This document proposes a security management framework to protect cloud storage systems from complex attacks. It introduces a model that enforces security policies defined by cloud providers. The framework can interface with different cloud data management systems and detect both predefined and customized attacks. It evaluates user behavior and identifies malicious activity patterns based on thresholds defined in security policies. The framework was implemented on a testbed and experiments showed it can efficiently defend storage systems by evaluating policies. This generic approach provides flexible security while maintaining high performance for cloud services.
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware,
networking, and services integrate to offer different computational facilities, while Internet or a private
network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud
system delimit the benefits of cloud computing like “on-demand, customized resource availability and
performance management”. It is understood that current IT and enterprise security solutions are not
adequate to address the cloud security issues. This paper explores the challenges and issues of security
concerns of cloud computing through different standard and novel solutions. We propose analysis and
architecture for incorporating different security schemes, techniques and protocols for cloud computing,
particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed
architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and
is not coupled with the underlying backbone. This would facilitate to manage the cloud system more
effectively and provide the administrator to include the specific solution to counter the threat. We have also
shown using experimental data how a cloud service provider can estimate the charging based on the
security service it provides and security-related cost-benefit analysis can be estimated.
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
In this paper, SMCSaaS is proposed to secure email system based on Web Service and Cloud Computing
Model. The model offers end-to-end security, privacy, and non-repudiation of PKI without the associated
infrastructure complexity. The Proposed Model control risks in Cloud Computing like Insecure Application
Programming Interfaces, Malicious Insiders, Data Loss Shared Technology Vulnerabilities, or Leakage,
Account, Service, Traffic Hijacking and Unknown Risk Profile
This document discusses security issues related to cloud computing. It begins with an introduction to cloud computing models including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It then discusses potential security attacks to clouds like denial of service attacks and man-in-the-middle attacks. Security concerns with moving data and applications to the cloud are outlined. Techniques for securely publishing data in the cloud are also presented. The document concludes that security in cloud computing is challenging due to the complexity of clouds but that assurance of secure and mission-critical operations is important.
This document discusses security issues related to cloud computing. It begins with an introduction to cloud computing models including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It then discusses potential security threats in cloud computing like denial of service attacks, side channel attacks, and man-in-the-middle cryptographic attacks. The document proposes a layered framework for assured cloud computing and techniques for secure publication of data in the cloud, including encryption. It concludes that achieving end-to-end security in cloud computing will be challenging due to complexity, but that more secure operations can be ensured even if some parts of the cloud fail.
An approach for secured data transmission at client end in cloud computingIAEME Publication
This document summarizes a research paper that proposes an algorithm for securing data transmission between a client and cloud server in cloud computing environments. The algorithm uses an authentication function and key that are updated during transmission to verify authorization and detect any modifications by potential attackers. When a client connects to a server, they both initialize the key to the same value. Then, the key is incremented by one for each packet sent or received. If a client wants to verify security, it can send a packet with the current key value to the server for matching. This helps prevent man-in-the-middle attacks by making it difficult for attackers to modify packets without knowing the updated key values. The approach aims to securely transmit sensitive data from cloud servers
This document discusses security challenges in cloud computing and proposes a framework to address them. It begins by reviewing existing literature on cloud security that identifies threats like VM-level attacks, management interface compromise, and compliance risks. It then discusses specific threats to cloud computing like changes to business models, abusive use of cloud resources, insecure APIs, and issues from shared infrastructure and multitenancy. The document proposes a cloud security model and framework to define security challenges and help providers enforce complex security policies to detect and prevent attacks in cloud environments.
IRJET- Security Concern: Analysis of Cloud Security MechanismIRJET Journal
This document discusses security concerns in cloud computing. It analyzes various encryption techniques that can be used to enhance security and reliability of data stored in the cloud. The paper provides a literature review of techniques such as homomorphic encryption, digital signatures, and block-level encryption. It then compares the techniques based on parameters like execution time, space utilization, and overhead. The analysis found that homomorphic encryption coupled with redundancy handling could provide more secure data storage while reducing costs. Future work may involve applying this hybrid approach to further enhance cloud security.
Security policy enforcement in cloud infrastructurecsandit
This document proposes an architecture for implementing security in cloud computing systems, particularly for Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) models. It discusses key security issues like confidentiality, integrity, and authentication in cloud systems. It then proposes a framework that incorporates solutions like homomorphic encryption to ensure confidentiality while still allowing data processing, as well as using standards like XACML for flexible policy-based access control and authentication. The goal is to provide an integrated security solution as a service for cloud platforms.
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware,
networking, and services integrate to offer different computational facilities, while Internet or a private
network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud
system delimit the benefits of cloud computing like “on-demand, customized resource availability and
performance management”. It is understood that current IT and enterprise security solutions are not
adequate to address the cloud security issues. This paper explores the challenges and issues of security
concerns of cloud computing through different standard and novel solutions. We propose analysis and
architecture for incorporating different security schemes, techniques and protocols for cloud computing,
particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed
architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and
is not coupled with the underlying backbone. This would facilitate to manage the cloud system more
effectively and provide the administrator to include the specific solution to counter the threat. We have also
shown using experimental data how a cloud service provider can estimate the charging based on the
security service it provides and security-related cost-benefit analysis can be estimated.
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...IJERA Editor
In this paper, SMCSaaS is proposed to secure email system based on Web Service and Cloud Computing
Model. The model offers end-to-end security, privacy, and non-repudiation of PKI without the associated
infrastructure complexity. The Proposed Model control risks in Cloud Computing like Insecure Application
Programming Interfaces, Malicious Insiders, Data Loss Shared Technology Vulnerabilities, or Leakage,
Account, Service, Traffic Hijacking and Unknown Risk Profile
This document discusses security issues related to cloud computing. It begins with an introduction to cloud computing models including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It then discusses potential security attacks to clouds like denial of service attacks and man-in-the-middle attacks. Security concerns with moving data and applications to the cloud are outlined. Techniques for securely publishing data in the cloud are also presented. The document concludes that security in cloud computing is challenging due to the complexity of clouds but that assurance of secure and mission-critical operations is important.
This document discusses security issues related to cloud computing. It begins with an introduction to cloud computing models including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). It then discusses potential security threats in cloud computing like denial of service attacks, side channel attacks, and man-in-the-middle cryptographic attacks. The document proposes a layered framework for assured cloud computing and techniques for secure publication of data in the cloud, including encryption. It concludes that achieving end-to-end security in cloud computing will be challenging due to complexity, but that more secure operations can be ensured even if some parts of the cloud fail.
An approach for secured data transmission at client end in cloud computingIAEME Publication
This document summarizes a research paper that proposes an algorithm for securing data transmission between a client and cloud server in cloud computing environments. The algorithm uses an authentication function and key that are updated during transmission to verify authorization and detect any modifications by potential attackers. When a client connects to a server, they both initialize the key to the same value. Then, the key is incremented by one for each packet sent or received. If a client wants to verify security, it can send a packet with the current key value to the server for matching. This helps prevent man-in-the-middle attacks by making it difficult for attackers to modify packets without knowing the updated key values. The approach aims to securely transmit sensitive data from cloud servers
This document discusses security challenges in cloud computing and proposes a framework to address them. It begins by reviewing existing literature on cloud security that identifies threats like VM-level attacks, management interface compromise, and compliance risks. It then discusses specific threats to cloud computing like changes to business models, abusive use of cloud resources, insecure APIs, and issues from shared infrastructure and multitenancy. The document proposes a cloud security model and framework to define security challenges and help providers enforce complex security policies to detect and prevent attacks in cloud environments.
