Security and performance are basic requirements for any system. They are considered the criteria for the
measurement of any progress in a security system. Security is an indicator that affects the level of
performance through the threats that influence the performance of parts of the cloud during the rendering
of services. Both security and performance demonstrate the efficiency of cloud computing which indicates
that the performance and security are measurements for the extent of the development of the cloud. In this
paper, the relationship between performance and security will be examined to know the extent of their
impact on the progress of cloud computing.
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool of configurable computing resources. Reliability in compute cloud is an
important aspect in Quality of Service which needs to be addressed in order to foster the
adoption of compute cloud. In today’s integrated environment the distributed systems is
employed to carry out computational intensive task at a faster rate without much
investment. The Cloud is a multitenant architecture which allows faster computation with
high scalability at a lower cost thereby the users can share the same physical infrastructure.
Individual customers deploy their applications in such environment will occupy the virtual
partitions on the platform. This paper describes a straightforward procedure to analyze the
reliability of the application from the view point of the resource provider. A trust
component is implemented to provide preventive control and to mitigate the occurrence of
any non-permissible action by using the detective mechanism. Such mechanisms are used to
identify the privacy risk and it further prevents from utilization. Hence, in this paper trust
assessment is performed before the user is allowed to share the multitenant infrastructure.
The cloud can provide scalable and reliable service for the legitimate users. The proposed
work is tested using tools Aneka and Globus Toolkit.
Overview of cloud computing architectureeSAT Journals
Abstract
This Research paper explores cloud computing architecture, service delivery models, Security & Privacy Issues and Trust Challenges. Evaluates all three service delivery models Software-as-a-Service (Saas), Platform-as-a-Service (PaaS) and Infrastructure-as-a-service (IaaS) and their deployment, requirements and services they provide. In the next section Security & Privacy Issues has been discussed and focus is on potential reasons for them to cause. Also discusses the lack of common cloud security standards with constructive discussion on public cloud providers and on their proprietary security standards. Overview on Challenges with Trust between Cloud provider and cloud user and suggests solutions for inculcating trust among cloud provider and cloud user with the help of trusted thrid party. Solutions and recommendations are suggested to safeguard user Data in the cloud by implementing Data security measures such as use of Crypotography and Trusted platform module (TPM), Data integrity etc. This research paper also focuses on future scope of cloud computing and its evolution in the field of outsourcing and urges on the need of global security standards for mitigating security issues, privacy threats and Trust challenges for wide acceptance of cloud computing in organizations. Keywords: Cloud Computing Challenges, Service Delivery Models, Data Security, Security & Privacy Issues, Trust
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
User requirements and Resource Management is more important in cloud computing.
Automation of user requirements phase is still not available in a cloud scenario. User
requirements layer specifies the capacity of virtual machine required by the user and
applicatons to be placed within the virtual machine. Based on the history of user requirements
in an academic institution they could be converted into packages and the user selects the
appropriate package. User requirements are then mapped to both SMI and SLA for appropriate
package selection. Both the user requirements and packages rely on the underling infrastructure
resources. Hence effective resource management is must in academic institutions.
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
Cloud computing is a model for enabling convenient, on-demand network access
to a shared pool of configurable computing resources. Reliability in compute cloud is an
important aspect in Quality of Service which needs to be addressed in order to foster the
adoption of compute cloud. In today’s integrated environment the distributed systems is
employed to carry out computational intensive task at a faster rate without much
investment. The Cloud is a multitenant architecture which allows faster computation with
high scalability at a lower cost thereby the users can share the same physical infrastructure.
Individual customers deploy their applications in such environment will occupy the virtual
partitions on the platform. This paper describes a straightforward procedure to analyze the
reliability of the application from the view point of the resource provider. A trust
component is implemented to provide preventive control and to mitigate the occurrence of
any non-permissible action by using the detective mechanism. Such mechanisms are used to
identify the privacy risk and it further prevents from utilization. Hence, in this paper trust
assessment is performed before the user is allowed to share the multitenant infrastructure.
The cloud can provide scalable and reliable service for the legitimate users. The proposed
work is tested using tools Aneka and Globus Toolkit.
Overview of cloud computing architectureeSAT Journals
Abstract
This Research paper explores cloud computing architecture, service delivery models, Security & Privacy Issues and Trust Challenges. Evaluates all three service delivery models Software-as-a-Service (Saas), Platform-as-a-Service (PaaS) and Infrastructure-as-a-service (IaaS) and their deployment, requirements and services they provide. In the next section Security & Privacy Issues has been discussed and focus is on potential reasons for them to cause. Also discusses the lack of common cloud security standards with constructive discussion on public cloud providers and on their proprietary security standards. Overview on Challenges with Trust between Cloud provider and cloud user and suggests solutions for inculcating trust among cloud provider and cloud user with the help of trusted thrid party. Solutions and recommendations are suggested to safeguard user Data in the cloud by implementing Data security measures such as use of Crypotography and Trusted platform module (TPM), Data integrity etc. This research paper also focuses on future scope of cloud computing and its evolution in the field of outsourcing and urges on the need of global security standards for mitigating security issues, privacy threats and Trust challenges for wide acceptance of cloud computing in organizations. Keywords: Cloud Computing Challenges, Service Delivery Models, Data Security, Security & Privacy Issues, Trust
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
User requirements and Resource Management is more important in cloud computing.
Automation of user requirements phase is still not available in a cloud scenario. User
requirements layer specifies the capacity of virtual machine required by the user and
applicatons to be placed within the virtual machine. Based on the history of user requirements
in an academic institution they could be converted into packages and the user selects the
appropriate package. User requirements are then mapped to both SMI and SLA for appropriate
package selection. Both the user requirements and packages rely on the underling infrastructure
resources. Hence effective resource management is must in academic institutions.
