IoT scenario, things at the edge can create significantly large amounts of data. Fog Computing has recently emerged as the paradigm to address the needs of edge computing in the Internet of Things (IoT) and Industrial Internet of Things (IIoT) applications. In a Fog Computing environment, much of the processing would take place closer to the edge in a router device, rather than having to be transmitted to the Fog. Authentication is an important issue for the security of fog computing since services are offered to massive-scale end users by front fog nodes.Fog computing faces new security and privacy challenges besides those inherited from cloud computing. Authentication helps to ensure and confirms a user's identity. The existing traditional password authentication does not provide enough security for the data and there have been instances when the password-based authentication has been manipulated to gain access into the data. Since the conventional methods such as passwords do not serve the purpose of data security, research worksare focused on biometric user authentication in fog computing environment. In this paper, we present biometric smartcard authentication to protect the fog computing environment.
The Management of Security in Cloud Computing Ramgovind.docxcherry686017
The Management of Security in Cloud Computing
Ramgovind S, Eloff MM, Smith E
School of Computing, University of South Africa, Pretoria, South Africa
[email protected]; {eloff, smithe}@unisa.ac.za
Abstract—Cloud computing has elevated IT to newer limits
by offering the market environment data storage and capacity
with flexible scalable computing processing power to match
elastic demand and supply, whilst reducing capital expenditure.
However the opportunity cost of the successful implementation of
Cloud computing is to effectively manage the security in the
cloud applications. Security consciousness and concerns arise as
soon as one begins to run applications beyond the designated
firewall and move closer towards the public domain. The purpose
of the paper is to provide an overall security perspective of Cloud
computing with the aim to highlight the security concerns that
should be properly addressed and managed to realize the full
potential of Cloud computing. Gartner’s list on cloud security
issues, as well the findings from the International Data
Corporation enterprise panel survey based on cloud threats, will
be discussed in this paper.
Keywords- Cloud computing; Security; Public cloud, Private
cloud, Hybrid Cloud, policies, cloud transparency
I. INTRODUCTION
The success of modern day technologies highly depends on
its effectiveness of the world’s norms, its ease of use by end
users and most importantly its degree of information security
and control. Cloud computing is a new and emerging
information technology that changes the way IT architectural
solutions are put forward by means of moving towards the
theme of virtualisation: of data storage, of local networks
(infrastructure) as well as software [1-2].
In a survey undertaken by the International Data
Corporation (IDC) group between 2008 and 2009, the majority
of results point to employing Cloud computing as a low-cost
viable option to users [3]. The results also show that Cloud
computing is best suited for individuals who are seeking a
quick solution for startups, such as developers or research
projects and even e-commerce entrepreneurs. Using Cloud
computing can help in keeping one’s IT budget to a bare
minimum. It is also ideally suited for development and testing
scenarios. It is the easiest solution to test potential proof of
concepts without investing too much capital. Cloud computing
can deliver a vast array of IT capabilities in real time using
many different types of resources such as hardware, software,
virtual storage once logged onto a cloud. Cloud computing can
also be part of a broader business solution whereby prioritised
applications utilise Cloud computing functionality whilst other
critical applications maintain organisational resources as per
normal. This allows for cost saving whilst maintaining a secure
degree of control within an orgainsation.
Cloud computing can be seen as a service-oriented ...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
Deployment of using cloud services as a new approach to keep people's platforms, Infrastructure and applications has become an important issue in the world of communications technology. This is a very useful paradigm for humans to obtain their essential needs simpler, faster ,more flexible, and safer than before. But there are many concerns about this system challenge. Security is the most important challenge for cloud systems. In this paper we design and explain the procedure of implementation of a new method for cloud services based on multi clouds on our platform which supplies security and privacy more than other clouds. We introduce some confidentiality and security methods in each layer to have a secure access to requirements. The architecture of our method and the implementation of method on our selected platform for each layer are introduced in this paper.
Design and implement a new cloud security method based on multi clouds on ope...csandit
Deployment of using cloud services as a new approach to keep people's platforms,
Infrastructure and applications has become an important issue in the world of communications
technology. This is a very useful paradigm for humans to obtain their essential needs simpler,
faster ,more flexible, and safer than before. But there are many concerns about this system
challenge. Security is the most important challenge for cloud systems. In this paper we design
and explain the procedure of implementation of a new method for cloud services based on multi
clouds on our platform which supplies security and privacy more than other clouds. We
introduce some confidentiality and security methods in each layer to have a secure access to
requirements. The architecture of our method and the implementation of method on our selected
platform for each layer are introduced in this paper.