IRJET- Security Concern: Analysis of Cloud Security MechanismIRJET Journal
This document discusses security concerns in cloud computing. It analyzes various encryption techniques that can be used to enhance security and reliability of data stored in the cloud. The paper provides a literature review of techniques such as homomorphic encryption, digital signatures, and block-level encryption. It then compares the techniques based on parameters like execution time, space utilization, and overhead. The analysis found that homomorphic encryption coupled with redundancy handling could provide more secure data storage while reducing costs. Future work may involve applying this hybrid approach to further enhance cloud security.
Security policy enforcement in cloud infrastructurecsandit
This document proposes an architecture for implementing security in cloud computing systems, particularly for Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) models. It discusses key security issues like confidentiality, integrity, and authentication in cloud systems. It then proposes a framework that incorporates solutions like homomorphic encryption to ensure confidentiality while still allowing data processing, as well as using standards like XACML for flexible policy-based access control and authentication. The goal is to provide an integrated security solution as a service for cloud platforms.
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
This document proposes a new cloud-manager-based encryption scheme (CMReS) to address key management and sharing issues in fully homomorphic encryption. CMReS distributes encryption, decryption, and re-encryption tasks between a trusted Encryption/Decryption Service Provider (EDSP) module and a Re-encryption Service Provider (RSP) module hosted on the cloud. The scheme uses Diffie-Hellman key exchange to generate session keys and one-time passwords for authentication between users and cloud services. Experimental results show the proposed technique reduces delay compared to previous approaches by distributing computational tasks between user devices, the EDSP, and RSP modules.
Cloud Storage is a branch of Cloud Computing, which plays an important role in IT world. Cloud providers are providing a huge volume of storage space as per the user needs. Due to wide usage of this, it also increases data security issues and threats. Hence efforts are being made to encrypt the data stored in the cloud. In this paper, we are going to look at different encryption and auditing techniques that are used to avoid data breaching in cloud storage. Nikhil Sreenivasan ""Data Storage Issues in Cloud Computing"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30194.pdf
Paper Url : https://www.ijtsrd.com/computer-science/computer-network/30194/data-storage-issues-in-cloud-computing/nikhil-sreenivasan
Enforcing multi user access policies in cloud computingIAEME Publication
This document discusses enforcing multi-user access policies in cloud computing. It describes how encryption techniques can be used to securely store data in the cloud and allow authorized users to access encrypted data through key management. The document also discusses security risks in cloud computing like authentication, access control and data leaks. It argues that a policy-based approach is needed to define and enforce access policies for users to access encrypted data securely in the cloud.
Security and Privacy Enhancing Multicloud Architectureijsrd.com
In recent years use of Cloud computing in different mode like cloud storage, cloud hosting, cloud servers are increased in industries and other organizations as per requirements. The Security challenges are still among the biggest obstacles when considering the adoption of cloud services. For this a lot of research has been done. With these, security issues, the cloud paradigm comes with a new set of unique features, which open the path toward novel security approaches, techniques, and architectures.
Cloud Computing is the most emerging trend in Information Technology now days. It is attracting the organizations due to its advantages of scalability, throughput, easy and cheap access and on demand up and down grading of SaaS, PaaS and IaaS. Besides all the salient features of cloud environment, there are the big challenges of privacy and security. In this paper, a review of different security issues like trust, confidentiality, authenticity, encryption, key management and resource sharing are presented along with the efforts made on how to overcome these issues.
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
Cloudcomputingprovidesondemandservicestoitsclients.Datastorageisamongoneoftheprimaryservices providedbycloudcomputing.Cloudserviceproviderhoststhedataofdataownerontheirserverandusercan accesstheirdatafromtheseservers.Asdata,ownersandserversaredifferentidentities,theparadigmofdata storagebringsupmanysecuritychallenges.Anindependentmechanismisrequiredtomakesurethatdatais correctlyhostedintothecloudstorageserver.Inthispaper,wewilldiscussthedifferenttechniquesthatare usedforsecuredatastorageoncloud. Cloud computing is a functional paradigm that is evolving and making IT utilization easier by the day for consumers. Cloud computing offers standardized applications to users online and in a manner that can be accessed regularly. Such applications can be accessed by as many persons as permitted within an organization without bothering about the maintenance of such application. The Cloud also provides a channel to design and deploy user applications including its storage space and database without bothering about the underlying operating system. The application can run without consideration for on premise infrastructure. Also, the Cloud makes massive storage available both for data and databases. Storage of data on the Cloud is one of the core activities in Cloud computing. Storage utilizes infrastructure spread across several geographical locations.
Iaetsd secure data storage against attacks in cloudIaetsd Iaetsd
The document proposes solutions for securing data storage in the cloud against attacks. It discusses threats and attacks like incorrect data storage, data modification, and perimeter defense weaknesses. It then proposes a defense in depth approach with multiple layers of security controls at the storage devices, network, and management access layers. Specific controls are suggested like authentication, authorization, encryption, firewalls, intrusion detection, and logging. The paper also addresses issues like data correctness verification, error localization, and reliability of the security strategy through techniques like challenge-response protocols and redundant storage across multiple locations.
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
Multi-cloud is an advanced version of cloud computing that allows its users to utilize different cloud systems from several Cloud Service Providers (CSPs) remotely. Although it is a very efficient computing
facility, threat detection, data protection, and vendor lock-in are the major security drawbacks of this infrastructure. These factors act as a catalyst in promoting serious cyber-crimes of the virtual world. Privacy and safety issues of a multi-cloud environment have been overviewed in this research paper. The
objective of this research is to analyze some logical automation and monitoring provisions, such as monitoring Cyber-physical Systems (CPS), home automation, automation in Big Data Infrastructure (BDI), Disaster Recovery (DR), and secret protection. The Results of this research investigation indicate that it is possible to avoid security snags of a multi-cloud interface by adopting these scientific solutions methodically.
