Cloud Computing Security
22,737 Followers
Recent papers in Cloud Computing Security
The idea of Homomorphic encryption is to make sure data confidentiality in messages, storage or in utilize by processes with methods similar to conventional cryptography, but with additional abilities to compute over encrypted data,... more
Data protection concerns have been identified as one of the most serious barriers for the deployment and development of cloud computing. 1 There is a general lack of regulation and policy on a European (EU) level. The Data Protection... more
— The cloud is no longer in future, it’s here today. The cloud has fundamentally changed the landscape of computing. Governments are facing critical challenge of improving resource utilization, increase service responsiveness, distributed... more
This research aims to analyze the current security vulnerabilities in cloud computing, study and identify the current preventive measure used in cloud computing as well as to determine the possible areas for improvement in terms of... more
Salesforce is a very hot cloud computing technology in the IT industry, which is available on the cloud, with no need to install any software as well as no hardware required. Salesforce is one on-demand CRM, which runs on the platform, as... more
Lack of alignment between information technology (IT) and the business is a problem facing many organizations. Most organizations, today, fundamentally depend on IT. When IT and the business are aligned in an organization, IT delivers... more
In the light of the rapidly changing and benefits brought by cloud computing, the study is to find the critical factors that may hinder the benefits of cloud adoption, with respective measures proposed. It was found that control... more
Medical devices are becoming a major point of attack in the healthcare industry. In today's healthcare environment, medical devices send their data directly to the cloud. Medical devices can send data directly to the Electronic Health... more
Summary: 1 - Cloud Computing Security Monitoring 2 - Federated Identity for Cloud Computing 3 - Risk Analysis for Cloud Computing 4 - Secure Internet of Things
This paper aims to provide key insights into the privacy issues and internal threats that come to hamper SMEs by adopting cloud computing for their business functions. The results obtained through detailed study of reasons behind SMEs... more
Cloud Computing is an emerging technology. It is a growing technology which can change traditional IT systems. It plays a major role in today's technology sector. People are using it every day through one way or another. Education... more
In last two decades continues increase of comput-ational power and recent advance in the web technology cause to provide large amounts of data. That needs large scale data processing mechanism to handle this volume of data. MapReduce is a... more
Cloud computing transforms the way Information Technology (IT) is consumed and managed, promising improved cost efficiencies, accelerated innovation, faster time-to-market, and the ability to scale applications on demand (Leighton, 2009).... more
Cloud computing is advantageous for customers and service providers. However, it has specific security requirements that are not captured by traditional access control models, e.g., secure information sharing in dynamic and collaborative... more
Cloud Computing is the new trend in Information Technology in recent years. It has attracted many clients, organizations and businesses due to its advantages of scalability, throughput, easy and cheap access and on demand. Cloud has the... more
Cloud computing technology offers the possibility of inter-organizational medical data sharing at a larger scale. The different organizations can maintain their own cloud environment while exchanging healthcare data among them in a... more
Inspired by the dramatic evolution of VANETclouds, this paper proposes a new VANET-cloud service called VWaaS (Vehicle Witnesses as a Service) in which vehicles moving on the road serve as anonymous witnesses of designated events such as... more
Understanding cloud computing: legal risks and components. Cloud legal and compliance issues. Workshop covered data ownership, privacy, security, and compliance.
Computing is changing frequently to serve the user’s needs for security and reducing a dependency which leads researcher to develop newer technologies. Cloud computing is one of those technologies which successfully delivers the service... more
Cloud computing is a growing area of concern in the IT security community because cloud architectures are literally popping up all over. Public clouds are available from Google.com, Amazon.com, Microsoft, Oracle/Sun, Canonical/Eucalyptus... more
Cloud Computing is a newly born type of computation, which depends on the shared resources of the network. Cloud Computing term discovered from that time when the system can access the different types of applications as well as different... more
IEEE Base paper- Identity based secure distributed data storage schemes.