Similar to Review on Security Aspects for Cloud Architecture (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
2. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 5, October 2018 : 3129 - 3139
3130
force to understand the challenges in SaaS model. Our focus is to study the security risk at different level
such as application, transmission and storage. The purpose of the review is to identify different type of
existing vulnerabilities exploited by malicious attacker to analyses the impact over the system. In order to
understand the topic, research paper is break up into five sections. Section 2 discuss about cloud architecture
especially for SaaS model, section 3 discuss about security in cloud architecture. Section 4 give brief
literature review, section 5 proposed a mapping between vulnerability, attacks and threats and final section 6
consists of purpose and conclusion about the research.
Figure 1. Impact of security aspect for cloud
2. CLOUD ARCHITECTURE
Cloud Architecture consist of components loosely coupled to each other. These components are
broadly categorized in two major components Front End and Back End connected via internet. Front End
refers to client part (e.g. web browser, mobile app etc.) and Back End refers to cloud itself. Cloud Provider
usually provides three basis levels of services such as IaaS, PaaS and SaaS [9].As per Cloud Security
Alliance (CSA) stack model; SaaS inherit all the hidden challenges of PaaS as well as IaaS [10]. Cloud
Architecture Skelton for SaaS provider is illustrated as in Figure 2.
Figure 2. Cloud architecture
Figure 2 represent that SaaS provider consist of two main components one is enterprise service and
second one is supportive service. Enterprise services are those ready services that directly serve the clients
while supportive are those one who plays a significant role in providing security and maintains to end
services. Supportive services includes inheritance of Permission, discretionary access control, user based
3. Int J Elec & Comp Eng ISSN: 2088-8708
Review on Security Aspects for Cloud Architecture (Shaz Alam)
3131
authorization, auditing of system events and administrative privilege. Inheritance of permission means that
when user creates group then it inherits all the permission rights of its parent group. Discretionary access
control reveals the decision of resource owner how it can be shared. It is a type of access control defined by
Trusted Computer System Evaluation Criteria. It is helpful to restrict the access to object based on identity,
subject and group. User based access control is depend upon role based access control model. This model
assigned the roles to user and based on roles access privilege to users is assigned. Auditing of system event is
one of the most important steps to ensure the reliability and performance. Administrative Privilege is again
related to right to administrative access for protected resources. In the end these SaaS service provider may
be supported via bottom providers which also bring many hidden challenges.
3. SECURITY IN CLOUD ARCHITECTURE
In Cloud Architecture, there are two main actors involved in functioning of cloud. They are cloud
provider and cloud users. Thus it is required to define the boundaries of responsibilities for security in cloud
provider and user. Cloud Security Alliance (CSA) stack model defines the boundaries of responsibilities
between provider and user for specific service model [10]. Cloud provider has the maximum responsibilities
for SaaS while least for IaaS. It defined security level up to which cloud provider is responsible to manage
the concerns.
From all the above description it was cleared that both the actors are responsible to manage and
control various security issues. Although the security boundaries are defined still cloud security is one of the
nightmares to handle. Occurrence of all the past security incidences was due to existence of different
vulnerabilities in cloud system. These incidences may be easily avoidable with the help of an effective
approach to identify the vulnerabilities and assess their impact during vulnerability life cycle. This
information may be stored and utilize for timely generation of solution patches or to pre inform the cloud
user to take some precaution to avoid the exploitation. In the era of cloud security solution, early detection of
vulnerabilities and threats is one of the most demanding research topics for current researcher. Currently
huge numbers of researches are going on for this topic. But since cloud computing comprises varieties of
assets vulnerable to different threat. Hence require serious attention from current researcher of cloud security.
4. LITERATURE REVIEW
This review section contains the views of different authors in existing security issues in cloud
architecture: In 2009 Kandukuri, Paturi and Rakshit discussed to include more security management
commitment in documentation of Service Level Agreement (SLA).The purpose of this document is to
identify & define customer need, provide a framework for better understanding, simplify complex issues,
reduce the conflicts, encourage dialog in disputes, and avoid unrealistic expectation. This document
comprises of service definition, performance management, problem management, customer duties &
responsibilities, warranties & remedies, security, disaster recovery & business continuity and termination
polices. This paper highlighted the past SLA issues regarding standard waivers scheme that may not satisfy
the customer for loses. Thus it is necessary to issues the waiver as per the business loss and also include
various security commitment from cloud provider such as privilege user access, regulatory compliance, data
location, data segregation, investigate support, recovery and long term viabilities. It may be viewed as one of
the important step to increase the trust of user over cloud provider [11].