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
Cloud computing is a new innovative model for enterprise in which information is permanently stored on the servers and also manage how and when different resources are allocate to the requested users. It provides distributed approach through which resources are allocated dynamically to the users without investing in the infrastructure or licensing the software’s on the client side. Using the cloud makes processing of information is more commodious but it also present them with new security problems about reliability.This phenomenon introduces serious problems regarding access mechanism to any information stored in the database and resources in the cloud. For the successful implementation of cloud computing it is necessary that we must know different areas where the security is needed. For this there should also governess strategy needed for secure communication between multi-clouds located in different geographical areas or in different countries. In this paper we discuss how to safely utilizing the benefit of cloud computing through the network where data security, provide authentication, integration, recovery, IP spoofing and Virtual Servers are the most captiousfields in the cloud.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document summarizes a research thesis that proposes a trusted cloud computing platform (TCCP) to address critical security issues in cloud computing. The TCCP is designed to provide a closed box execution environment for virtual machines to guarantee confidentiality and integrity of computations outsourced to infrastructure as a service cloud providers. It allows customers to remotely verify whether a cloud provider's backend is running a trusted TCCP implementation before launching a virtual machine. The TCCP leverages advances in trusted computing technologies to securely manage virtual machines and cloud infrastructure through protocols for node registration and virtual machine launch and migration. The goal of the TCCP is to extend the capabilities of traditional trusted platforms to the complex, distributed environments of cloud computing infra
A study on security responsibilities and adoption in cloudeSAT Journals
Abstract Cloud computing is one of the popular enterprise models where computing resources are made available on-demand to the user as needed. Due to this increasing demand for more clouds there is an ever growing threat of security becoming a major issue. cloud computing is a construct that allows you to access applications that actually reside at a location other than your computer or other Internet-connected device, most often, this will be a distant data center. In a simple, topological sense, a cloud computing solution is made up of several elements: clients, the datacenter, and distributed servers. Each element has a purpose and plays a specific role in delivering a functional cloud based application, the increased degree of connectivity and the increasing amount of data has led many providers and in particular data centers to employ larger infrastructures with dynamic load and access balancing. So this paper shall look at ways in which security responsibilities and Cloud Adoption Keywords: Cloud Computing, Service models, Cloud Security, Secure Cloud Adoption,
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
1) The document discusses security issues in cloud computing, with a focus on vulnerabilities in the virtualization layer.
2) It proposes a secure model (SVM) using intrusion detection systems to monitor virtual machines and detect attacks. This would help virtual machines resist attacks more efficiently in cloud environments.
3) Some key virtualization vulnerabilities discussed include attacks on hypervisors, compromised isolation between virtual machines, and packet sniffing/spoofing in virtual networks. The proposed SVM model aims to address these issues and secure the virtualization layer in cloud infrastructure.
Internal & External Attacks in cloud computing Environment from confidentiali...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Time domain sound spectrum measurements in ducted axial fan under stable regi...iaemedu
This document summarizes research on measuring time domain sound spectra in a ducted axial fan under stable operating conditions. The fan test setup and instrumentation are described, including a microphone to capture sound signals, data acquisition system, and LabVIEW software to analyze spectra. Experiments were conducted at varying rotor speeds from 2400-3600 rpm with a throttle position of 6 cm. Results showed that sound pressure amplitude generally increased with rotor speed and fluctuated periodically due to fan blade passage. Maximum amplitudes ranged from 16-36 dB depending on rotor speed. The time domain spectra measurements provide insights into fan acoustics and stability characteristics.
High performance parallel prefix adders with fast carry chain logiciaemedu
This document discusses and compares different types of parallel prefix adders. It begins by introducing binary adders and describing the three stages of prefix addition: pre-computation, prefix-computation, and post-computation. It then describes various parallel prefix adders like Brent-Kung, Kogge-Stone, Ladner-Fischer, and Han-Carlson adders. For FPGA implementation, simple adders typically perform better than parallel prefix adders due to fast carry chains. The document proposes modifying the Kogge-Stone adder using fast carry logic to make it more suitable for FPGAs. Simulation results show that for higher bit widths, the modified Kogge-Stone adder provides better delay than a simple ad
Assignment of cells to switches using firefly algorithmiaemedu
The document summarizes a research paper that proposes using the firefly algorithm to solve the optimization problem of assigning cells to switches in a cellular network. The problem aims to minimize cabling, handoff, and switching costs while meeting constraints of assigning each cell to one switch and not exceeding switch capacities. It formulates the problem mathematically and reviews existing solution methods. The firefly algorithm is then described as inspired by firefly flashing behavior. Experiments applying the firefly algorithm to various problem instances are conducted to test its effectiveness in solving the cell-to-switch assignment problem.
Effect of punch profile radius and localised compressioniaemedu
This document discusses springback in V-bending of high strength steel sheets. It presents results from an experimental investigation and finite element analysis simulation of the effects of punch profile radius and localized compression on springback. The experimental results showed that increasing punch radius or decreasing sheet thickness increases springback, while applying localized compressive stress through bottoming the punch can compensate for springback. The finite element analysis validated the experimental findings. The document provides background on springback in bending, methods to compensate for it, and details of the materials testing and modeling approach used in the study.
Improving performance and development of two stage reciprocating compressorsiaemedu
This document summarizes a study that aims to experimentally improve the performance of a two-stage reciprocating air compressor. The study examines the effects of various parameters on compressor performance, including the primary air tank, compressor running time, background working conditions, and air leakage. The performance impacts of each parameter are compared to normal operating conditions. The results are intended to help optimize compressor design and operation to minimize energy consumption.
Octave wave sound signal measurements in ducted axial fan under stable region...iaemedu
The document discusses measurements of octave wave sound signals in a ducted axial fan under stable operating conditions. Experiments were conducted to analyze sound pressure level variations at different rotor speeds between 2400-3600 RPM with the throttle position fixed at 7 cm. Microphones were used to measure sound levels from 11Hz to 11100Hz in decibels. The results showed that sound pressure levels generally increased with rotor speed, ranging from 79-105 dB. Higher pressures and amplitudes correlated with increased sound levels. The experiments provide insight into fan acoustics under stable flow conditions.
Model for prediction of temperature distribution in workpiece for surface gri...iaemedu
The document describes a finite element model for predicting temperature distribution in a workpiece during surface grinding. It discusses how grinding parameters like wheel speed and depth of cut affect the heat flux and temperature rise in the workpiece. The model treats the grinding wheel as a moving heat source along the workpiece surface. Equations are provided to calculate the heat flux based on factors like tangential force and energy absorbed by the workpiece. The model was developed using finite element analysis to simulate temperature changes more accurately compared to previous analytical models.
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
This document proposes a new cloud-manager-based encryption scheme (CMReS) to address key management and sharing issues in fully homomorphic encryption. CMReS distributes encryption, decryption, and re-encryption tasks between a trusted Encryption/Decryption Service Provider (EDSP) module and a Re-encryption Service Provider (RSP) module hosted on the cloud. The scheme uses Diffie-Hellman key exchange to generate session keys and one-time passwords for authentication between users and cloud services. Experimental results show the proposed technique reduces delay compared to previous approaches by distributing computational tasks between user devices, the EDSP, and RSP modules.
Cloud Storage is a branch of Cloud Computing, which plays an important role in IT world. Cloud providers are providing a huge volume of storage space as per the user needs. Due to wide usage of this, it also increases data security issues and threats. Hence efforts are being made to encrypt the data stored in the cloud. In this paper, we are going to look at different encryption and auditing techniques that are used to avoid data breaching in cloud storage. Nikhil Sreenivasan ""Data Storage Issues in Cloud Computing"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-2 , February 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd30194.pdf
Paper Url : https://www.ijtsrd.com/computer-science/computer-network/30194/data-storage-issues-in-cloud-computing/nikhil-sreenivasan
Enforcing multi user access policies in cloud computingIAEME Publication
This document discusses enforcing multi-user access policies in cloud computing. It describes how encryption techniques can be used to securely store data in the cloud and allow authorized users to access encrypted data through key management. The document also discusses security risks in cloud computing like authentication, access control and data leaks. It argues that a policy-based approach is needed to define and enforce access policies for users to access encrypted data securely in the cloud.