A challenge for security and service level agreement in cloud computingeeSAT Journals
Abstract One of the most promising field in computing is regarded as cloud computing, which allows users to store their data virtually over the cloud without the need of any fixed infrastructure. It offer user to manipulate their data regardless of the geographical position, hence providing a scalable, feasible and flexible way to connect user to their data. The cloud can be considered as of the Internet where data are usually stored and computing refers to the applications and services that it can provide. Users are connected to cloud by Cloud Service Providers through the Internet connection. Both users and cloud service provider agree on a protocol known as service level agreements for exchange of information. Cloud computing provides increase in capacity and grants the capability to perform computation on cloud infrastructure to its users. Cloud Computing is capable of providing more convenient communication and instant multi-point collaboration feature. Cloud computing provides better utilization of distributed resource over large amount of data and they can be access remotely through the internet. Quality of service should be kept in mind will designing the service level agreement. There are many problem related to cloud computing such as traffic managements, security and privacy. This paper provides a survey on the basic working principle of clouding computing. This paper provides an overview of the cloud architecture including the different types and level of clouds services. In this paper focus has been made upon the service level agreement, issue and security prospectus over the cloud computing. Keywords: Architecture, Cloud Computing, Cloud Security, Cloud Services Service Level Agreements
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSAIJCSES Journal
Cloud represents an important change in the way information technology is used. Cloud makes it possible
to access work anywhere anytime and to share it with anyone [1]. It is changing the way people
communicate, work and learn [2]. In this changing environment, it is important to think about the
opportunities and risks of using the cloud in the education field, and the lessons we can learn from the
previous uses of this technology in the education field. In order to gain the benefits of the cloud to be used
in educational system in KSA, a comprehensive study on scientific literatures in this paper. This paper also
presents the significant information such as the findings, the case studies, related frameworks and
supporting also the tools associated to the migration of organizational resources to cloud
Cloud computing is a progressive innovation that has achieved new extravagances in the field of
Information Technology. It gives a wellspring of information and application programming stockpiling as
colossal server farms called 'mists', which can be gotten to with the assistance of a system association.
These mists boost the capacities of undertakings with no additional set-up, faculty or permitting costs.
Mists are for the most part sent utilizing Public, Private or Hybrid models relying on the necessities of the
client. In this paper, we have explored the distributed computing engineering, concentrating on the
elements of the Public, Private and Hybrid cloud models. There is a dire need to examine the performance
of a cloud environment on several metrics and enhance its usability and capability. This paper aims at
highlighting important contributions of various researchers in domains like computational power,
performance provisioning, Load balancing and SLAs.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDijccsa
The advent of container orchestration and cloud computing, as well as associated security and compliance complexities, make it challenging for the enterprises to develop robust, secure, manageable and extendable architectures which would be applicable to the public and private cloud. The main challenges stem from the fact that on-premises, private cloud and third-party, public cloud services often have seemingly different and sometimes conflicting requirements to tenant provisioning, service deployment, security and compliance and that can lead to rather different architectures which still have a lot of commonalities but evolve independently. Understanding and bridging the functionality gaps between such architectures is highly desirable in terms of common approaches, API/SPI as well as maintainability and extendibility. The authors discuss and propose common architectural approaches to the dynamic tenant provisioning and service orchestration in public, private and hybrid clouds focusing on deployment, security, compliance, scalability and extendibility of stateful Kubernetes runtimes.
A study on security responsibilities and adoption in cloudeSAT Journals
Abstract Cloud computing is one of the popular enterprise models where computing resources are made available on-demand to the user as needed. Due to this increasing demand for more clouds there is an ever growing threat of security becoming a major issue. cloud computing is a construct that allows you to access applications that actually reside at a location other than your computer or other Internet-connected device, most often, this will be a distant data center. In a simple, topological sense, a cloud computing solution is made up of several elements: clients, the datacenter, and distributed servers. Each element has a purpose and plays a specific role in delivering a functional cloud based application, the increased degree of connectivity and the increasing amount of data has led many providers and in particular data centers to employ larger infrastructures with dynamic load and access balancing. So this paper shall look at ways in which security responsibilities and Cloud Adoption Keywords: Cloud Computing, Service models, Cloud Security, Secure Cloud Adoption,
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Addressing Security Issues and Challenges in Mobile Cloud ComputingEditor IJCATR
The emergence of cloud computing has brought tremendous impact on software organizations and software architecture design. With the development of cloud computing and mobile internet, mobile cloud computing is becoming a new mode of application. With the widespread development of mobile applications and advances in mobile cloud computing, some other forms of requirements and security issues have been emerged. Mobile cloud computing provides resources residing over cloud and services provided for mobile devices. These resources and services from cloud are available for mobile user over their mobile devices. It also provides benefits for developing specialized mobile applications for them. However, increased security and privacy risks exists due to data outsourcing and synchronization over the Internet. This research paper provides the review on mobile cloud computing, its security issues, challenges and suggests some solutions.
Cloud computing is a technique that has a great capabilities and benefits for users. Cloud characteristics
encourage many organizations to move to this technology. But many consideration faces transmission
process. This paper outline some of these considerations and considerable efforts solved cloud scalability
issues.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Cloud computing performance evaluation issues and challenges3ijccsa
Cloud Computing makes the dream of computin
g real as a tool and in the form of service. This internet
-
based ongoing technology which has brought flexibility, capacity and power of processing has realized
service
-
oriented idea and has created a new ecosystem in the computing world with its great p
ower and
benefits. Cloud capabilities have been able to move IT industry one step forward. Nowadays, large and
famous enterprise have resorted to cloud computing and have transferred their processing and storage to
it. Due to popularity and progress of clo
ud in different organizations, cloud performance evaluation is of
special importance and this evaluation can help users make right decisions.
In
this paper
,
we
provide an
overall perspective on cloud evaluation criteria and highlight it with help of simula
tion.
For this purpose,
we present different major factors in cloud computing performance and we analyze and evaluate cloud
performance in various scenarios considering these factors.
A brief review: security issues in cloud computing and their solutionsTELKOMNIKA JOURNAL
Cloud computing is an Internet-based, emerging technology, tends to be prevailing in our environment especially in the field of computer sciences and information technologies which require network computing on large scale. Cloud Computing is a shared pool of services which is gaining popularity due to its cost, effectiveness, avilability and great production. Along with its numerous benefits, cloud computing brings much more challenging situation regarding data privacy, data protection, authenticated access, Intellectual property rights etc. Due to these issues, adoption of cloud computing is becoming difficult in today’s world. In this review paper, various security issues regarding data privacy and reliability, key factors which are affecting cloud computing, have been addressed and also suggestions on particular areas have been discussed.
Enhancing Data Integrity in Multi Cloud StorageIJERA Editor
Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. Cloud is surrounded by many security issues like securing data and examining the utilization of cloud by the cloud computing vendors. Security is one of the major issues which reduce the growth of cloud computing. A large number of clients or data owners store their data on servers in the cloud and it is provided back to them whenever needed. The data provided should not be jeopardized. Data integrity should be taken into account so that the data is correct, consistent and accessible. For ensuring the integrity in cloud computing environment, cloud storage providers should be trusted. Dealing with single cloud providers is predicted to become less secure with customers due to risks of service availability, failure and the possibility of malicious insiders in the single cloud. This paper deals with multi cloud environments to resolve these issues. The integrity of the data in multi cloud storage has been provided with the help of trusted third party using cryptographic algorithm.