In 2010 Cusumano conducted research to highlight threats affect security requirement such as
confidentially, integrity and availability known as CIA parameter. During this research, security threats are
classified as account control, malicious internal staff, multi-tenant problem, and data control and safety
management. Account control is a problem related to service and identity hijacking. Malicious internal staff
is one the biggest problem due to existing culprit within the system having access to valuable and sensitive
resource. This culprit or malicious staff may not be easily detectable via Intrusion Detection System (IDS) or
firewall. Multi-tenant problem are the problems related to effectiveness or robustness of methodologies used
these days for isolation purpose during sharing. Data control are problem related data privacy or loss. Safety
management is about the effectiveness of prevention mechanism [12]. In same year, Dimitrios Zissis
&Lekkas also highlighted same sort of issues such as account control, data control, multi tenancy issues,
malicious internal staff and management console as discussed by Cusumano with one more fold towards the
suggestion of its solution. Author proposed a solution using the concept Single Sign on (SSO), LDAP to
ensure the effective authentication, integrity, confidentially needed for data and its communication [13].In
same year, Prasad & Ben proposed a quantitative risk assessment and impact analysis framework. This
framework defined risk as a combination of probability of occurrence of security threats and its severe impact
4. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 5, October 2018 : 3129 - 3139
3132
over cloud. This may be viewed as a road map to assess the robustness of different vendors and their
approach [14].
In 2011 Feng compared security aspect and their impact over the cloud. In this research, it was
concluded that security and privacy of data is among the biggest issues to tackle. Feng also pointed out the
absence of effective security rank evaluation and verification system. It was noticed that majority of current
on-going research focused on identification threats and suggesting their counter measure techniques without
making any rank wise severity comment for a particular threats over the cloud architecture [15].In same year,
Subashini & Kavita discussed internal security aspect related to web browser and web service interface API
for accessing different services. This paper highlighted the presence of weak authentication, authorization
mechanism, week data isolation, segregation and also discussed the multi tenancy problem which makes a
significant impact on three very important security parameters confidentially, integrity and availability [16].
In 2012, Joshi and Vijayan carried out their research for zombie attack prevention. In this paper,
Cloud Trace Back (CTB) model was suggested as a prevention technique. This model based on deterministic
packet marking algorithm. It uses cloud protector consist of virtual firewall to verify the request authenticity
of genuine user with help of white and black IP address list [17]. In same year Duan, Chen, Sanchez, Dong
also carried out their research in field of zombie attack. This paper introduced a SPOT approach to detect the
compromise virtual machine by monitoring outgoing message. It is based on a powerful statistic tool
Sequential Probability Ratio Test (SPRT). This SPOT approach depend upon two important terminologies
count threshold and percentage threshold to detect the malicious spam message from internal machine [18].
In 2013, Keiko, David, Eduardo conducted their research on threats including account control,
malicious internal staff, multi-tenant problem, data control and safety management. The purpose was to
highlight lacking in existing system. In the end counter measures are also discussed to reduce or overcome
the effect of these threats [19].In same year, Chirag, Dhiren, Bhavesh, Avi, Muttukrishnan took one further
step in analysing vulnerabilities, attacks and their corresponding threats. The purpose was to generate a
linking between the vulnerabilities, attacks and threats [20]. In same year Jyoti, Ritu, Neha, Monika carried
out their research on phishing attack. This paper thrown light on various ways means to plan a phishing
attack such as sending bulk mails or by creating a web page similar to well-known websites etc. In the end
introduced anti- phishing techniques such as server based technique with help of brand monitoring, behaviour
detection, security incidences& client based technique including email analysis, black list, similarity of
layout etc. [21].
In 2015, Torkura, Cheng, Meinel conducted their research in development proactive vulnerability
assessment framework. Various scanners are deployed for early detection of these flaws in cloud architecture.
In this paper, a quantitative risk assessment was conducted over open stack vulnerability life cycle and
noticed different risk level due to prolonged patch release and inclusion duration. These risk level are black
risk, grey risk and white risk. Existing scanners are working to mitigate white risk only with the help of open
source vulnerability database (OSVDB) and National vulnerability database (NVD). This paper proposed a
proactive framework for vulnerability assessment to mitigate the risk levels in grey and black level with help
of including more dynamic sources such as Bug Tracking System (BTS), malicious signature repository and
exploited database (EDB) [22].
In same year Masky, Young, Choe proposed Operationally Critical Threats Asset Vulnerability
Evaluation (OCTAVE) as a novel risk identification framework for security issues. It was noticed that
occurrence of various threats is due to improper identification and impact assessment of risk over cloud. This
proposed framework performed the working in four phases consist of eight steps. First phase is about to
develop a risk measurement criteria around qualitative parameter such as Reputation / Confidence, Financial
Requirement, Productivity, Safety and Health, Fine and legal penalties with priority wise ranking. In phase 2
all the information asset that are identified to be critical are profiled. This profiling includes the identification
of security requirement of information asset and also identifies the container where it is stored, transported
and processed. Phase 3 is about to identify the threats to information asset. In final phase identify the risk to
the information asset. This risk may be viewed as combination of threats with their adverse impact over the
system. Finally include the analysis and suggesting mitigation approach [23].