Security and Privacy Enhancing Multicloud Architectureijsrd.com
In recent years use of Cloud computing in different mode like cloud storage, cloud hosting, cloud servers are increased in industries and other organizations as per requirements. The Security challenges are still among the biggest obstacles when considering the adoption of cloud services. For this a lot of research has been done. With these, security issues, the cloud paradigm comes with a new set of unique features, which open the path toward novel security approaches, techniques, and architectures.
Cloud Computing is the most emerging trend in Information Technology now days. It is attracting the organizations due to its advantages of scalability, throughput, easy and cheap access and on demand up and down grading of SaaS, PaaS and IaaS. Besides all the salient features of cloud environment, there are the big challenges of privacy and security. In this paper, a review of different security issues like trust, confidentiality, authenticity, encryption, key management and resource sharing are presented along with the efforts made on how to overcome these issues.
A Study of Data Storage Security Issues in Cloud Computingvivatechijri
Cloudcomputingprovidesondemandservicestoitsclients.Datastorageisamongoneoftheprimaryservices providedbycloudcomputing.Cloudserviceproviderhoststhedataofdataownerontheirserverandusercan accesstheirdatafromtheseservers.Asdata,ownersandserversaredifferentidentities,theparadigmofdata storagebringsupmanysecuritychallenges.Anindependentmechanismisrequiredtomakesurethatdatais correctlyhostedintothecloudstorageserver.Inthispaper,wewilldiscussthedifferenttechniquesthatare usedforsecuredatastorageoncloud. Cloud computing is a functional paradigm that is evolving and making IT utilization easier by the day for consumers. Cloud computing offers standardized applications to users online and in a manner that can be accessed regularly. Such applications can be accessed by as many persons as permitted within an organization without bothering about the maintenance of such application. The Cloud also provides a channel to design and deploy user applications including its storage space and database without bothering about the underlying operating system. The application can run without consideration for on premise infrastructure. Also, the Cloud makes massive storage available both for data and databases. Storage of data on the Cloud is one of the core activities in Cloud computing. Storage utilizes infrastructure spread across several geographical locations.
Iaetsd secure data storage against attacks in cloudIaetsd Iaetsd
The document proposes solutions for securing data storage in the cloud against attacks. It discusses threats and attacks like incorrect data storage, data modification, and perimeter defense weaknesses. It then proposes a defense in depth approach with multiple layers of security controls at the storage devices, network, and management access layers. Specific controls are suggested like authentication, authorization, encryption, firewalls, intrusion detection, and logging. The paper also addresses issues like data correctness verification, error localization, and reliability of the security strategy through techniques like challenge-response protocols and redundant storage across multiple locations.
EFFECTIVE METHOD FOR MANAGING AUTOMATION AND MONITORING IN MULTI-CLOUD COMPUT...IJNSA Journal
Multi-cloud is an advanced version of cloud computing that allows its users to utilize different cloud systems from several Cloud Service Providers (CSPs) remotely. Although it is a very efficient computing
facility, threat detection, data protection, and vendor lock-in are the major security drawbacks of this infrastructure. These factors act as a catalyst in promoting serious cyber-crimes of the virtual world. Privacy and safety issues of a multi-cloud environment have been overviewed in this research paper. The
objective of this research is to analyze some logical automation and monitoring provisions, such as monitoring Cyber-physical Systems (CPS), home automation, automation in Big Data Infrastructure (BDI), Disaster Recovery (DR), and secret protection. The Results of this research investigation indicate that it is possible to avoid security snags of a multi-cloud interface by adopting these scientific solutions methodically.
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
Cloud computing is a new innovative model for enterprise in which information is permanently stored on the servers and also manage how and when different resources are allocate to the requested users. It provides distributed approach through which resources are allocated dynamically to the users without investing in the infrastructure or licensing the software’s on the client side. Using the cloud makes processing of information is more commodious but it also present them with new security problems about reliability.This phenomenon introduces serious problems regarding access mechanism to any information stored in the database and resources in the cloud. For the successful implementation of cloud computing it is necessary that we must know different areas where the security is needed. For this there should also governess strategy needed for secure communication between multi-clouds located in different geographical areas or in different countries. In this paper we discuss how to safely utilizing the benefit of cloud computing through the network where data security, provide authentication, integration, recovery, IP spoofing and Virtual Servers are the most captiousfields in the cloud.
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document summarizes a research thesis that proposes a trusted cloud computing platform (TCCP) to address critical security issues in cloud computing. The TCCP is designed to provide a closed box execution environment for virtual machines to guarantee confidentiality and integrity of computations outsourced to infrastructure as a service cloud providers. It allows customers to remotely verify whether a cloud provider's backend is running a trusted TCCP implementation before launching a virtual machine. The TCCP leverages advances in trusted computing technologies to securely manage virtual machines and cloud infrastructure through protocols for node registration and virtual machine launch and migration. The goal of the TCCP is to extend the capabilities of traditional trusted platforms to the complex, distributed environments of cloud computing infra
A study on security responsibilities and adoption in cloudeSAT Journals
Abstract Cloud computing is one of the popular enterprise models where computing resources are made available on-demand to the user as needed. Due to this increasing demand for more clouds there is an ever growing threat of security becoming a major issue. cloud computing is a construct that allows you to access applications that actually reside at a location other than your computer or other Internet-connected device, most often, this will be a distant data center. In a simple, topological sense, a cloud computing solution is made up of several elements: clients, the datacenter, and distributed servers. Each element has a purpose and plays a specific role in delivering a functional cloud based application, the increased degree of connectivity and the increasing amount of data has led many providers and in particular data centers to employ larger infrastructures with dynamic load and access balancing. So this paper shall look at ways in which security responsibilities and Cloud Adoption Keywords: Cloud Computing, Service models, Cloud Security, Secure Cloud Adoption,
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
1) The document discusses security issues in cloud computing, with a focus on vulnerabilities in the virtualization layer.
2) It proposes a secure model (SVM) using intrusion detection systems to monitor virtual machines and detect attacks. This would help virtual machines resist attacks more efficiently in cloud environments.
3) Some key virtualization vulnerabilities discussed include attacks on hypervisors, compromised isolation between virtual machines, and packet sniffing/spoofing in virtual networks. The proposed SVM model aims to address these issues and secure the virtualization layer in cloud infrastructure.
Internal & External Attacks in cloud computing Environment from confidentiali...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Time domain sound spectrum measurements in ducted axial fan under stable regi...iaemedu
This document summarizes research on measuring time domain sound spectra in a ducted axial fan under stable operating conditions. The fan test setup and instrumentation are described, including a microphone to capture sound signals, data acquisition system, and LabVIEW software to analyze spectra. Experiments were conducted at varying rotor speeds from 2400-3600 rpm with a throttle position of 6 cm. Results showed that sound pressure amplitude generally increased with rotor speed and fluctuated periodically due to fan blade passage. Maximum amplitudes ranged from 16-36 dB depending on rotor speed. The time domain spectra measurements provide insights into fan acoustics and stability characteristics.