A challenge for security and service level agreement in cloud computingeeSAT Journals
Abstract One of the most promising field in computing is regarded as cloud computing, which allows users to store their data virtually over the cloud without the need of any fixed infrastructure. It offer user to manipulate their data regardless of the geographical position, hence providing a scalable, feasible and flexible way to connect user to their data. The cloud can be considered as of the Internet where data are usually stored and computing refers to the applications and services that it can provide. Users are connected to cloud by Cloud Service Providers through the Internet connection. Both users and cloud service provider agree on a protocol known as service level agreements for exchange of information. Cloud computing provides increase in capacity and grants the capability to perform computation on cloud infrastructure to its users. Cloud Computing is capable of providing more convenient communication and instant multi-point collaboration feature. Cloud computing provides better utilization of distributed resource over large amount of data and they can be access remotely through the internet. Quality of service should be kept in mind will designing the service level agreement. There are many problem related to cloud computing such as traffic managements, security and privacy. This paper provides a survey on the basic working principle of clouding computing. This paper provides an overview of the cloud architecture including the different types and level of clouds services. In this paper focus has been made upon the service level agreement, issue and security prospectus over the cloud computing. Keywords: Architecture, Cloud Computing, Cloud Security, Cloud Services Service Level Agreements
ADVANCES IN HIGHER EDUCATIONAL RESOURCE SHARING AND CLOUD SERVICES FOR KSAIJCSES Journal
Cloud represents an important change in the way information technology is used. Cloud makes it possible
to access work anywhere anytime and to share it with anyone [1]. It is changing the way people
communicate, work and learn [2]. In this changing environment, it is important to think about the
opportunities and risks of using the cloud in the education field, and the lessons we can learn from the
previous uses of this technology in the education field. In order to gain the benefits of the cloud to be used
in educational system in KSA, a comprehensive study on scientific literatures in this paper. This paper also
presents the significant information such as the findings, the case studies, related frameworks and
supporting also the tools associated to the migration of organizational resources to cloud
Cloud computing is a progressive innovation that has achieved new extravagances in the field of
Information Technology. It gives a wellspring of information and application programming stockpiling as
colossal server farms called 'mists', which can be gotten to with the assistance of a system association.
These mists boost the capacities of undertakings with no additional set-up, faculty or permitting costs.
Mists are for the most part sent utilizing Public, Private or Hybrid models relying on the necessities of the
client. In this paper, we have explored the distributed computing engineering, concentrating on the
elements of the Public, Private and Hybrid cloud models. There is a dire need to examine the performance
of a cloud environment on several metrics and enhance its usability and capability. This paper aims at
highlighting important contributions of various researchers in domains like computational power,
performance provisioning, Load balancing and SLAs.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
DYNAMIC TENANT PROVISIONING AND SERVICE ORCHESTRATION IN HYBRID CLOUDijccsa
The advent of container orchestration and cloud computing, as well as associated security and compliance complexities, make it challenging for the enterprises to develop robust, secure, manageable and extendable architectures which would be applicable to the public and private cloud. The main challenges stem from the fact that on-premises, private cloud and third-party, public cloud services often have seemingly different and sometimes conflicting requirements to tenant provisioning, service deployment, security and compliance and that can lead to rather different architectures which still have a lot of commonalities but evolve independently. Understanding and bridging the functionality gaps between such architectures is highly desirable in terms of common approaches, API/SPI as well as maintainability and extendibility. The authors discuss and propose common architectural approaches to the dynamic tenant provisioning and service orchestration in public, private and hybrid clouds focusing on deployment, security, compliance, scalability and extendibility of stateful Kubernetes runtimes.
A study on security responsibilities and adoption in cloudeSAT Journals
Abstract Cloud computing is one of the popular enterprise models where computing resources are made available on-demand to the user as needed. Due to this increasing demand for more clouds there is an ever growing threat of security becoming a major issue. cloud computing is a construct that allows you to access applications that actually reside at a location other than your computer or other Internet-connected device, most often, this will be a distant data center. In a simple, topological sense, a cloud computing solution is made up of several elements: clients, the datacenter, and distributed servers. Each element has a purpose and plays a specific role in delivering a functional cloud based application, the increased degree of connectivity and the increasing amount of data has led many providers and in particular data centers to employ larger infrastructures with dynamic load and access balancing. So this paper shall look at ways in which security responsibilities and Cloud Adoption Keywords: Cloud Computing, Service models, Cloud Security, Secure Cloud Adoption,
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Addressing Security Issues and Challenges in Mobile Cloud ComputingEditor IJCATR
The emergence of cloud computing has brought tremendous impact on software organizations and software architecture design. With the development of cloud computing and mobile internet, mobile cloud computing is becoming a new mode of application. With the widespread development of mobile applications and advances in mobile cloud computing, some other forms of requirements and security issues have been emerged. Mobile cloud computing provides resources residing over cloud and services provided for mobile devices. These resources and services from cloud are available for mobile user over their mobile devices. It also provides benefits for developing specialized mobile applications for them. However, increased security and privacy risks exists due to data outsourcing and synchronization over the Internet. This research paper provides the review on mobile cloud computing, its security issues, challenges and suggests some solutions.
Cloud computing is a technique that has a great capabilities and benefits for users. Cloud characteristics
encourage many organizations to move to this technology. But many consideration faces transmission
process. This paper outline some of these considerations and considerable efforts solved cloud scalability
issues.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Cloud computing performance evaluation issues and challenges3ijccsa
Cloud Computing makes the dream of computin
g real as a tool and in the form of service. This internet
-
based ongoing technology which has brought flexibility, capacity and power of processing has realized
service
-
oriented idea and has created a new ecosystem in the computing world with its great p
ower and
benefits. Cloud capabilities have been able to move IT industry one step forward. Nowadays, large and
famous enterprise have resorted to cloud computing and have transferred their processing and storage to
it. Due to popularity and progress of clo
ud in different organizations, cloud performance evaluation is of
special importance and this evaluation can help users make right decisions.
In
this paper
,
we
provide an
overall perspective on cloud evaluation criteria and highlight it with help of simula
tion.
For this purpose,
we present different major factors in cloud computing performance and we analyze and evaluate cloud
performance in various scenarios considering these factors.
A brief review: security issues in cloud computing and their solutionsTELKOMNIKA JOURNAL
Cloud computing is an Internet-based, emerging technology, tends to be prevailing in our environment especially in the field of computer sciences and information technologies which require network computing on large scale. Cloud Computing is a shared pool of services which is gaining popularity due to its cost, effectiveness, avilability and great production. Along with its numerous benefits, cloud computing brings much more challenging situation regarding data privacy, data protection, authenticated access, Intellectual property rights etc. Due to these issues, adoption of cloud computing is becoming difficult in today’s world. In this review paper, various security issues regarding data privacy and reliability, key factors which are affecting cloud computing, have been addressed and also suggestions on particular areas have been discussed.
