Journal articles on the topic 'Cloud computing · Virtualization · Security · Privacy · Vulnerabilities'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cloud computing · Virtualization · Security · Privacy · Vulnerabilities.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Uddin, Mueen, Anjum Khalique, Awais Khan Jumani, Syed Sajid Ullah, and Saddam Hussain. "Next-Generation Blockchain-Enabled Virtualized Cloud Security Solutions: Review and Open Challenges." Electronics 10, no. 20 (2021): 2493. http://dx.doi.org/10.3390/electronics10202493.

Full text
Abstract:
Cloud computing is a well-known technology that provides flexible, efficient, and cost-effective IT solutions for multinationals to offer improved and enhanced quality of business services to end-users. The cloud computing paradigm is instigated from the grid and parallel computing models. It uses virtualization, server consolidation, utility computing, and other computing technologies and models for providing better IT solutions for large-scale computational data centres. It encompasses different services for supporting data storage, networking, and computing for facilities and amenities for businesses and multinational corporations. The enormous elastic on-demand cloud provisioning resources and services and datasets are processed and stored in tier-level virtualized cloud data centres operated by third-party service providers called cloud owners. The primary issue with these cloud service providers is to provide and maintain data security, privacy, and confidentiality and service availability and data support for end-users. This paper reviews, highlights, and discusses some of the common cloud computing vulnerabilities primarily related to virtualization platforms and their implementations while outsourcing services and resources to different end-users and business enterprises. We then provided blockchain-enabled solutions for virtualized cloud platforms involving both the end-users and cloud service providers (CSP) to address and solve various security and privacy-related vulnerabilities. These solutions will help the data centre industry to improve its virtualized cloud services and resource provisioning facilities. Finally, we discussed different blockchain-related implementation challenges in cloud infrastructures.
APA, Harvard, Vancouver, ISO, and other styles
2

Renjith, E. Jeslin. "Revolutionizing Cloud Security: Innovative Approaches for Safeguarding Data Integrity." FMDB Transactions on Sustainable Computer Letters 2, no. 2 (2024): 111–19. http://dx.doi.org/10.69888/ftscl.2024.000185.

Full text
Abstract:
Cloud computing uses third-party servers or private clouds to provide online services and on-demand enterprise resource access. Microsoft Azure, Amazon, IBM, and Google Apps allow customers to design and run cloud-based apps from anywhere. These cloud services store and retrieve data from faraway servers, highlighting the importance of security due to internet data transfer. Before using cloud computing, firms must handle security issues. Pay-per-use, self-service, and scalability make the model popular in banking, healthcare, retail, education, manufacturing, and business. Pay-per-use models let users use servers, networks, storage, services, and applications without buying them. Limited data control can result in account service issues, traffic hijacking, insecure APIs, malicious insiders, technology sharing issues, and multi-tenancy data failures. Continuous research and development improve security and user confidence. This paper provides a framework for understanding cloud computing, identifies security dangers and research issues, and emphasizes its relevance in major industries. It also recommends cloud security innovations and assesses worldwide data protection policies to improve data security and reduce risks. Cloud-stored data is vulnerable to programs with security weaknesses, notwithstanding its benefits. If the guest OS’s security is unreliable, virtualization on a hypervisor may expose data to attacks. Additionally, data security vulnerabilities in transit and at rest will be addressed.
APA, Harvard, Vancouver, ISO, and other styles
3

Pragya, Rathore, and Mishra Sachin. "5G Security Challenges & Solutions: A Comprehensive Survey." International Journal for Research Trends and Innovation 9, no. 5 (2024): 517–32. https://doi.org/10.5281/zenodo.11568989.

Full text
Abstract:
5G technology offers faster connections than ever before, but it also poses a variety of new security vulnerabilities. 5G is expected to enhance user mobility, and facilitate ultra-reliable and cost-effective networking of a vast array of devices, including the Internet of Things (IoT).  The primary technology accelerators, including Network Function Virtualization (NFV), Software Defined Networking (SDN), and cloud computing, are developing in preparation for their application in 5G.  This paper describes the primary 5G security issues and provides workarounds for these problems. The challenges include network slicing vulnerabilities, a growing attack surface due to the growth of connected devices, insufficient mechanisms for authentication and authorization, and growing privacy concerns. Moreover, supply chain security, interference and jamming, and vulnerability to distributed denial of service (DDoS) attacks pose significant risks. Treatments include using blockchain technology, implementing a zero-trust architecture, and using AI-driven security measures. In this paper, we give a summary of the privacy concerns in 5G as well as the security challenges in these technologies. We also outline future directions for secure 5G systems as well as security solutions to these problems.
APA, Harvard, Vancouver, ISO, and other styles
4

Adi, Maheswara Reddy G. 1. Dr K. Venkata Rao2 Dr JVR Murthy3. "AN EFFECTIVE AND SECURED TECHNIQUE FOR SIDE-CHANNEL ATTACKS IN CLOUD." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 11 (2017): 226–33. https://doi.org/10.5281/zenodo.1049426.