In 2016, Dang, Lei, Zhang, Shuai and Zhuang carried out their research on various security aspects
in software as a service model. Depending upon the analysis, it was divided into three major components
such as application, transmission and storage. This paper proposed two very important model Analytical
model and Relational model. The purpose of these models was to enrich knowledge bank for well-known
problem occurred in past and finally create a linking with its solution using relational model [24].In same
year, Rakshita carried out their research in zombie attack detection and prevention. In this a framework was
proposed to detect and prevent from Zombie attack. Framework works in two phases, phase consist of a light
weight network intrusion detector was placed over cloud server to scan vulnerabilities, and attack to establish
5. Int J Elec & Comp Eng ISSN: 2088-8708
Review on Security Aspects for Cloud Architecture (Shaz Alam)
3133
a scenario attack graph and this graph was utilized to decide that whether network should be put under
inspection or not. If yes then in phase 2 reconfiguration of virtual network have taken place [25].
4.1. Review Observation
The said review stated security revolves around three important terms vulnerability, attack and
threats. Volume of ongoing research is to fetch out attacks and their associated threats. But very limited
number of studies focused to get the answers for what is the reason of these attacks. Early detection of
vulnerabilities is one of the alternatives to avoid these attacks and threats. This also brings a great emphasis
to take a strong correlation between different security anomalies identification and managing relation to
security. The intended threats, vulnerabilities and attacks took the functionalities of SaaS services under
malicious phase and get harm to services and software. Table 1 shown literature review summary.
Table 1. Literature Review Summary
S.No Author/Reference Year Research Topic Finding Limitation
1 Kandukuri [11] 2009 Cloud security issues
Define ways to include more
commitment in SLA from
cloud provider.
Not discuss about security
issues from user end.
Cusumano [12] 2010
Cloud computing and SaaS
as new computing platform
Classification of threat
Not discuss about counter
measure.
3 Dimitrios [13] 2010
Addressing cloud computing
security issues
Classification of threats and
suggested their counter
measures.
Not discuss about the
authenticity of counter
measure.
4 Prasad [14] 2010
QUIRIC: A Quantitative
impact and risk assessment
framework for cloud security
Quantitative Risk Assessment
Framework.
Question on Authenticity
and Broad acceptance of
framework.
5 Feng [15] 2011
Study on cloud computing
security
Comparison of threats and
pointed towards the absence of
rank evaluation system.
Require a discussion how
to develop such system.
6 Subashini [16] 2011
A survey on security
problems in service delivery
models of cloud computing
Classification of threats at
client side (internal threats
related to browser)
Require more light on
existing client architecture
to avoid these threats.
7 Joshi [17] 2012
Securing cloud computing
environment against DDoS
attacks.
Proposed a Cloud Trace Model
for Zombie Attack Prevention.
Question on Authenticity
and Broad acceptance of
model.
8 Duan [18] 2013
Detecting spam zombies by
monitoring outgoing
messages
Proposed a SPOT approach for
Zombie Attack Detection
Question on authenticity
and Broad acceptance of
model.
9 Keiko [19] 2013
An analysis of security issues
for cloud computing
Discussed about vulnerability
in existing system for early
removal of threats.
Require more extension
about vulnerability and its
linking with threats.
10 Chirag [20] 2013
A survey on security issues
and solution at different
layers of cloud computing
Proposed a linking between
vulnerability and threats.
Require suggestion to
overcome these
vulnerabilities.
11 Jyoti [21] 2013
Phishing & anti phishing
technique : case study
Highlighted the ways to plan
phishing attack and proposed
anti-phishing technique.
Question on authenticity
and Broad acceptance of
technique.
12 Torkura [22] 2015
A proposed framework for
proactive vulnerability
assessment in cloud
Vulnerability Assessment
Framework
Question on authenticity
and Broad acceptance.
13 Masky [23] 2015
A novel risk identification
framework for cloud
computing security
Proposed an OCTAVE
(Operationally Critically
Threats Assets Vulnerability
Evaluation) approach
Question on authenticity
and Broad acceptance and
limited to storage asset
only.
14 Dang [24] 2016
Security analysis model,
system architecture and
relational model of cloud
services
Proposed two models relational
model and analytical model to
enrich security knowledge
bank.
Question on authenticity
and Broad acceptance
5. ESTABLISH A MAPPING BETWEEN VULNERABILITIES, ATTACKS AND THREATS
The purpose of this section is to list out vulnerabilities, attacks and corresponding threats. Main
focus of the listing is to fetch out a concrete mapping between vulnerability, attacks and threats. With the
help of proposed mapping, main aim is to highlight the impact of vulnerabilities & attacks in different area of
major concern.
6. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 5, October 2018 : 3129 - 3139
3134
5.1. Classification of Vulnerabilities
Vulnerability is referred to be as flaws in existing system. These flaws may be exploiting by the
different malicious attacker to harm the system. Since this model was recently introduced and new to
computing world has many loop holes are as follows:
5.1.1. Employee and Cloud User Unawareness
Lack of awareness of employee and its users about system in IT industry continues to be nightmare
for cloud computing. This loop holes can be exploit by attackers to plan zombie attack [18, 25] and phishing
attack [21]. Reasons for the existence of these vulnerabilities are poor hiring strategy& background check up,
lack of employee screening & security education impartment [10, 33].
5.1.2. Easy and Un-authorised Access
Management interface are easily accessible over internet. Although the cryptography was used to
prevent from unauthorized access but advancement in crypt analysis makes a strong encryption to weak
encryption e.g. a cryptographic hole discovered in Amazon EC2 management interface by performing
signature wrapping and cross site scripting (XSS) attacks, whereby interfaces used to manage cloud resource
are hijacked. It allows creating, modifying and deleting machines images, change administrative password
and setting [34].This may cause zombie attack [18, 25], phishing attack [21] and service injection attack [26
to 28] etc.
5.1.3. Lacking in Concept of Virtualization
Virtualization is the base to share single resource among multiple tenants. In cloud architecture
virtual machines comprises of application software and guest operating system running controlled via
hypervisor in host operating system. Many times it was noticed that malicious internal staff got access over
host operating system to compromise hypervisor to gain access of guest machine. For examples, a malformed
code in Microsoft’s Hyper-V run by an authenticated user (internal employee) in one of the VM caused a
Denial of Service, by compromising the Hypervisor, an attacker can gain control over VMs BLUEPILL [29],
Sub Virt [30], and DKSM [31].
5.1.4. Lacking in Internet Protocol
Flaw in authentication mechanism, validation techniques, week mutual authentication mechanism
utilized by attackers to plan ARP spoofing, DNS poisoning and Man-in-the-middle-attack [20].
5.1.5. Web Browsers and In-Secure API
Cloud services are accessible with help of web browser and API. But infection in web browser due
to unwanted visits to malicious website and presence of insecure API due to weak access credential, poor
authorization and input validation techniques [19] are vulnerable to malicious activities such Phishing attack
[21], and Service Injection attack [26-28].
5.1.6. Data Storage Related Vulnerabilities
Data of multiple tenants are stored at same location. Such storage may ask questions on robustness
of segregation and isolation mechanism for data of multiple tenants which was stored under different
jurisdictions or places. It also caused the problem of incomplete or insecure data deletion, transparency [19],
and meta-data spoofing attack [20].
5.2. Classification of Attacks
Attack may be defined as way of exploiting vulnerabilities to harm the system. Different types of
attack are listed as:
5.2.1. Zombie Attack
An attacker compromise host to plan a Zombie attack [20]. These hosts are used by hacker to send
large number of request for a virtual machine. This interrupts the expected behavior of cloud computing
affecting their availability. It overloaded the cloud to serve large number of request, and then exhausted to
cause Denial of Service (DoS) or Distributed Denial of Services (DDoS) [17]. This may be prevented via a
better authentication, authorization and IDS/IPS to avoid the hacking of their system to avoid Zombie attack
e.g. A denial of service attack against BitBucket.org, a code hosting site, caused an outage of over 19 hour of
downtime during an apparent denial of service attack on the Amazon Cloud Infrastructure [32].
7. Int J Elec & Comp Eng ISSN: 2088-8708
Review on Security Aspects for Cloud Architecture (Shaz Alam)
3135
5.2.2. Service Injection Attack
Due to the facility of free to use instance of requested services and easily accessible management
interface allows an adversary to plan or inject a malicious service or create a new virtual machine [20]. If
attacker succeeds in doing so, then the valid request can be redirected to malicious services automatically.
This would results in threats like customer data manipulation, account or service hijacking. This may be
avoided by strong isolation or identification mechanism for virtual machine, or by implementing service
integrity.
5.2.3. Attack on Virtualization
VM Escape. A malicious program running in virtual machine allows the attacker to directly interact
with Hypervisor. This allows an attacker to gain access over host OS and then compromising guest OS
controlled by host OS [20].
5.2.4. Man-in-the-middle Attack
Man-in-the-middle attack follows chess analogy of either win or draw a game. It makes an
independent connection with the victims and relay or alter the message between them. It helps an attacker
gain access over sensitive information or may manipulate the customer data. It is due to flaws in internet
protocol, weak password to gain access over a wireless network and weak mutual understandable
authentication mechanism. [20].