Enhancing Data Integrity in Multi Cloud StorageIJERA Editor
Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. Cloud is surrounded by many security issues like securing data and examining the utilization of cloud by the cloud computing vendors. Security is one of the major issues which reduce the growth of cloud computing. A large number of clients or data owners store their data on servers in the cloud and it is provided back to them whenever needed. The data provided should not be jeopardized. Data integrity should be taken into account so that the data is correct, consistent and accessible. For ensuring the integrity in cloud computing environment, cloud storage providers should be trusted. Dealing with single cloud providers is predicted to become less secure with customers due to risks of service availability, failure and the possibility of malicious insiders in the single cloud. This paper deals with multi cloud environments to resolve these issues. The integrity of the data in multi cloud storage has been provided with the help of trusted third party using cryptographic algorithm.
Cloud computing has changed the entire process that distributed computing used to present e.g. Grid
computing, server client computing. Cloud computing describes recent developments in many existing IT
technologies and separates application and information resources from the underlying infrastructure.
Cloud computing security is an important aspect of quality of service from cloud service providers.
Security concerns arise as soon as one begins to run applications beyond the designated firewall and move
closer towards the public domain. In violation of security in any component in the cloud can be disaster for
the organization (the customer) as well as for the provider. In this paper, we propose a cloud security
model and security framework that identifies security challenges in cloud computing.
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGijsptm
In the digital world using technology and new technologies require safe and reliable environment, and it also requires consideration to all the challenges that technology faces with them and address these challenges. Cloud computing is also one of the new technologies in the IT world in this rule there is no exception. According to studies one of the major challenges of this technology is the security and safety required for providing services and build trust in consumers to transfer their data into the cloud. In this paper we attempt to review and highlight security challenges, particularly the security of data storage in a cloud environment. Also, provides some offers to enhance the security of data storage in the cloud
computing systems that by using these opinions can be overcome somewhat on the problems.
Improved quality of service-based cloud service ranking and recommendation modelTELKOMNIKA JOURNAL
One of the ongoing technologies which are used by large number of companies and users is cloud computing environment. This computing technology has proved that it provides certainly a different level of efficiency, security, privacy, flexibility and availability to its users. Cloud computing delivers on demand services to the users by using various service-based models. All these models work on utility-based computing such that users pay for their used services. Along with the various advantages of the cloud computing environment, it has its own limitations and problems such as efficient resource identification or discovery, security, task scheduling, compliance and sustainability. Among these resource identification and scheduling plays an important role because users always submits their jobs and expects responses in least possible time. Research is happening all around the world to optimize the response time, make span so as to reduce the burden on the cloud resources. In this paper, QoS based service ranking model is proposed for cloud computing environment to find the essential top ranked services. Proposed model is implemented in two phases. In the first phase, similarity computation between the users and their services is considered. In the second phase, computing the missing values based on the computed similarity measures is calculated. The efficiency of the proposed ranking is measured and the average precision correlation of the proposed ranking measure is showing better results than the existing measures.
Data Partitioning Technique In Cloud: A Survey On Limitation And BenefitsIJERA Editor
In recent years,increment in the growth and popularity of cloud services has lead the enterprises to an increase in the capability to handle, store and retrieve critical data. This technology access a shared group of configurable computing resources, which are- servers,storage and applications. Cloud computing is a succeeding generation architecture of IT enterprise, which convert the application software and databaseto large data hubs.Data security and storage of data is an essential functionality of cloud services.It allows data storage in the cloud server efficiently without any worry. Cloud services includes request service, wide web access, measured services, just single click away ,easy usage, just pay for the services you use and location independent.All these features poses many security challenges.The data partitioning techniques are used in literature, for privacy conserving and security of data, using third party auditor (TPA). Objective of the current workis to review all available partitioning technique in literature and analyze them. Through this work authors will compare and identify the limitations and benefits of the available and widely used partitioning techniques.
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
The Cloud based services provide much efficient
and seamless ways for data sharing across the cloud. The fact
that the data owners no longer possess data makes it very
difficult to assure data confidentiality and to enable secure
data sharing in the cloud. Despite of all its advantages this
will remain a major limitation that acts as a barrier to the
wider deployment of cloud based services. One of the possible
ways for ensuring trust in this aspect is the introduction of
accountability feature in the cloud computing scenario. The
Cloud framework requires promotion of distributed
accountability for such dynamic environment[1]. In some
works, there‘s an accountable framework suggested to ensure
distributed accountability for data sharing by the generation
of only a log of data access, but without any embedded feedback
mechanism for owner permission towards data
protection[2].The proposed system is an enhanced client
accountability framework which provides an additional client
side verification for each access towards enhanced security of
data. The integrity of content of data which resides in the
cloud service provider is also maintained by secured
outsourcing. Besides, the authentication of JAR(Java Archive)
files are done to ensure file protection and to maintain a safer
environment for data sharing. The analysis of various
functionalities of the framework depicts both the
accountability and security feature in an efficient manner.
International Journal of Computational Engineering Research(IJCER) ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
In this study, survey questions were sent to different non-profit and government organizations, which
assisted in collecting fundamental information. The data was acquired by conducting surveys in OpenStack
Company to identify the critical vulnerabilities in the cloud computing platform in order to provide the
recommended solutions.
So, analysis will be made on how the cloud’s characteristics such as the nature of the architecture,
attractiveness, as well as, vulnerability are tightly related to privacy and security issues. Privacy and
security are complex issues for which there is no standard and the relationship between them is necessarily
complicated. The study also highlight on the inherent challenge to data privacy because it typically results
in data to be presented in an encryption from the data owner. Thus, the study aimed at obtaining a common
goal to provide a comprehensive review of the existing security and privacy issues in cloud environments,
and identify and describe the most representative of the security and privacy attributes and present a
relationship among them.
Finally, in order to ensure that the standard measure of validity is achieved, validity test was conducted in
order to ensure that the study is free from errors. Various recommendations were provided. The study also
explored various areas that require future directions for each attribute, which comprise of multi-domain
policy integration and a secure service composition to design a comprehensive policy-based management
framework in the cloud environments.
Lastly, the recommendations will provide the potential for security and privacy approaches that can be
implemented to improve the cloud computing environment to ensure that a level of trust is achieved
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
Cloud computing is an emerging model of service provision that has the advantage of minimizing costs
through sharing and storage of resources combined with a demand provisioning mechanism relying on
pay-per-use business model. Cloud computing features direct impact on information technology (IT)
budgeting but pose detrimental impacts on privacy and security mechanisms especially where sensitive
data is to be held offshore by third parties. Even though cloud computing environment promises new
benefits to organizations, it also presents its fair share of potential risks. It is considered as a double edge
sword considering the privacy and security standpoints. However, despite its potential to offer a low cost
security, customer organizations may increase the risks by storing their sensitive information in the cloud.
Therefore, this study focuses on privacy and security issues that pose a challenge in maintaining a level of
assurance that is sufficient enough to sustain confidence in potential users.