Full text
Abstract:
Nowadays in cloud based business services have risks of side channel attacks. Cache-based side channel attack, cross-VM side channel attacks are the serious threat and security pitfall under same cloud network services. In order to provide more security and less infrastructure investment leads to challenging task. In this paper, the discussions on various levels of attacks on VM ware based solution under same cloud network computing, vulnerabilities to other cloud services, security weakness and counter measures in cryptographic algorithms.
APA, Harvard, Vancouver, ISO, and other styles
5

Misono, Masanori, Dimitrios Stavrakakis, Nuno Santos, and Pramod Bhatotia. "Confidential VMs Explained: An Empirical Analysis of AMD SEV-SNP and Intel TDX." Proceedings of the ACM on Measurement and Analysis of Computing Systems 8, no. 3 (2024): 1–42. https://doi.org/10.1145/3700418.

Full text
Abstract:
Confidential computing is gaining traction in the cloud, driven by the increasing security and privacy concerns across various industries. Recent trusted hardware advancements introduce Confidential Virtual Machines (CVMs) to alleviate the programmability and usability challenges of the previously proposed enclave-based trusted computing technologies. CVM hardware extensions facilitate secure, hardware-isolated encrypted VMs, promoting programmability and easier deployment in cloud infrastructures. However, differing microarchitectural features, interfaces, and security properties among hardware vendors complicate the evaluation of CVMs for different use cases. Understanding the performance implications, functional limitations, and security guarantees of CVMs is a crucial step toward their adoption. This paper presents a detailed empirical analysis of two leading CVM technologies: AMD Secure Encrypted Virtualization-Secure Nested Paging (SEV-SNP) and Intel Trust Domain Extensions (TDX). We review their microarchitectural components and conduct a thorough performance evaluation across various aspects, including memory management, computational performance, storage and network stacks, and attestation primitives. We further present a security analysis through a trusted computing base (TCB) evaluation and Common Vulnerabilities and Exposures (CVE) analysis. Our key findings demonstrate, among others, the effect of CVMs on boot time, memory management and I/O, and identify inefficiencies in their context switch mechanisms. We further provide insights into the performance implications of CVMs and highlight potential room for improvement.
APA, Harvard, Vancouver, ISO, and other styles
6

Bobda, Christophe, Joel Mandebi Mbongue, Paul Chow, et al. "The Future of FPGA Acceleration in Datacenters and the Cloud." ACM Transactions on Reconfigurable Technology and Systems 15, no. 3 (2022): 1–42. http://dx.doi.org/10.1145/3506713.

Full text
Abstract:
In this article, we survey existing academic and commercial efforts to provide Field-Programmable Gate Array (FPGA) acceleration in datacenters and the cloud. The goal is a critical review of existing systems and a discussion of their evolution from single workstations with PCI-attached FPGAs in the early days of reconfigurable computing to the integration of FPGA farms in large-scale computing infrastructures. From the lessons learned, we discuss the future of FPGAs in datacenters and the cloud and assess the challenges likely to be encountered along the way. The article explores current architectures and discusses scalability and abstractions supported by operating systems, middleware, and virtualization. Hardware and software security becomes critical when infrastructure is shared among tenants with disparate backgrounds. We review the vulnerabilities of current systems and possible attack scenarios and discuss mitigation strategies, some of which impact FPGA architecture and technology. The viability of these architectures for popular applications is reviewed, with a particular focus on deep learning and scientific computing. This work draws from workshop discussions, panel sessions including the participation of experts in the reconfigurable computing field, and private discussions among these experts. These interactions have harmonized the terminology, taxonomy, and the important topics covered in this manuscript.
APA, Harvard, Vancouver, ISO, and other styles
7

N, Saravanan, and Umamakeswari A. "Security Vulnerabilities of Virtualization Technique." International Journal of Engineering & Technology 7, no. 2.24 (2018): 478. http://dx.doi.org/10.14419/ijet.v7i2.24.12140.