5.2.5. ARP Spoofing
Attacker sends a falsified ARP message to connect IP address with a malicious host. This is because
ARP does not require proof of origin for source. This flaw may be utilized by the attacker to plan ARP
spoofing attack to redirect a customer to a malicious host [20].
5.2.6. DNS Poisoning
DNS servers provide a mapping between the domain names to specific IP address with the help its
domain resolver cache. If cache consists of a corrupt domain name mapping would result in landing the
customer to a malicious website. This is due to flaws in DNS software and source validation mechanism [20]
5.2.7. Meta Data Spoofing Attack
Presence of weak authentication, authorization mechanism, and malicious internal staff with
outdated encryption technique allows an attacker to change or modify the information about the services
stored in web service description language (WSDL) file at delivery time. It helps the attacker to gain access
over various important application or sensitive information [20].
5.2.8. Phishing Attack
An attacker may use the web services to manipulate the link and redirect the customer to false
website to steal or fetch the sensitive information. There are number of way means used these days to plan a
Phishing attack. This results in account or service hijacking and identity theft. Such an attack is known as
Phishing Attack [20].
5.3. Classification of Threats
Threats can be understand as final potential loss for the system. They can be listed as:
5.3.1. Loss control over Resources
In cloud architecture, organizations handed over their sensitive business application and information
to third party vendor. As a matter of policy, cloud provider does not provide transparency about its
management policies i.e. how data was processed, transferred and where it is stored for security reason.
Hence results in organization loss control over its sensitive resources [24]. Thus organization may require
being very careful while moving sensitive resource over cloud or should define clause for its special request
for control in Service Level Agreement.
5.3.2. Misuse of cloud computing resources
Presence of malicious users, employees and easily accessible management interface leads to misuse
the resource to plant attacks over cloud computing [24]. It should be avoid via implementing strong
encryption, verification, background check up and authentication techniques.
8. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 5, October 2018 : 3129 - 3139
3136
5.3.3. Malicious Insiders
With higher level of access, an employee should gain access to confidential data and services. In
house activities are often bypassed by a firewall or Intrusion Detection System (IDS) assuming as legal
activity. However, a trusted insider may be turn into adversary e.g. malicious insiders may access
confidential data and gain control over the cloud services with no risk of detection [20]. Cloud provider
should have a mechanism to scan the activities of their employee having higher level of access to read
malicious action.
5.3.4. Account or Service Hijacking or Identity Theft
An account or service hijacking or identity theft can be defined as hacking of an account or service.
It may be done via social engineering and or due to weak credentials. It allows performing malicious act such
as access sensitive data manipulate data and redirect any transaction [10, 19, and 20].This brings the attention
towards phishing attack, fraud, exploitation of software vulnerabilities, reused credentials [21].
5.3.5. Data Scavenging
Data for multiple users are stored at same location in cloud. It is possible data for multiple users
may be stored at same disk space or multiple copies of data were created to ensure high reliability and
increase trust over cloud. This would create problem for request of complete data deletion and open a space
for malicious actors to steal sensitive data or information of a particular organization [19]. It is recommended
for cloud user to mention a clause in Service Level Agreement, about the sensitivity of data or information to
ensure appropriate security and privacy.
5.3.6. Data Loss or Leakage
Data in cloud is shared among multiple organizations. Hence may be in danger of his leakage or
loss. It was leaked when transferred over internet (because of attack such as man-in-the-middle attack, ARP
Spoofing), processed over internet (because of weak authentication and authorization mechanism) and stored
over internet (because of poor isolation, incomplete deletion, disaster recovery provided by unreliable party,
weak encryption algorithm). It should require timely audit of system performance, validation and
testing [19, 20].
5.3.7. Denial of Service
Denial of service makes a significant impact on service availability metrics. It was caused by
receiving large number of request from malicious host. Such type of cause is done via Zombie
attack [19, 20].
5.3.8. Customer Data Manipulation
User attack web applications by manipulating data sent from application component to the server’s
application with help of SQL Injection, insecure direct object references and cross site scripting [19, 26-28].
Figure 3 shown mapping between vulnerability, attack and threats.
6. PURPOSE AND CONCLUSION
6.1. Purpose
The main focus was to understand the security domain in cloud architecture. Security is one of the
biggest threats in cloud computing. The intension was to highlight three important pillars vulnerabilities,
attacks, and threats and discuss about the strong correlation between them. Motive of study was to bring the
intension of researcher to cure the loop holes as early as possible in cloud architecture.
6.2. Conclusion
This paper has discussed different vulnerabilities with corresponding attacks and threats. In the end
strong correlation ship between vulnerabilities, attacks and threats was noticed. But it was also noticed that
volume of researches focused on suggesting counter measures for different threats. As a conclusion this paper
would like to bring the attention of all the academician and researchers to work on early detection of
vulnerabilities in existing system to cure it from malicious attack and their corresponding impact threats.