Cloud computing security through symmetric cipher modelijcsit
Cloud computing can be defined as an application and services which runs on distributed network using
virtualized and it is accessed through internet protocols and networking. Cloud computing resources and
virtual and limitless and information’s of the physical systems on which software running are abstracted
from the user. Cloud Computing is a style of computing in which dynamically scalable and often virtualized
resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or
control over the technology infrastructure in the "cloud" that supports them. To satisfy the needs of the
users the concept is to incorporate technologies which have the common theme of reliance on the internet
Software and data are stored on the servers whereas cloud computing services are provided through
applications online which can be accessed from web browsers. Lack of security and access control is the
major drawback in the cloud computing as the users deal with sensitive data to public clouds .Multiple
virtual machine in cloud can access insecure information flows as service provider; therefore to implement
the cloud it is necessary to build security. Therefore the main aim of this paper is to provide cloud
computing security through symmetric cipher model. This article proposes symmetric cipher model in
order to implement cloud computing security so that data can accessed and stored securely.
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware,
networking, and services integrate to offer different computational facilities, while Internet or a private
network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud
system delimit the benefits of cloud computing like “on-demand, customized resource availability and
performance management”. It is understood that current IT and enterprise security solutions are not
adequate to address the cloud security issues. This paper explores the challenges and issues of security
concerns of cloud computing through different standard and novel solutions. We propose analysis and
architecture for incorporating different security schemes, techniques and protocols for cloud computing,
particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed
architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and
is not coupled with the underlying backbone. This would facilitate to manage the cloud system more
effectively and provide the administrator to include the specific solution to counter the threat. We have also
shown using experimental data how a cloud service provider can estimate the charging based on the
security service it provides and security-related cost-benefit analysis can be estimated.
A SECURITY FRAMEWORK IN CLOUD COMPUTING INFRASTRUCTUREIJNSA Journal
In a typical cloud computing diverse facilitating components like hardware, software, firmware, networking, and services integrate to offer different computational facilities, while Internet or a private network (or VPN) provides the required backbone to deliver the services. The security risks to the cloud system delimit the benefits of cloud computing like “on-demand, customized resource availability and performance management”. It is understood that current IT and enterprise security solutions are not adequate to address the cloud security issues. This paper explores the challenges and issues of security concerns of cloud computing through different standard and novel solutions. We propose analysis and architecture for incorporating different security schemes, techniques and protocols for cloud computing, particularly in Infrastructure-as-a-Service (IaaS) and Platform-as-a-Service (PaaS) systems. The proposed architecture is generic in nature, not dependent on the type of cloud deployment, application agnostic and is not coupled with the underlying backbone. This would facilitate to manage the cloud system more effectively and provide the administrator to include the specific solution to counter the threat. We have also shown using experimental data how a cloud service provider can estimate the charging based on the security service it provides and security-related cost-benefit analysis can be estimated.
A detailed study of cloud computing is presented. Starting from its basics, the characteristics and different modalities
are dwelt upon. Apart from this, the pros and cons of cloud computing is also highlighted. Apart from this, service
models of cloud computing are lucidly highlighted.
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
Cloud computing is a new innovative model for enterprise in which information is permanently stored on the servers and also manage how and when different resources are allocate to the requested users. It provides distributed approach through which resources are allocated dynamically to the users without investing in the infrastructure or licensing the software’s on the client side. Using the cloud makes processing of information is more commodious but it also present them with new security problems about reliability.This phenomenon introduces serious problems regarding access mechanism to any information stored in the database and resources in the cloud. For the successful implementation of cloud computing it is necessary that we must know different areas where the security is needed. For this there should also governess strategy needed for secure communication between multi-clouds located in different geographical areas or in different countries. In this paper we discuss how to safely utilizing the benefit of cloud computing through the network where data security, provide authentication, integration, recovery, IP spoofing and Virtual Servers are the most captiousfields in the cloud.
Insuring Security for Outsourced Data Stored in Cloud EnvironmentEditor IJCATR
The cloud storage offers users with infrastructure flexibility, faster deployment of applications and data, cost
control, adaptation of cloud resources to real needs, improved productivity, etc. Inspite of these advantageous factors, there
are several deterrents to the widespread adoption of cloud computing remain. Among them, security towards the correctness
of the outsourced data and issues of privacy lead a major role. In order to avoid security risk for the outsourced data, we
propose the dynamic audit services that enables integrity verification of untrusted and outsourced storages. An interactive
proof system (IPS) with the zero knowledge property is introduced to provide public auditability without downloading raw
data and protect privacy of the data. In the proposed system data owner stores the large number of data in cloud after e
encrypting the data with private key and also send public key to third party auditor (TPA) for auditing purpose. TPA in
clouds and it’s maintained by CSP. An Authorized Application (AA), which holds a data owners secret key (sk) and
manipulate the outsourced data and update the associated IHT stored in TPA. Finally Cloud users access the services through
the AA. Our system also provides secure auditing while the data owner outsourcing the data in the cloud. And after
performing auditing operations, security solutions are enhanced for the purpose of detecting malicious users with the help of
Certificate Authority
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 3
Toward Cloud Computing: Security and Performance
1. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 5,No. 5/6, December 2015
DOI : 10.5121/ijccsa.2015.5602 17
TOWARD CLOUD COMPUTING: SECURITY AND
PERFORMANCE
Nabeel Zanoon
Department of applied science, Al- Balqa' Applied University, Jordan, Amman
ABSTRACT
Security and performance are basic requirements for any system. They are considered the criteria for the
measurement of any progress in a security system. Security is an indicator that affects the level of
performance through the threats that influence the performance of parts of the cloud during the rendering
of services. Both security and performance demonstrate the efficiency of cloud computing which indicates
that the performance and security are measurements for the extent of the development of the cloud. In this
paper, the relationship between performance and security will be examined to know the extent of their
impact on the progress of cloud computing.
KEYWORDS
Cloud Computing, Security and Performance, SLA, Distributed computing
1. INTRODUCTION
Cloud computing is a new technology in the world of information as the development of
distributed computing derives from parallel computing, network computing and distributed
databases [1]. If we want to analyze the term computerized networks, we say that they are a group
of computers distributed to geographical areas and are connected together by a mediator.
However, computerized networks are a term which indicates that the devices are distributed
individually and are connected through the exchange of messages [2]. Distributed computing is a
technology which links the devices together individually across geographical areas that constitute
a single environment and share the resource. All the devices are connected together to implement
several tasks [3.] The cloud develops with the progress of the public Internet, because the cloud
capabilities are limited in order to provide security on the basis of performance. Most of the
companies that seek to take advantage of cloud services follow the swiftness policy on the one
hand, and security and performance on the other hand, for it renounces its security through
contact on public cloud services in which case default resources are obtained, and this exposes
the enterprise content and data to most of the Internet vulnerabilities [4]. Security and privacy
constitute a tremendous agility in the development of the cloud. Security and privacy are to be
provided by cloud service providers as well as the reliability, availability, and performance [5].