Full text
Abstract:
Cloud computing is a computing model for delivering resources in a convenient manner from a shared pool. The resources provisioned and released on an on-demand basis with minimal intervention of service provider. Cloud Computing is becoming the platform for all kind of web based services. Virtualization is the key concept to adopt the cloud computing. Virtualization offers many benefits comparing to real physical machine implementation infrastructure. Even though virtualization provides lots of benefits, it is also brings several security vulnerabilities. This paper presents the security breaches of various virtualization techniques that are applied in virtual machines, in which health care records maintained.
APA, Harvard, Vancouver, ISO, and other styles
8

Sabir Abbas and Shan-e-Zahra. "Review on Huawei Fusion Sphere Security." Lahore Garrison University Research Journal of Computer Science and Information Technology 2, no. 2 (2018): 32–37. http://dx.doi.org/10.54692/lgurjcsit.2018.020234.

Full text
Abstract:
The cloud computing virtualization stage, services as another method for giving computing resources, gives clients available and financially savvy benefits, and brings hazards in the meantime. In this way, ensuring the privacy, trustworthiness, and accessibility of client information turns out to be significantly more basic to distributed computing frameworks. Huawei gives the virtualization stage security answers to confront the dangers and difficulties postured to the distributed computing framework. This article portrays the techniques and measures received by Huawei cloud computing virtualization stage to react to the security dangers and dangers to distributed computing frameworks. Huawei cloud computing virtualization stage is intended to give secure and solid server virtualization solutions for clients.
APA, Harvard, Vancouver, ISO, and other styles
9

Saugatdeep, Ranabhat, Alexey N. Nazarov, and Tuleun Terhemen Daniel. "VIRTUALIZATION SECURITY: A GATEWAY TO SECURE CLOUD COMPUTING." SYNCHROINFO JOURNAL 8, no. 6 (2022): 2–9. http://dx.doi.org/10.36724/2664-066x-2022-8-6-2-9.

Full text
Abstract:
Lately, the most efficient solution for an organization and individual of internet based distributed computing platforms is cloud computing. Processing, storage, and data management are just a few of the useful services that end users can get from cloud computing. However, it raises a lot of issues with privacy and security which needs to be resolved. Major component of cloud computing is virtualization technology, which helps to develop complex cloud services based on the externalization and composition of these resources. The primary concern with cloud computing security is virtualization security. The collective measures and methods that ensure the safety of a virtualization environment are referred to as virtualization security. It tackles the security risks that virtualized components encounter, as well as techniques for mitigating or preventing them. In recent days, attacks are mainly aimed either to the virtualization architecture or the infrastructure. We prefer to examine the security holes associated with virtualization in this paper and how concentrating on virtualization security might ultimately result in safeguarding cloud computing platform. Through this paper we tend to highlight the recent progress and an overview of the existing works performed on various dimensions of the cloud security. We conclude our paper by making several recommendations with respect to the attack vector for supporting cloud protection with a mathematical LP model.
APA, Harvard, Vancouver, ISO, and other styles
10

Zhou, Guo Hong. "Study of Cloud Computing and Advanced Manufacturing Technology under Information Technology Development." Applied Mechanics and Materials 484-485 (January 2014): 227–30. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.227.

Full text
Abstract:
Cloud computing can be regarded as the integration of grid computing and virtualization technology: namely the use of grid distributed computing processing power of IT resources and build into a resource pool, plus on a mature server virtualization, storage virtualization technology make users can real-time monitoring and deployment of resources. Cloud computing and advanced manufacturing technology is facing many challenges during the process of development in the future, including security and privacy will become a primary issue. This study focused on relations with the important areas of emerging industries, the fast scheduling network resources in the cloud computing and advanced manufacturing technology key issues, as well as cloud computing security management issues related to cloud computing and advanced manufacturing technology.
APA, Harvard, Vancouver, ISO, and other styles
11

Avneet, kaur, Gaurav Gupta Dr., and Gurjit Singh Bhathal Dr. "ROLE OF VIRTUALIZATION IN CLOUD COMPUTING." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 4, no. 7 (2017): 143–50. https://doi.org/10.5281/zenodo.835421.

Full text
Abstract:
Cloud Computing is the fundamental change happening in the field of Information Technology.. Virtualization is the key component of cloud computing. With the use of virtualization, cloud computing brings about not only convenience and efficiency benefits, but also great challenges in the field of data security and privacy protection. .In this paper, we are discussing about virtualization, architecture of virtualization technology as well as Virtual Machine Monitor (VMM). Further discussing about technique of virtualization, reasons to use virtualization, Pros and Cons of Traditional Server Concept and Virtual Server Concept and lastly discuss about the application virtualization and its techniques .This paper show importance of virtualization technology that can simplify IT operations as well as allow IT organizations to respond faster to changing business demands
APA, Harvard, Vancouver, ISO, and other styles
12

Annane, Boubakeur, and Osman Ghazali. "Virtualization-Based Security Techniques on Mobile Cloud Computing: Research Gaps and Challenges." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 04 (2019): 20. http://dx.doi.org/10.3991/ijim.v13i04.10515.