9. Int J Elec & Comp Eng ISSN: 2088-8708
Review on Security Aspects for Cloud Architecture (Shaz Alam)
3137
Figure 3. Mapping between vulnerability, attack and threats
ACKNOWLEDGEMENTS
This work is acknowledged under Integral University manuscript No IU/R&D/2017-MCN000111.
REFERENCES
[1] Gartner, “Gartner identifies the top 10 strategic technologies for 2011”, “web reference”: http://
www.gartner.com/it/page.jsp?id=1454221, “Last access date”: 02 Dec. 2016.
[2] Ponemon, “Security of cloud computing providers study”, “web reference”:
http://www.ca.com/~/media/Files/IndustryResearch/security-of-cloud-computing-providers-final-april-2011.pdf,
“Last access date”: 5 January 2017.
[3] J.H. Che, Y.M. Duan, T. Zhang, J. Fan, “Study on the security models and strategies of cloud computing”, In
proceedings of International Conference on Power Electronics and Engineering Application, Shenzhen, china,
2011, pp. 586-593
[4] A. Patel, M. Taghavi, K. Bakhtiyari, J.C. Junior, “An instruction detection and prevention system in cloud
computing: A systematic review”, Journal of Network and Computer applications, Vol. 36, no.1, 2013, pp. 25-41.
[5] Gens F, “New idc it cloud services survey: top benefits and challenges”, “web reference”:
http://blogs.idc.com/ie/?p=730 , “Last access date”: 23 December 2016.
[6] PayPal Outage, “web reference”: http://royal.pingdom.com/2009/08/04/the-paypall-outage-cost-its-users-between-
7-and-32-million-usd/, “Last access date”: 13 January 2017.
[7] Sony Network Breach, “web reference”:
http://www.theguardian.com/technology/gamesblog/2011/apr/27/playstation-network-hack-sony, “Last access
date”: 20 January 2017.
[8] Window Azure Storage Disruption, “web reference”: https://azure.microsoft.com/en-in/blog/details-of-the-
february-22nd-2013-windows-azure-storage-disruption/, “Last access date”: 31 January 2017.
[9] M. Peter, G. Timothy, “The NIST Definition of Cloud Computing”, “web reference”
“faculty.winthrop.edu/domain/csci411/Handouts/NIST.pdf”, “Last access date”: 28 Feb 2017.
10. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 5, October 2018 : 3129 - 3139
3138
[10] Cloud Security Alliance, “web reference”: https://cloudsecurityalliance.org/research/top-threats, “Last access date”:
15 December 2016.
[11] B.R.Kandukuri, R.Paturi, A.Rakshit, “Cloud Security Issues”, IEEE International Conference on Service
Computing”, 2009
[12] M. Cusumano, “Cloud Computing and SaaS as new computing platforms”, Communications of the ACM, vol. 53,
no. 4, 2010, pp. 27-29
[13] D. Zissis, D. Lekkas, “Addressing cloud computing security issues”, Future generation computer system, vol.28,
2010, pp. 583-592.
[14] P. Saripalli, B. Walters, “QUIRC: A Quantitative Impact and Risk Assessment Framework for Cloud Security”,
IEEE 3rd
International Conference on Cloud Computing, 2010.
[15] D.G. Feng, M. Zhang, Y. Zhang, Z. Xu, “Study on cloud computing security”, Journal of Software, vol. 22, no.1,
2011, pp. 71-83.
[16] S. Subashini, V. Kavitha, “A survey on security problems in service delivery models of cloud computing”, Journal
of network and computer applications, vol.34, no.1, 2011, pp. 1-11.
[17] B. Joshi, A. Vijayan, “Securing cloud computing environment against DDoS attacks”, In proceeding of IEEE
International conference of computer communication and informatics, 2012.
[18] Z.Duan, P.Chen, F.Sanchez, Y.Dong, M.Stephenson, and J.Barker, “Detecting spam zombies by monitoring
outgoing messages”, IEEE transaction dependable and secure computing, vol. 9, no.2, 2012, pp. 198-210
[19] K. Hashizume, D.G. Rosado, E.F. Medina, E.B. Farnandez , “An analysis of security issues for cloud computing”,
IEEE, vol., 2013
[20] C. Modi, D. Patel, B. Borisaniya, A. Patel, M. Rajarajan, “A survey on security issues and solution at different
layers of cloud computing”, IEEE, vol. 63, 2013, pp. 561-592
[21] J. Chhikara, R. Dahiya, N. Garg, M. Rani, “Phishing & Anti Phishing Technique: Case Study”, International
Journal of Advanced Research in computer science and software engineering, vol. 3, no. 5, 2013, pp. 458-465.