Cloud Computing is emerging amongst all the bombilate words of acclivitous technologies as the most prodigious maturations in the chronicles of computing. As it still takes time to settle,a new egressing challenge as felt whilst its... more
Cloud computing is technique cost-effective, flexible, and convenient in remote access to applications and storage services, making it easy to provide information technology services and business across the Internet. Nevertheless, the use... more
The Cloud Computing concept offers dynamically scalable resources provisioned as a service over the Internet. Economic benefits are the main driver for the Cloud, since it promises the reduction of capital expenditure (CapEx) and... more
In this paper, we investigate the problem of improving the performance and scalability of large firewall policies that comprise thousands of rules by detecting and resolving any potential conflicts among them. We present a novel, highly... more
The purpose of this thesis is to valuate different approaches and methods used in the oil industry, based on theory, research and industrial experience. An evaluation of three oil companies’ safety culture approaches were therefore... more
Information Technology (IT) infrastructure and related research communities can help tackle environmental challenges in developing countries through environmentally sustainable models of economic development. The paper sought to examine... more
The unmatchable progress in Information Technology based Products have encouraged the customers to use free unlimited and ever available cloud storages. The Cloud Storages save hardware investment of customers for storage. Rapid Data... more
Lack of alignment between information technology (IT) and the business is a problem facing many organizations. Most organizations, today, fundamentally depend on IT. When IT and the business are aligned in an organization, IT delivers... more
Cloud computing has gained a lot of publicity in the current IT world. After the internet, Cloud computing is the next big thing in the computer world. Cloud computing is the use of the Internet for the tasks performed on the computer and... more
Cloud computing provides network based access to computing and data storage services on a pay per usage model. Cloud provides better utilization of resources and hence a reduced service access cost to individuals. Cloud services include... more
ABSTACT Fog computing is a prime example that extends Cloud computing and Internet of Things (IoT) application services to the edge of the network. Correlated to Cloud, Fog computing provides data transferring, larger and more immediate... more
Cloud computing is an Internet-based computing and next stage in evolution of the internet. It has received significant attention in recent years but security issue is one of the major inhibitor in decreasing the growth of cloud... more
Cloud computing is the latest distributed computing paradigm and it offers tremendous opportunities to solve large-scale scientific problems. However, it presents various challenges that need to be addressed in order to be efficiently... more
Secure search over encrypted remote data is crucial in cloud computing to guarantee the data privacy and usability. To prevent unauthorized data usage, fine- grained access control is necessary in multi-user system. However, authorized... more
—Cloud computing is a technological breakthrough in computing. It has affected each and every part of the information technology, from infrastructure to the software deployment, from programming to the application maintenance. Cloud... more
Today, human being can " t think of surviving without internet as it becomes the inevitable part of their life where each and everything in this world is connected together with the help of internet. Connectivity is one of the fundamental... more
This article contributes to the foundational understanding of the security vulnerabilities and risk towards wireless grid Edgeware technology. Since communication networks and devices are subject to becoming the target of exploitation by... more
—In previous publications we have introduced the concept of using a component-based software engineering paradigm to build Internet-enabled applications. We have proposed that this design allows for greater flexibility in deployment,... more
Cloud computing provides IT services to users worldwide, Data centers in Clouds consume large amount of Energy leading to highly effective costs. Therefore green energy computing is solution for decreasing operational costs. This survey... more
Cloud computing has captured a major attention of research community to provide efficient data management. SQL query processor based on cloud technology is an effort to introduce high-level needs like graphical interface which includes... more
Citation/Export MLA Aakib F. Bagwan, Bharti A. Gupta , Bhagyashri M. Dhole, Prof. Ashvini Y. Bhamare, “Web Based Image search Using Semantic Signature Re-ranking Technique”, January 15 Volume 3 Issue 1 , International Journal on Recent... more
There has been a growing trend to use the cloud for largescale data storage. It has raised the important security issue of controlling and preventing any unauthorized access of data stored in the cloud. The role-based access control... more
With expanding volumes of knowledgeable production and the variability of themes and roots, shapes and languages, most detectable issues related to the delivery of storage space for the information and the variety of treatment strategies... more