For the companies that specialize in information technology, which provide the cloud services,
the availability of performance and security are the challenges when adopting cloud computing
by customers to make use of the services. The violation of security constitutes a risk of data loss,
and also the level of performance could weaken because of limited bandwidth, disk space,
memory, and the CPU cycle and network connection latency. Therefore, the level of performance
in the cloud services is a factor in users' acceptance to the cloud [6].
The progress in the services that are provided through the cloud computing networks must be
characterized by the high level of performance and security. The raising of the level of
2. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 5,No. 5/6, December 2015
18
performance may be at the expense of the level of security where there is a relationship between
them and this relationship has an influence on the progress and development of the cloud
computing.
2. CLOUD COMPUTING
The cloud computing offers resource services in order to provide space for storage. The Email is
an example that shows the concept of cloud computing where you use resources to store your
messages, and these resources are not on your PC but on a resource somewhere else unknown to
the user [7]. The cloud spreads on several levels, including the private, local, public and mixed,
while the service models include (PAAS), (IAAS) and (SAAS) [8].
2.1 CHARACTERISTICS OF CLOUD COMPUTING
The mechanism of action of cloud computing is on-demand self-service. One can access the
cloud through multiple devices such as cellular’s, computers and workstations, where resource
pooling is conducted by using a multi-tenant model, though the users cannot know where the
available resources are. The cloud provides resources in a flexible and fast manner in line with
consumer demand and while providing resources the cloud tracks the service measurement. The
controlled cloud computing resources can be measured, and transparency can be provided for
both the service provider and the consumer of the service used. Cloud computing services use
measurement capabilities that enable control and optimal use of resources [9].
3. THE PERFORMANCE OF CLOUD COMPUTING
Performance is an outlet for any system. A definition of performance has been proposed based on
the ISO 25010 scale where the performance of cloud computing system is determined by
analyzing the properties involved in the performance of an effective and reliable service to meet
the needs mentioned under and within the maximum transaction system boundary conditions.
Measures and standards are applied to the three elements of users, suppliers and supervisors.
Figure (1) shows that each output system is based on several possibilities, that is, the system may
provide a service correctly or incorrectly, or the service may be altogether rejected and this
affects the performance of the system [10].
Figure 1. Computerized computing system outputs
Cloud computing is one of the distributed systems which deals with dispersed resources and is
based on processing big size data and this need called for the performance control and analysis
3. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 5,No. 5/6, December 2015
19
techniques to develop them, that is to say cloud control is important for both users and service
providers. It provides information and indicators of performance, where that performance level
affects the adoption of cloud services by users [11]. Performance is among the advantages that
should be available in the cloud services because performance has an impact on users and service
providers. To evaluate performance, we must take into account several criteria to evaluate the
factors that affect the performance of cloud computing, including the average response per unit
time and the average waiting time per unit time and others [12] in the properties of performance
measures of the cloud.
(SaaS) Evaluation is made by users directly depending on the performance measures, the
speed of response, reliability of technical services and availability.
(PaaS) Evaluation is made by users directly or indirectly depending on the performance
measures in response to technicality, productivity, reliability, technical service and
middleware capability.
(IaaS) The performance measures are determined depending on the infrastructure
performance, capacity, reliability, availability, and scalability [13].
3.1 PERFORMANCE METRICS
There are several options for the measures of performance of the cloud computing by service
providers: delay in service and accuracy. The performance and evaluation are measured
depending on the responsiveness time, productivity, and timing in implementing tasks, that is,
processing tasks in the appropriate period. There are other measures as in Table 1.
Table 1. The future of service performance in the cloud [14]
Features Description Metrics
Communication
Exchange data between internal
service or external consumer in
cloud
Packet loss Frequency
Connection on Error Rate
MPI Transfer bit/Byte Speed
Computation
The Computing Data or Task
processing in the cloud systems
CPU load (%)
Benchmark OP(FLOP) Rate
Instance Efficiency (% CPU Peak)
Memory
Designed for rapid use of
temporarily store information that
may be obtained from slow–
access hard disk drive
Mean Hit Time(s)
Memory bit /Byte speed
(MB/s,GB/s)
Random Memory Update Rate
Response Time (ms)
Time
Project completion within time
while maintaining quality is very
important for the success of
project
Computation time
Communication time
The (SLA) agreement restricts customers and cloud service providers. The level of service or
quality of service (QOS) must be taken into account. The service performance is characterized by
the response time, productivity, availability, and security [15]. The Quality of Service (QoS) in
the cloud indicates the level of performance and reliability, despite the fact that the characteristics
of quality of service received attention before the evolution of cloud computing, performance,
homogeneity and other standards [16]. Speed is one of the (QoS) features that have been
designated by (EG 202 009-1). It is the performance standard which represents the time interval
4. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 5,No. 5/6, December 2015
20
necessary to perform a function or average at which the function and security are achieved, that
is, any service capability to ensure the confidentiality of a piece of information you worked with,
exchanged or stored, the privacy of communications, authenticity and safety of exchanged or
stored information, as well as the protection of the user and his communication means against any
kind of threat, in addition to other qualities of accuracy, reliability, flexibility and ease of use
[17]. There are several risks and threats facing users when they make use of the cloud services.
They are increasing in the case when the service provider or resources exist outside the regional
scope, that is, they are under different laws. In relation to the adoption of the cloud in higher
education, there are some challenges such as security, performance, efficiency and control [18].
Figure (2) shows that the (IDC) analysis considers performance as the second largest case after
security in the cloud environment. The performance metrics is based on applications capabilities,
where the performance weakens due to a lack of resources, disk space, limited bandwidth, low
CPU speed, memory, and network connections [18].
Figure 2. Rate of issues and challenges attributed to the cloud in the application form
4. SECURITY IN CLOUD COMPUTING
Security in the cloud computing is a highly sensitive and important factor, because the cloud
deals with sensitive and confidential data in the cloud data centers. Therefore, protection and
integrity of the data is the duty of providers of cloud services. Privacy and the security of cloud
computing depend on the cloud service provider to put strong security controls and the policy of
sound privacy to protect the data of its customers. This is because customers need confidence and
transparency in terms of performance and security [19]. The cloud providers offer services to
several organizations located in the same network, which grants access to the data without
permission by another organization working in the same field of cloud data centers. In addition to
that, physical security Judgments from the cloud service provider are regarded a source of
concern [20].