High performance parallel prefix adders with fast carry chain logiciaemedu
This document discusses and compares different types of parallel prefix adders. It begins by introducing binary adders and describing the three stages of prefix addition: pre-computation, prefix-computation, and post-computation. It then describes various parallel prefix adders like Brent-Kung, Kogge-Stone, Ladner-Fischer, and Han-Carlson adders. For FPGA implementation, simple adders typically perform better than parallel prefix adders due to fast carry chains. The document proposes modifying the Kogge-Stone adder using fast carry logic to make it more suitable for FPGAs. Simulation results show that for higher bit widths, the modified Kogge-Stone adder provides better delay than a simple ad
Assignment of cells to switches using firefly algorithmiaemedu
The document summarizes a research paper that proposes using the firefly algorithm to solve the optimization problem of assigning cells to switches in a cellular network. The problem aims to minimize cabling, handoff, and switching costs while meeting constraints of assigning each cell to one switch and not exceeding switch capacities. It formulates the problem mathematically and reviews existing solution methods. The firefly algorithm is then described as inspired by firefly flashing behavior. Experiments applying the firefly algorithm to various problem instances are conducted to test its effectiveness in solving the cell-to-switch assignment problem.
Effect of punch profile radius and localised compressioniaemedu
This document discusses springback in V-bending of high strength steel sheets. It presents results from an experimental investigation and finite element analysis simulation of the effects of punch profile radius and localized compression on springback. The experimental results showed that increasing punch radius or decreasing sheet thickness increases springback, while applying localized compressive stress through bottoming the punch can compensate for springback. The finite element analysis validated the experimental findings. The document provides background on springback in bending, methods to compensate for it, and details of the materials testing and modeling approach used in the study.
Improving performance and development of two stage reciprocating compressorsiaemedu
This document summarizes a study that aims to experimentally improve the performance of a two-stage reciprocating air compressor. The study examines the effects of various parameters on compressor performance, including the primary air tank, compressor running time, background working conditions, and air leakage. The performance impacts of each parameter are compared to normal operating conditions. The results are intended to help optimize compressor design and operation to minimize energy consumption.
Octave wave sound signal measurements in ducted axial fan under stable region...iaemedu
The document discusses measurements of octave wave sound signals in a ducted axial fan under stable operating conditions. Experiments were conducted to analyze sound pressure level variations at different rotor speeds between 2400-3600 RPM with the throttle position fixed at 7 cm. Microphones were used to measure sound levels from 11Hz to 11100Hz in decibels. The results showed that sound pressure levels generally increased with rotor speed, ranging from 79-105 dB. Higher pressures and amplitudes correlated with increased sound levels. The experiments provide insight into fan acoustics under stable flow conditions.
Model for prediction of temperature distribution in workpiece for surface gri...iaemedu
The document describes a finite element model for predicting temperature distribution in a workpiece during surface grinding. It discusses how grinding parameters like wheel speed and depth of cut affect the heat flux and temperature rise in the workpiece. The model treats the grinding wheel as a moving heat source along the workpiece surface. Equations are provided to calculate the heat flux based on factors like tangential force and energy absorbed by the workpiece. The model was developed using finite element analysis to simulate temperature changes more accurately compared to previous analytical models.
Analysis of programming aspects of wireless sensor networksiaemedu
This document discusses programming aspects of wireless sensor networks and non-uniformity issues. It analyzes programming efforts for developing test cases using wireless sensor network solutions versus traditional tools. It also explores system performance based on metrics like overhead, energy usage, and resource utilization. Key frameworks discussed include WiSeKit for adaptive applications, Remora for component-based programming, and extensions that enable distributed sensor services, dynamic reconfiguration, and integration with Internet systems.
Design and development of an automotive vertical doors opening system avdosiaemedu
The document describes the design and development of an automotive vertical doors opening system (AVDOS). The proposed system aims to overcome some drawbacks of existing vertical door designs by allowing easier access without requiring side movement. The system uses two hinges, gears, and a gas spring. The hinges are designed to open the door by swinging away from the vehicle. A small vertical push activates the gas spring, which moves the hinge and causes the gears to provide a slight outward movement to clear the door frame. Testing in CAD software validated that the system provides access without hard pushing or slamming doors. The system offers a safer, easier to use, and lower cost alternative to existing vertical door designs.
SECURE DATA TRANSMISSION OVER CLOUD USING MOBILE TECHNOLOGYijsrd.com
Mobile Cloud Computing (MCC) which consists of mobile and cloud computing, is one of the major breakthrough in industry and it has been improving in the IT industries since 2009. The MCC is still at the beginning stage of improvement or development, it is very important to grasp core knowledge of the technology in order to point us to the next-gen research. MCC has been involved to be a succeeding development for mobile technology. To overcome obstacles related to the performance MCC compiles the cloud computing into the mobile environment and security were observed in mobile computing. These outputs a short account on the background of MCC: starting from mobile computing to cloud computing and then followed with a discussion on recent research work. In this paper proposes mobile cloud computing security using one time password and whatsapp mechanism.
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
This document summarizes a research paper that proposes a secure distributed framework for cloud authorization using unit transaction permission coins (UTPCs). The framework uses hash functions like SHA and MD5 to generate unique UTPCs on Android smartphones based on device identifiers. These UTPCs are used for user authentication to access cloud services. The framework aims to provide lightweight and compatible security for real-time cloud applications. It discusses security challenges with cloud computing and sensor networks, and proposes generating UTPCs through a nested hashing process as a security token for cloud user authorization.
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
This document discusses secure authorization for cloud computing using smartphones. It proposes a distributed framework that uses a Unit Transaction Permission Coin (UTPC) as a security token for cloud user authorization. The UTPC is generated using a hash function like SHA or MD5, making it difficult for intruders to break. The framework registers and authenticates trusted smartphone devices using their IMEI and IMSI identifiers in an untrusted computing environment. The resulting UTPC-based authorization method is lightweight and compatible with real-time cloud applications.
Proposed Model for Enhancing Data Storage Security in Cloud Computing SystemsHossam Al-Ansary
This document proposes a model for enhancing data storage security in cloud computing systems. It discusses threats and attacks to cloud data storage from external and internal sources. It then describes three common cloud deployment models: public clouds, private clouds, and hybrid clouds. The document proposes that cloud systems should include cloud service providers, users, and third party auditors. It also outlines two types of potential adversaries (weak and strong). Finally, it proposes design goals for secure cloud data storage systems, including ensuring storage correctness, fast error localization, dynamic data support, dependability, and lightweight verification.
Challenges and Mechanisms for Securing Data in Mobile Cloud Computingijcnes
Cloud computing enables users to utilize the services of computing resources. Now days computing resources in mobile applications are being delivered with cloud computing. As there is a growing need for new mobile applications, usage of cloud computing can not be overlooked. Cloud service providers offers the services for the data request in a remote server. Virtualization aspect of cloud computing in mobile applications felicitates better utilization of resources. The industry needs to address the foremost security risk in the underlying technology. The cloud computing environment in mobile applications aggravated with various security problems. This paper addresses challenges in securing data in cloud for mobile Cloud computing and few mechanisms to overcome.