Full text
Abstract:
The principle constraints of mobile devices are their limited resources such as processing capability, storage space and battery life. While cloud computing offers a vast computing resources services. A new idea emerged by including the cloud computing into mobile devices to augment the capacities of the mobile devices resources such as smartphones, tablet, and other personal digital assistant (PDA) which provides a robust technology called Mobile Cloud Computing (MCC). Although MCC have brought many advantages for the mobile users, it also stills suffer from security and privacy side of data while hosted on virtual machines (VM) on remote cloud’s servers. Currently, the eyes of the security expert’s community turned towards the virtualization-based security technique either on the Cloud or on the mobile devices. The new challenge is to develop secure methods in order to authenticate high sensitive digital content. This paper investigates the main challenges regarding the security and privacy issues in mobile cloud exactly focusing on the virtualization issue layer and give clear strengths and weaknesses of recent relevant virtualization security techniques existing in the literature. Hence, the paper provides perspectives for researchers in order to achieve as a future work.
APA, Harvard, Vancouver, ISO, and other styles
13

Kumar, K. Dinesh, and E. Umamaheswari. "AN AUTHENTICATED, SECURE VIRTUALIZATION MANAGEMENT SYSTEM IN CLOUD COMPUTING." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 45. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19544.

Full text
Abstract:
Cloud computing is one of the trending technologies that provide boundless virtualized resources to the internet users as an important services through the internet while providing the privacy and security. Using these cloud services, internet users get many parallel computing resources at low cost. It predicted that till 2016, revenues from the online business management spent $4 billion for data storage. Cloud is an open-source platform structure, so it is having more chances to malicious attacks. Privacy, confidentiality, and security of stored data are primary security challenges in cloud computing. In cloud computing, “virtualization” is one of the techniques dividing memory into different blocks. In most of the existing systems, there is only single authority in the system to provide the encrypted keys. To fill the few security issues, this paper proposed a novel authenticated trust security model for secure virtualization system to encrypt the files. The proposed security model achieves the following functions: (1) allotting the VM security monitor model for each virtual machine and (2) providing secret keys to encrypt and decrypt information by symmetric encryption.The contribution is a proposed architecture that provides a workable security that a cloud service provider can offer to its consumers. Detailed analysis and architecture design presented to elaborate security model.
APA, Harvard, Vancouver, ISO, and other styles
14

Kumar, Sarvesh, Himanshu Gautam, Shivendra Singh, and Mohammad Shafeeq. "Top Vulnerabilities in Cloud Computing." ECS Transactions 107, no. 1 (2022): 16887–99. http://dx.doi.org/10.1149/10701.16887ecst.

Full text
Abstract:
Cloud computing is rising quickly and without uncertainty it is the new generation of technology where people will utilize whenever and wherever. In this web-based world, cloud computing is rising higher by giving everything to the necessary assets, applications, programming, equipment, registering capacity to figuring foundations, business procedure to control joint effort. Today clouds with virtualization are changing IT. Separated by their prominences it has a few concerns which are turning out to be complications for its more extensive selection. Being a relatively newer technology, cloud computing comes with its own array of security vulnerabilities and new perspectives for attacks to happen. Major cloud providers already have infrastructure with tools and services in place designed to improve security in the cloud and the overall performance. There are a few vulnerabilities that have arisen in the previous decade that have managed to slip by unnoticed. These have caused a great deal of damage to cloud infrastructure and its overall reputation. This paper focuses on how these specific vulnerabilities affect different cloud computing environments and how to resolve them.
APA, Harvard, Vancouver, ISO, and other styles
15

Zoughbi, Dina Mohsen, and Nitul Dutta. "Hypervisor Vulnerabilities and Some Defense Mechanisms, in Cloud Computing Environment." International Journal of Innovative Technology and Exploring Engineering 10, no. 2 (2020): 42–48. http://dx.doi.org/10.35940/ijitee.b8262.1210220.