The data protection in the cloud is an important security issue and should be taken into account in
this issue in terms of the way they are accessed, stored, audit requirements and the cost of data
5. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 5,No. 5/6, December 2015
21
breaches [21]. Privacy is one of the issues of security in the cloud, and so specialists in the
development of the security services and practices of privacy in cloud services are a must. An
effective evaluation strategy which covers data protection, compliance, privacy, and identity
management, secure operations, and other relevant legal issues must be put forward [22]. There
are concerns about privacy and security associated with the breach of privacy, access and use of
information stored in the cloud for malicious purposes, and this is up to organizations that
provide the services [23].
The cloud computing determines the characteristics and performance metrics between providers
and customers through Service Level Agreements (SLAs), which are concerned with the legal
basis for the services and the level of quality of the service [24]. Non-compliance with Service
Level Agreement (SLA) by this cloud service providers leads to the slow rate of adoption and to a
decline in the level of performance, in addition to concerns about the security and confidentiality
of the data stored in the cloud, as well as privacy [25]. The Service Level Agreements are
describe different measure scales on the basis of Quality of Service (QoS) [26]. The cloud
proceeds, but this progress is confronted by obstacles in the field of Quality of Service (QoS)
which is an indicator of the levels of performance, reliability, and availability of security [27].
Performance is wide; it includes reliability, energy efficiency and expansion. The cloud
computing environments are also wide and combine multiple providers and users resources. Here,
there is the security factor affecting the performance and through the security impact on the
network infrastructure as, for example, is the case with the DDoS attacks which have a broad
impact on network performance. If this risk or any risks that threaten the cloud environment
itself, they will be a major concern for users and providers [28]. These attacks are harmful to the
computing. Inoculating SQL attack allows the attacker access to the database. Also, in flood
attacks the attacker sends a request for resources to the cloud so quickly that he takes advantage
of the ability of any inaccessible resources by ordinary users and here many attacks that threaten
the security of the cloud happen [29]. Security is an important priority to the cloud customers.
The decision to make use of cloud services will be based on the level of confidentiality, integrity,
flexibility, and security services available, and this is an indication to the competition among the
service providers that leads to the development of cloud computing [30].
There are some problems facing the cloud computing users, in terms of access to the data through
the Internet; any weakness in the level of security in the cloud is threatening the confidentiality of
users data stored. Moreover, the quality of the connection affects the level of performance in the
delivery of services, the high cost of private computerized computing compared with public and
mixed sectors, at the expense of quality, performance and security [31].
5. THE RELATIONSHIP BETWEEN PERFORMANCE AND SECURITY
The developing scale in any computerized system is based on the level of performance of the
system, but there is a relationship between security and performance. Performance is an indicator
to speed of implementation and exchange of data while security indicates the protection from
threats. Both depend on the components of the system software and hardware on the one hand,
and on the user and service provider on the other hand. Security is considered one of efficiency
standards where efficiency is the main indicator of the level of performance, while the
performance is an auxiliary element in the protection of the system. As a corollary, the
relationship between performance and security is complementary to each and is a key factor to
the development of the system.
Cloud computing provides services to users through service providers; the user submits a service
request, where the service provider responds by providing the service. However, this process is
based on an agreement between the two parties, in the light of which contact and making use are
6. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 5,No. 5/6, December 2015
22
made. This agreement is called Service Level Agreement (SLA). Moreover, there are other
inevitable issues between the user and the service provider, such as security and performance of
the service which are factors that affect the acceptance of the user to make use of cloud services.
Figure 3. The relationship between performance and security in the cloud
Figure 3 shows the relationship between security and performance in the cloud. Security and
performance are prerequisites for the user, and therefore the service provider is obliged to make it
available to the user, while the performance on the part of the user is not obligatory because the
user does not know where the data is stored and has no control over the data. Nevertheless,
security is imperative to the user where the user represents a security breach in the cloud in case
he did not the follow security policy, that is, the user may cause the low level of security and this
leads to a low level performance of services. Also, if the low level of security affects
performance, and according to the performance scale, the performance will influence the security
on the part of the service provider.
In light of this we conclude that security and performance represent challenges in the cloud
because each is a challenge to the other. Better security means better and better performance is
better security which means that the relationship is a positive one. Performance and security for
the service are a requirement at the user and provider level, while the data are on the provider and
agreement level. This is because the user does not known the storage place and does not have
control over the data as in Figure (4)
7. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 5,No. 5/6, December 2015
23
Figure 4. The level of impact between performance and security in cloud computing
6. CONCLUSION
The relationship between performance and security is a positive one. Security affects
performance and on the other hand, the level of performance by the user, the provider and the
components of the cloud affect the security. They both affect the customer's confidence in the
adoption of the cloud, and this is an indicator that affects the development and progression of the
cloud and the light of this, the level of security and performance is considered a challenge and an
obstacle to the progress and development of cloud computing .
7. FURTHER RESEARCH
The cloud computing is progressing but there are several factors and challenges to the user
adoption of the cloud computing technology. Therefore, Technology Acceptance Model (TAM)
will be taken as a model in the creation of the research model to show the user's adoption of cloud
computing as in Figure (5). Performance and security are regarded as basic factors and challenges
that affect the user's adoption of cloud computing technology.
H1: Security affects performance which depends on a high or low security level.
The impact of the level of security by the user and the provider; in case of high-level security, this
leads to raise the level of performance of the cloud computing, where the security level depends
on external factors, including the security risks, the confidentiality of data, service level
agreement and physical security.
H2: The level of performance by the service provider affects the level of security.
in case of high-level performance, this leads to the lifting the security level of the cloud
computing, where that performance level depends on external factors such as security threats,
data confidentiality, laws and regulations, service level agreement, and communication line .
8. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 5,No. 5/6, December 2015
24
Security is regarded a major challenge in adopting cloud computing; it is the main barrier that
prevents companies from the adoption of cloud computing. In fact, a cloud with unsafe
infrastructure can lead to problems between the adopter and specialists such as customers,
partners, providers or even the government [32]. The level of service in the cloud computing is
important because the service level scale is based on the performance level. If the level of
performance is high, it is a sign to the speed and quality of service, leading to user satisfaction
and adoption of the cloud to make use of its electronic service [33].
Figure 5. Research model
REFERENCES
[1] Dev, R Pande. & Gauri Sh Kushwaha, (2015) “Cloud Computing for Digital Libraries in
Universities”, (IJCSIT) International Journal of Computer Science and Information Technologies,
Vol. 6, No. 4, pp 3885-3889.
[2] Swati Gupta & Kuntal Saroha, Samiksha Mehta, (2011) “Distributed Computing: An Emerging
Paradigm for New Technologies”, IJCSMS International Journal of Computer Science and
Management Studies, Vol. 11, pp 155-164.
[3] Judith Hurwitz & Alan Nugent, Fern Halper, (2013) Marcia Kaufman, Big Data For Dummies, Social
Network, John Wiley & Sons.