Cloud data security and various cryptographic algorithms IJECEIAES
Cloud computing has spread widely among different organizations due to its advantages, such as cost reduction, resource pooling, broad network access, and ease of administration. It increases the abilities of physical resources by optimizing shared use. Clients’ valuable items (data and applications) are moved outside of regulatory supervision in a shared environment where many clients are grouped together. However, this process poses security concerns, such as sensitive information theft and personally identifiable data leakage. Many researchers have contributed to reducing the problem of data security in cloud computing by developing a variety of technologies to secure cloud data, including encryption. In this study, a set of encryption algorithms (advance encryption standard (AES), data encryption standard (DES), Blowfish, Rivest-Shamir-Adleman (RSA) encryption, and international data encryption algorithm (IDEA) was compared in terms of security, data encipherment capacity, memory usage, and encipherment time to determine the optimal algorithm for securing cloud information from hackers. Results show that RSA and IDEA are less secure than AES, Blowfish, and DES). The AES algorithm encrypts a huge amount of data, takes the least encipherment time, and is faster than other algorithms, and the Blowfish algorithm requires the least amount of memory space.
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Editor IJCATR
Network Intrusion detection and Countermeasure Election in virtual network systems (NICE) are used to establish a
defense-in-depth intrusion detection framework. For better attack detection, NICE incorporates attack graph analytical procedures into
the intrusion detection processes. We must note that the design of NICE does not intend to improve any of the existing intrusion
detection algorithms; indeed, NICE employs a reconfigurable virtual networking approach to detect and counter the attempts to
compromise VMs, thus preventing zombie VMs. NICE includes two main phases: deploy a lightweight mirroring-based network
intrusion detection agent (NICE-A) on each cloud server to capture and analyze cloud traffic. A NICE-A periodically scans the virtual
system vulnerabilities within a cloud server to establish Scenario Attack Graph (SAGs), and then based on the severity of identified
vulnerability toward the collaborative attack goals, NICE will decide whether or not to put a VM in network inspection state. Once a
VM enters inspection state, Deep Packet Inspection (DPI) is applied, and/or virtual network reconfigurations can be deployed to the
inspecting VM to make the potential attack behaviors prominent.
This document discusses security issues in grid computing and proposes an enhanced amalgam encryption approach. It begins with an overview of distributed, cloud, and grid computing. Grid computing involves coordinating shared resources across distributed, heterogeneous environments. Major security issues in grid computing include integration with existing security systems, interoperability across domains, and establishing trust relationships. The document then discusses cryptography approaches used to provide security, including symmetric and asymmetric encryption. It proposes a hybrid encryption solution combining AES and RC4 algorithms to address overhead limitations of previous approaches for large distributed networks like smart grids.
Review on Security Aspects for Cloud Architecture IJECEIAES
Cloud computing is one of the fastest growing and popular technology in the field of computing. As the concept of cloud computing was introduced in 2006. Since then large number of IT industries join the queue to develop many cloud services and put sensitive information over cloud. In fact cloud computing is no doubt the great innovation in the field of computing but at the same time also poses many challenges. Since a large number of organizations migrate their business to cloud and hence it appears as an attractive target for the malicious attack. The purpose of the paper is to review the available literature for security concerns and highlight a relationship between vulnerabilities, attacks and threats in SaaS model. A mapping is being presented to highlight the impact of vulnerabilities and attacks.
Reliable security in cloud computing environment 2-3-4-5-6IAEME Publication
This document summarizes a research paper on providing reliable security in cloud computing environments. It discusses how using a single cloud provider poses risks from service availability failures and potential malicious insiders. The document then proposes using a multi-cloud approach to improve security and reliability. It describes an algorithm that uses secret sharing to distribute encrypted data across multiple cloud providers, so that any subset of the providers is needed to reconstruct the encrypted data and ensure the integrity of stored information. Overall, the document advocates for a multi-cloud architecture to enhance data security, availability, and integrity when using cloud computing.
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware, networking, and services integrate to offer different computational facilities, while Internet or a private network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud system delimit the benefits of cloud computing like “on-demand, customized resource availability and performance management”. It is understood that current IT and enterprise security solutions are not adequate to address the cloud security issues. This paper explores the challenges and issues of security concerns of cloud computing through different standard and novel solutions. We propose analysis and architecture for incorporating different security schemes, techniques and protocols for cloud computing, particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and is not coupled with the underlying backbone. This would facilitate to manage the cloud system more effectively and provide the administrator to include the specific solution to counter the threat. We have also shown using experimental data how a cloud service provider can estimate the charging based on the security service it provides and security-related cost-benefit analysis can be estimated.
This document discusses effective modular order preserving encryption on cloud using multivariate hypergeometric distribution (MHGD). It begins with an abstract that describes how order preserving encryption allows efficient range queries on encrypted data. It then provides background on cloud computing security concerns and discusses existing approaches to searchable encryption, including probabilistic encryption, deterministic encryption, homomorphic encryption, and order preserving encryption. The key proposed approach is to improve the security of existing modular order preserving encryption approaches by utilizing MHGD.
Data Stream Controller for Enterprise Cloud ApplicationIJSRD
Cloud computing is an emerging computing paradigm where computing resources are provided as services over Internet while residing in a large data center. Even though it enables us to dynamically provide servers with the ability to address a wide range of needs, this paradigm brings forth many new challenges for the data security and access control as users outsource their sensitive data to clouds, which are beyond the same trusted domain as data owners. The occupier need not be concerned with how the Paas system achieves expansion under high load.MAC systems differ as security policy is defined for the entire system, typically by administrators. Information flow control (IFC) is a MAC approach, developed originally from military information management methodologies. IFC can be used to enforce more general policies, using appropriate labeling and checking schemes. The labels can be used to manage both confidentiality and integrity concerns, tracking “secrecy†and “quality†of data, respectively. Decentralized Information Flow Control (DIFC) is an approach to security that allows application writers to control how data flow between the pieces of application and the outside world. As applied to privacy DIFC allows un trusted software to compute with private data while trusted security code controls the release of that data. As applied to integrity DIFC allows trusted code to protect un trusted software from unexpected inputs.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
This document summarizes a research paper that proposes a method for enhancing data security in cloud computing through steganography. The method hides user data in digital images stored on cloud servers. When data needs to be accessed, it is extracted from the images. The document outlines the cloud architecture and security issues addressed. It then describes the proposed system architecture, security model, and data storage and retrieval process. Data is partitioned and hidden in multiple images to improve security. The goal is to prevent unauthorized access to user data stored on cloud servers.
Sections:
Introduction
Cloud Computing background
Securing the Cloud
Virtualization
Mobile Cloud Computing
User safety & energy consumption
Author’s proposal
Conclusion
In order to make cloud computing to be adopted by users and enterprises, security concerns of users should be rectified by making cloud environment trustworthy, discussed by Latif et al. in the assessment of cloud computing risks[2].
We address the questions related to:
security concerns and threats over general cloud computing,
(2) the solutions for these problems and
(3) mobile users safety in convergence with energy consumption.
The document summarizes various technologies used for cloud computing security. It discusses three main methods: data splitting, data anonymization, and cryptographic techniques.