[22] K.A. Torkura, F. Cheng, C. Meinel, “A Proposed Framework for Proactive Vulnerability Assessment in Cloud
Deployment”, the 10th
International Conference for Internet Technology and Secured Transactions, 2015
[23] M. Masky, S.S. Young, T.Y. Choe, “A Novel Risk Identification Framework for Cloud Computing Security”, IEEE
Transaction, 2015.
[24] D. Niu, L. Liu , X. Z. Zhang, S. Lii, Z. Li, “Security Analysis Model, System Architecture and Relational Model of
Cloud Services”, IEEE, Vol. 13,2016,pp.574-584
[25] Rakshita C M, “Zombie attack detection and counter measure selection in cloud environment”, International
Journal of advances in electrical power system and information technology, vol. 2, no.4, 2016, pp. 24-28.
[26] B. Indrani, E.Ramaraj, “An Approach to detect and prevent SQL Injection Attacks in database using web services”,
International Journal of computer science and network security, vol.11, 2011, pp. 197-205
[27] B. Indrani, E.Ramaraj, “Prevention of SQL Injection attacks by using service oriented authentication technique”,
International Journal of modeling and optimization, vol. 3, no.3, 2013, pp. 302-306
[28] R. Shrivastava, J. Bhattacharyji, R. Soni, “SQL Injection Attacks in Database using web services: Detection and
prevention- Review”, Asian Journal of computer science and information technology, vol.2, no.6, 2012, pp. 162-
165
[29] King S, Chen P, Wang YM, “Subvert: implementing malware with virtual machines”, in: IEEE Symposium
security and privacy, 2006, pp. 314-327.
[30] Rutkowska J, “Subverting vistatm kernel for fun and profit”. In: Black Hat Conference, 2006.
[31] Bahram S, Jiang X, Wang Z, Grace M, “Dksm: Subverting virtual machine introspection for fun and profit”, in:
Proceedings of the 29th
IEEE international symposium on reliable distributed system, 2010
[32] Metz C, “DDoS attack rains down on amazon cloud”, “web reference” “http: //
www.theregister.co.uk/2009/10/05/amazon_bitbucket_outage/, “Last access date”: 28 Feb 2017
[33] Popovick, HocenskiZ, “Cloud Computing Security issues and challenges”, In: Proceedings of the 33rd
International
convention MIPRO IEEE Computer Society Washington DC, USA, 2010, pp. 344-349.
[34] Pauli D, “Amazon’s ec2, eucalyptus vulnerability discovered”, “web reference”:
http://www.crn.com.au/News/278387,amazon-ec2-eucalyptus-vulnarability-discovered.aspx, “Last access date”: 15
January 2017.
11. Int J Elec & Comp Eng ISSN: 2088-8708
Review on Security Aspects for Cloud Architecture (Shaz Alam)
3139
BIOGRAPHIES OF AUTHORS
Shaz Alam completed his graduation BSc. (CPM) from Lucknow University and post-
Graduation MSc. Tech (IMCA) from Jamia Millia Islamia New Delhi. Right now pursuing PhD
(Cloud Computing) in Department of Computer Application from Integral University Lucknow
and has 5 year of experience as Corporate Trainer in Center for Career Guidance &
Development Integral University Lucknow. His area of interest includes Cloud computing, Java
technology, and Formula independent approaches. Integral University Department of Computer
Application Lucknow -226026, UP, India shaz.alam62@gmail.com
Dr. Mohd. Muqeem has completed his doctoral from Integral University, Lucknow. He is
presently working as Associate professor in the Department of Computer Application Integral
University Lucknow. He has more than 14 year of experience in the field of Academics. He is
currently working in the area requirement engineering and web technologies. He has published
paper in reputed journal with impact factor. He is a member of CSI, ISTE, CSTA, IAENG and
other societies. Integral University Department of Computer Application Lucknow 226026, UP,
India. muqeem.79@gmail.com
Dr. Suhel Ahmad Khan has earned his doctoral degree from Babasaheb Bhimrao Ambedkar
University, (A Central University), Vidya Vihar, Raibareli Road, Lucknow. He is currently
working as an assistant professor in the Department of Computer Application, Integral
University, Lucknow, UP, India. Dr. S.A. Khan is a young, energetic researcher and has
completed full time major project funded by University Grant Commission, New Delhi. He has
more than five years of teaching and research experience. He is currently working in the area of
software security and security testing. He has also published and presented papers in refereed
journals and conferences. He is a member of IACIT, UACEE and Internet Society. Integral
University Department of Computer Application Lucknow -226026, UP, India
ahmadsuhel28@gmail.com