[4] Four Key Elements of a Secure, High-Performance Hybrid Cloud Networking Strategy Delivering an
optimized bridge to the cloud with Citrix Cloud Bridge, Cloud Bridge White Paper 2012.
https://www.citrix.com.
[5] Secure, private, and trustworthy: enterprise cloud computing with Force.com, White Paper 2013.
[6] Malvinder Singh Bali & Shivani Khurana, (2013)” Performance Analysis of Cloud Computing under
the Impact of Botnet Attack”, Proceedings in International Conference on Recent Trends in
Communications and Computer Network.
[7] Anurag S. Barde, (2013) “Cloud Computing and Its Vision 2015!!” International Journal of Computer
and Communication Engineering, Vol. 2, No. 4.
[8] Chang, V , “Delivery and Adoption of Cloud Computing Services in Contemporary Organizations
”Information and communication sciences“, IGI Global, 2015.
[9] Gupta & Manish, “Handbook of Research on Emerging Developments in Data Privacy “, IGI Global,
2014.
9. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 5,No. 5/6, December 2015
25
[10] Bautista L., Abran A. and April A., (2012) “Design of a Performance Measurement Framework for
Cloud Computing”, Journal of Software Engineering and Applications, Vol. 5, No. 2, pp 69-75.
[11] Giuseppe Aceto & Alessio Botta, (2013)” Cloud monitoring: A survey” Elsevier computer network,
Vol. 57, No.9, pp 2093–2115.
[12] Niloofar Khanghahi & Reza Ravanmehr, (2013)” Cloud Computing Performance Evaluation: Issues
And Challenges”, International Journal on Cloud Computing: Services and Architecture (IJCCSA),
Vol.3, No.5.
[13] Shailesh Paliwal, (2014) “Performance Challenges in Cloud Computing”, https://www.cmg.org
[14] Amid, K Bardsiri & Seyyed, M Hashem, (2014) “QoS Metrics for Cloud Computing Services
Evaluation”, International Journal of Intelligent Systems and Applications, Vol. 6, No. 12, pp 27-33.
[15] Elisabeth Stahl & Lydia Duijvestijn and others, (2012) “Performance Implications of Cloud
Computing”, ibm.com/Redbooks pp 4875.
[16] Danilo Ardagna & Giuliano Casale and others (2012), “Quality-of-service in cloud computing:
modeling techniques and their applications”, Journal of Internet Services and Applications a Springer,
Vol.5, No. 11.
[17] Technical Report ,“CLOUD; SLAs for Cloud services”,ETSI TR 103 125 V1.1.1 (2012),
http://www.etsi.org/
[18] Cloud computing in higher education a guide to evaluation and adopting- Cisco 2010.
https://www.cisco.com/web/strategy/docs/education/Cloud_Computing_in_Higher_Education.pdf
[19] Shirley Radack, (2012) “Cloud Computing: A Review of Features, Benefits, and Risks, and
Recommendations for Secure, Efficient Implementations”. http://www.itbusinessedge.com
[20] April Reeve, (2013) “Managing Data in Motion: Data Integration Best Practice Techniques”, Elsevier
Science Technology.
[21] Avinash R. Dhok & Ashwini P. Kolhe, (2015) “A Survey on Scalable Data Security and Load
Balancing in Multi Cloud Environment”, IJIRST –International Journal for Innovative Research in
Science & Technology, Vol. 1 , No. 8, pp 232:236.
[22] Sherin Sreedharan & G.Kalpana, (2013) “Security Issues and Solutions for Cloud Computing”,
International Journal of Computer Trends and Technology (IJCTT), Vol.4, No.4, pp 494-498.
[23] Nir Kshetri, (2013) “Privacy and security issues in cloud computing: The role of institutions and
institutional evolution”, Telecommunications Policy, vol. 37, No. 4, pp 372-38.
[24] Stefan Frey & Claudia Luthje, and Christoph Reich, (2013) “Key Performance Indicators for Cloud
Computing SLAs”, the Fifth International Conference on Emerging Network Intelligence, pp 60-64.
[25] Safiya Okai & Mueen Uddin and Amad Arshad, Raed Alsaqour, Asadullah Shah, (2014) “Cloud
Computing Adoption Model for Universities to Increase ICT Proficiency”, SAGE Open, Vol.4, No.3,
pp 1-10.
[26] K. Vaitheki, (2014) “A SLA violation reduction technique in Cloud by Resource Rescheduling
Algorithm (RRA)”, International Journal of Computer Application and Engineering Technology Vol.
3, No.3, pp. 217-224.
[27] Danilo Ardagna & Giuliano Casale and Michele Ciavotta, Juan F Pérez and Weikun Wang, (2014)
“Quality-of-service in cloud computing: modeling techniques and their applications”, Journal of
Internet Services and Applications springeropen.com, Vol. 5, No.11, pp 1-17.
[28] Niloofar Khanghahi & Reza Ravanmehr, (2013)” cloud computing performance evaluation: issues
and challenges”, International Journal on Cloud Computing: Services and Architecture (IJCCSA),
Vol.3, No.5,pp 29-41.
[29] Sara Qaisar & Kausar Fiaz Khawaja, (2012) “Cloud Computing: Network/Security Threats and
counter measures”, Interdisciplinary Journal of Contemporary Research in Business, ijcrb.webs.com,
January, Vol. 3, No.9, pp 1323 – 1329.
[30] Zaigham Mahmood, (2014) “Cloud Computing: Challenges, Limitations and R&D Solutions”,
Springer.
[31] Heru Susanto & Mohammad Nabil Almunawar and Chen Chain Kang, (2012) “Toward Cloud
Computing Evolution: Efficiency vs Trendy vs Security”, Computer Science Journal.
[32] M. Z. Nkhoma and D. P. T. Dang, (2013) "Contributing Factors of Cloud Computing Adoption: a
Technology-Organization-Environment Framework Approach," International Journal of Information
Systems and Engineering (IJISE), Vol. No.1, pp. 38- 49.
[33] Tobias Ackermann, (2012)” IT Security Risk Management: Perceived IT Security Risks in the
Context of Cloud Computing”, Springer Science & Business Media.
10. International Journal on Cloud Computing: Services and Architecture (IJCCSA) ,Vol. 5,No. 5/6, December 2015
26
AUTHOR
Dr. Nabeel Mohammed Zanoon, He received his PhD in Computer Systems
Engineering, from South West State University, Kursk, Russia, in 2011. He is faculty
member with Al-Balqa’ Applied University since 2011; where he is currently Assistant
professor and Head of the Department of Applied Sciences as well as Director of the
ICDL Computer Centre and Cisco Academy Branch of Aqaba University College. He
has published several research in several areas, Security of E-Banking, Algorithm
Scheduling in Grid and Cloud, Meta-Grammar, Hardware and Architecture , Fiber
optical , Mobile Ad Hoc Networks.