Data splitting involves separating confidential data into fragments that are stored in different locations. Data anonymization irreversibly hides data to protect sensitive information while still allowing analysis. Cryptographic techniques like encryption can be used to encrypt data before outsourcing, but limit cloud capabilities unless advanced encryption methods are used.
The document compares the advantages and disadvantages of each method for security, overhead, functionality, and key criteria. It provides an overview of approaches for maintaining data security in cloud computing.
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
Cloud computing is utility-based computing provides many benefits to its clients but security is one aspect which is delaying its adoptions. Security challenges include data security, network security and infrastructure security. Data security can be achieved using Cryptography. If we include location information in the encryption and decryption process then we can bind access to data with the location so that data can be accessed only from the specified locations. In this paper, we propose a method based on the symmetric cryptography, location-based cryptography and ciphertext policy – Attribute-based encryption (CP-ABE) to implements secure access control to the outsourced data. The Symmetric key is used to encrypt that data whereas CP-ABE is used to encrypt the secret key and the location lock value before uploading on the server. User will download encrypted data and the symmetric secret key XORed with the Location Lock value, using his attributes based secret key he can obtain first XORed value of Symmetric secret key and location lock value. Using anti-spoof GPS Location lock value can be obtained which can be used to retrieve the symmetric secret key. We have adopted Massage Authentication Code (MAC) to ensure Integrity and Availability of the data. This protocol can be used in the Bank, government organization, military services or any other industry those are having their offices/work location at a fixed place, so data access can be bounded to that location.
Comparison of data security in grid and cloud computingeSAT Journals
Abstract In the current era, Grid computing and cloud computing are the main fields in the research work. This thesis define which are the main security issues to be considered in cloud computing and grid computing, and how some of these security issues are solved. Comparative study shows the grid security is tighter than the cloud. It also shows cloud computing is less secure and faced security problems. This research work is based on main security problems in cloud computing such as authentication, authorization, access control and security infrastructure (SLA). Cloud infrastructure is based on service level agreement; simply cloud providers provide different services to cloud’s users and organizations with an agreement known SLA. So the security and privacy of user’s data is the main problem, because unauthorized person can’t access the data of cloud user. Hacking and data leakage are the common threats in cloud computing. As the security due to hackers increase over internet and the cloud computing is totally on internet. At this time, cloud computing demand the tight password protection and strong authentication and authorization procedure. For an increased level of security, privacy and password protection, we provide a new strong authentication model named “Two factor authentications using graphical password with pass point scheme”. This authentication model includes the login procedure, access control that is based on service level agreement (SLA) in cloud computing. Index Terms: Cloud computing, Authentication, login, Recognition, Recall, Pass point, security, Cloud Provider, Service level Agreement, Two Factor Authentication
Single Sign-on Authentication Model for Cloud Computing using KerberosDeepak Bagga
ABSTRACT
In today’s organizations need for several new resources and storage requirements for terabytes of data is generated every day. Cloud computing provides solution for this in a cost effective and efficient manner. Cloud computing provides on demand resources as services to clients. Cloud is highly scalable and flexible. Although it is benefiting the clients in several ways but as data is stored remotely it has many security loopholes like attacks, data lose, other security and authentication issues. In this paper we are proposing an authentication model for cloud computing based on the Kerberos protocol to provide single sign-on and to prevent against DDOS attacks. This model can benefit by filtering against unauthorized access and to reduce the burden, computation and memory usage of cloud against authentication checks for each client. It acts as a third party between cloud servers and clients to allow secure access to cloud services. In this paper we will see some of the related work for cloud security issues and attacks. Then in next section we will discuss the proposed architecture, its working and sequential process of message transmission. Next we will see how it can prevent against DDOS attacks, some benefits and how it provides single sign-on.
Similar to Secure modelling schema of distributed information access management in cloud environment (20)
Tech transfer making it as a risk free approach in pharmaceutical and biotech iniaemedu
Tech transfer is a common methodology for transferring new products or an existing
commercial product to R&D or to another manufacturing site. Transferring product knowledge to the
manufacturing floor is crucial and it is an ongoing approach in the pharmaceutical and biotech
industry. Without adopting this process, no company can manufacture its niche products, let alone
market them. Technology transfer is a complicated, process because it is highly cross functional. Due
to its cross functional dependence, these projects face numerous risks and failure. If anidea cannot be
successfully brought out in the form of a product, there is no customer benefit, or satisfaction.
Moreover, high emphasis is in sustaining manufacturing with highest quality each and every time. It
is vital that tech transfer projects need to be executed flawlessly. To accomplish this goal, risk
management is crucial and project team needs to use the risk management approach seamlessly.
Integration of feature sets with machine learning techniquesiaemedu
This document summarizes a research paper that proposes a novel approach for spam filtering using selective feature sets combined with machine learning techniques. The paper presents an algorithm and system architecture that extracts feature sets from emails and uses machine learning to classify emails and generate rules to identify spam. Several metrics are identified to evaluate the efficiency of the feature sets, including false positive rate. An experiment is described that uses keyword lists as feature sets to train filters and compares the proposed approach to other spam filtering methods.
Effective broadcasting in mobile ad hoc networks using gridiaemedu
This document summarizes a research paper that proposes a new grid-based broadcasting mechanism for mobile ad hoc networks. The paper argues that flooding approaches to broadcasting are inefficient and cause network congestion. The proposed approach divides the network into a hierarchical grid structure. When a node needs to broadcast a message, it sends the message to the first node in the appropriate grid, which is then responsible for updating and forwarding the message within that grid. Simulation results showed the grid-based approach outperformed other broadcasting protocols and was more reliable, efficient and scalable.
Effect of scenario environment on the performance of mane ts routingiaemedu
The document analyzes the effect of scenario environment on the performance of the AODV routing protocol in mobile ad hoc networks (MANETs). It studies AODV performance under different scenarios varying network size, maximum node speed, and pause time. The performance is evaluated based on packet delivery ratio, throughput, and end-to-end delay. The results show that AODV performs best in some scenarios and worse in others, indicating that scenario parameters significantly impact routing protocol performance in MANETs.
Adaptive job scheduling with load balancing for workflow applicationiaemedu
This document discusses adaptive job scheduling with load balancing for workflow applications in a grid platform. It begins with an abstract that describes grid computing and how scheduling plays a key role in performance for grid workflow applications. Both static and dynamic scheduling strategies are discussed, but they require high scheduling costs and may not produce good schedules. The paper then proposes a novel semi-dynamic algorithm that allows the schedule to adapt to changes in the dynamic grid environment through both static and dynamic scheduling. Load balancing is incorporated to handle situations where jobs are delayed due to resource fluctuations or overloading of processors. The rest of the paper outlines the related works, proposed scheduling algorithm, system model, and evaluation of the approach.
This document summarizes research on transaction reordering techniques. It discusses transaction reordering approaches based on reducing resource conflicts and increasing resource sharing. Specifically, it covers:
1) A "steal-on-abort" technique that reorders an aborted transaction behind the transaction that caused the abort to avoid repeated conflicts.
2) A replication protocol that attempts to reorder transactions during certification to avoid aborts rather than restarting immediately.
3) Transaction reordering and grouping during continuous data loading to prevent deadlocks when loading data for materialized join views.
The document discusses semantic web services and their challenges. It provides an overview of semantic web technologies like WSDL, SOAP, UDDI, and OIL which are used to build semantic web services. The semantic web architecture adds semantics to web services through ontologies written in OWL and DAML+OIL. Key approaches to semantic web services include annotation, composition, and addressing privacy and security. However, semantic web services still face challenges in achieving their full potential due to issues in representation, reasoning, and a lack of real-world applications and data.
Website based patent information searching mechanismiaemedu
This document summarizes a research paper on developing a website-based patent information searching mechanism. It discusses how patent information can be used for technology development, rights acquisition and utilization, and management information. It describes different types of patent searches including novelty, validity, infringement, and state-of-the-art searches. It also evaluates and compares two major patent websites, Delphion and USPTO, in terms of their search capabilities and features.
Revisiting the experiment on detecting of replay and message modificationiaemedu
This document summarizes a research paper that proposes methods for detecting message modification and replay attacks in ad-hoc wireless networks. It begins with background on security issues in wireless networks and types of attacks. It then reviews existing intrusion detection systems and security techniques. Related work that detects attacks using features from the media access control layer or radio frequency fingerprinting is also discussed. The paper aims to present a simple, economical, and platform-independent system for detecting message modification, replay attacks, and unauthorized users in ad-hoc networks.
1) The document discusses the Cyclic Model Analysis (CMA) technique for sequential pattern mining which aims to predict customer purchasing behavior.
2) CMA calculates the Trend Distribution Function from sequential patterns to model purchasing trends over time. It then uses Generalized Periodicity Detection and Trend Modeling to identify periodic patterns and construct an approximating model.
3) The Cyclic Model Analysis algorithm is applied to further analyze the patterns, dividing the domain into segments where the distribution function is increasing or decreasing and applying the other techniques recursively to fully model the cyclic behavior.
Performance analysis of manet routing protocol in presenceiaemedu
This document analyzes the performance of different routing protocols in a mobile ad hoc network (MANET) under hybrid traffic conditions. It simulates a MANET with 50 nodes moving at speeds up to 20 m/s using the AODV, DSDV, and DSR routing protocols. Traffic included both constant bit rate and variable bit rate sources. Results found that AODV had lower average end-to-end delay and higher packet delivery ratios than DSDV and DSR as the percentage of variable bit rate traffic increased. AODV also performed comparably under both low and high node mobility scenarios with hybrid traffic.
Performance measurement of different requirements engineeringiaemedu
This document summarizes a research paper that compares the performance of different requirements engineering (RE) process models. It describes three RE process models - two existing linear models and the authors' iterative model. It also reviews literature on common RE activities and issues with descriptive models not reflecting real-world practices. The authors conducted interviews at two Indian companies to model their RE processes and compare them to the three models. They found the existing linear models did not fully capture the iterative nature of observed RE processes.
This document proposes a mobile safety system for automobiles that uses Android operating system. The system has two main components: a safety device and an automobile base unit. The safety device allows users to monitor the vehicle's location on a map, check its status, and control functions remotely. It communicates with the base unit in the vehicle using GPRS. The base unit collects data from sensors, determines the vehicle's GPS location, and can execute control commands like activating the brakes or switching off the engine. The document provides details on the design and algorithms of both components and includes examples of Java code implementation. The goal is to create an intelligent, secure and easy-to-use mobile safety system for vehicles using embedded systems and Android
Efficient text compression using special character replacementiaemedu
The document describes a proposed algorithm for efficient text compression using special character replacement and space removal. The algorithm replaces words with non-printable ASCII characters or combinations of characters to compress text files. It uses a dynamic dictionary to map words to their symbols. Spaces are removed from the compressed file in some cases to further reduce file size. Experimental results show the algorithm achieves better compression ratios than LZW, WinZip 10.0 and WinRAR 3.93 for various text file types while allowing lossless decompression.
The document discusses agile programming and proposes a new methodology. It provides an overview of existing agile methodologies like Scrum and Extreme Programming. Scrum uses short sprints to define tasks and deadlines. Extreme Programming focuses on practices like test-first development, pair programming, and continuous integration. The document notes drawbacks like an inability to support large or multi-site projects. It proposes designing a new methodology that combines the advantages of existing methods while overcoming their deficiencies.
Adaptive load balancing techniques in global scale grid environmentiaemedu
The document discusses various adaptive load balancing techniques for distributed applications in grid environments. It first describes adaptive mesh refinement algorithms that partition computational domains using space-filling curves or by distributing grids independently or at different levels. It also discusses dynamic load balancing using tiling and multi-criteria geometric partitioning. The document then covers repartitioning algorithms based on multilevel diffusion and the adaptive characteristics of structured adaptive mesh refinement applications. Finally, it discusses adaptive workload balancing on heterogeneous resources by benchmarking resource characteristics and estimating application parameters to find optimal load distribution.
A survey on the performance of job scheduling in workflow applicationiaemedu
This document summarizes a survey on job scheduling performance in workflow applications on grid platforms. It discusses an adaptive dual objective scheduling (ADOS) algorithm that takes both completion time and resource usage into account for measuring schedule performance. The study shows ADOS delivers good performance in completion time, resource usage, and robustness to changes in resource performance. It also describes the system architecture used, which includes a planner and executor component. The planner focuses on scheduling to minimize completion time while considering resource usage, and can reschedule if needed. The executor enacts the schedule on the grid resources.
A survey of mitigating routing misbehavior in mobile ad hoc networksiaemedu
This document summarizes existing methods to detect misbehavior in mobile ad hoc networks (MANETs). It discusses how routing protocols assume nodes will cooperate fully, but misbehavior like packet dropping can occur. It describes several techniques to detect misbehavior, including watchdog, ACK/SACK, TWOACK, S-TWOACK, and credit-based/reputation-based schemes. Credit-based schemes use virtual currencies to provide incentives for nodes to forward packets, while reputation-based schemes track nodes' past behaviors. The document aims to survey approaches for mitigating the impact of misbehaving nodes in MANET routing.
A novel approach for satellite imagery storage by classifyiaemedu
This document presents a novel approach for classifying and storing satellite imagery by detecting and storing only non-duplicate regions. It uses kernel principal component analysis to reduce the dimensionality and extract features of satellite images. Fuzzy N-means clustering is then used to segment the images into blocks. A duplication detection algorithm compares blocks to identify duplicate and non-duplicate regions. Only the non-duplicate regions are stored in the database, improving storage efficiency and updating speed compared to completely replacing existing images. Support vector machines are used to categorize the non-duplicate blocks into the appropriate classes in the existing images.
A self recovery approach using halftone images for medical imageryiaemedu
This document summarizes a proposed approach for securely transferring medical images over the internet using visual cryptography and halftone images. The approach uses error diffusion techniques to generate a halftone host image from the grayscale medical image. Shadow images are then created from the halftone host image using visual cryptography algorithms. When stacked together, the shadow images reveal the secret medical image. The halftone host image also contains an embedded logo that can be extracted to verify the integrity of the reconstructed image without a trusted third party.