Full text
Abstract:
Cloud computing is the most important technology at the present time, in terms of reducing applications costs and makes them more scalable and flexible. As the cloud currency is based on building virtualization technology, so it can secure a large-scale environment with limited security capacity such as the cloud. Where, Malicious activities lead the attackers to penetrate virtualization technologies that endanger the infrastructure, and then enabling attacker access to other virtual machines which running on the same vulnerable device. The proposed work in this paper is to review and discuss the attacks and intrusions that allow a malicious virtual machine (VM) to penetrate hypervisor, especially the technologies that malicious virtual machines work on, to steal more than their allocated quota from material resources, and the use of side channels to steal data and Passing buffer barriers between virtual machines. This paper is based on the Security Study of Cloud Hypervisors and classification of vulnerabilities, security issues, and possible solutions that virtual machines are exposed to. Therefore, we aim to provide researchers, academics, and industry with a better understanding of all attacks and defense mechanisms to protect cloud security. and work on building a new security architecture in a virtual technology based on hypervisor to protect and ensure the security of the cloud.
APA, Harvard, Vancouver, ISO, and other styles
16

Dina, Mohsen Zoughbi, and Dutta Nitul. "Hypervisor Vulnerabilities and Some Defense Mechanisms, in Cloud Computing Environment." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 10, no. 2 (2020): 42–48. https://doi.org/10.5281/zenodo.5835945.

Full text
Abstract:
Cloud computing is the most important technology at the present time, in terms of reducing applications costs and makes them more scalable and flexible. As the cloud currency is based on building virtualization technology, so it can secure a large-scale environment with limited security capacity such as the cloud. Where, Malicious activities lead the attackers to penetrate virtualization technologies that endanger the infrastructure, and then enabling attacker access to other virtual machines which running on the same vulnerable device. The proposed work in this paper is to review and discuss the attacks and intrusions that allow a malicious virtual machine (VM) to penetrate hypervisor, especially the technologies that malicious virtual machines work on, to steal more than their allocated quota from material resources, and the use of side channels to steal data and Passing buffer barriers between virtual machines. This paper is based on the Security Study of Cloud Hypervisors and classification of vulnerabilities, security issues, and possible solutions that virtual machines are exposed to. Therefore, we aim to provide researchers, academics, and industry with a better understanding of all attacks and defense mechanisms to protect cloud security. and work on building a new security architecture in a virtual technology based on hypervisor to protect and ensure the security of the cloud.
APA, Harvard, Vancouver, ISO, and other styles
17

Sowmya, Pappu, and R. Kumar. "AN EFFICIENT APPROACH TO IMPLEMENT FEDERATED CLOUDS." Asian Journal of Pharmaceutical and Clinical Research 10, no. 13 (2017): 40. http://dx.doi.org/10.22159/ajpcr.2017.v10s1.19543.

Full text
Abstract:
Cloud computing is one of the trending technologies that provide boundless virtualized resources to the internet users as an important services through the internet, while providing the privacy and security. By using these cloud services, internet users get many parallel computing resources at low cost. It predicted that till 2016, revenues from the online business management spent $4 billion for data storage. Cloud is an open source platform structure, so it is having more chances to malicious attacks. Privacy, confidentiality, and security of stored data are primary security challenges in cloud computing. In cloud computing, ‘virtualization’ is one of the techniques dividing memory into different blocks. In most of the existing systems there is only single authority in the system to provide the encrypted keys. To fill the few security issues, this paper proposed a novel authenticated trust security model for secure virtualization system to encrypt the files. The proposed security model achieves the following functions: 1) allotting the VSM(VM Security Monitor) model for each virtual machine; 2) providing secret keys to encrypt and decrypt information by symmetric encryption.The contribution is a proposed architecture that provides a workable security that a cloud service provider can offer to its consumers. Detailed analysis and architecture design presented to elaborate security model.
APA, Harvard, Vancouver, ISO, and other styles
18

Chandana Kumari, P. ILA, S. Swarajya Laxmi, B. Rekha, et al. "VMM based Secured Virtualization in Cloud-Computing." Indonesian Journal of Electrical Engineering and Computer Science 4, no. 3 (2016): 643. http://dx.doi.org/10.11591/ijeecs.v4.i3.pp643-648.

Full text
Abstract:
Cloud computing, utility computing, the future will be the main IT field. The government and companies are realizing that foreigners can clearly increase the cloud with minimal costs and maximum flexibility in the plant or existing equipment. But the clouds to ensure user privacy and digital asset management challenge in cloud client. Protection must always contain a performance. The complex is a sure way to end the occupation of the problem, the study suggests two Ebionitism security architecture. The movement and different approaches to health and safety and the level of the best things for their security costs hyper-visor layer to a reduction in order to avoid false alarms
APA, Harvard, Vancouver, ISO, and other styles
19

Journal, IJSREM. "Cloud Computing Security." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 10 (2024): 1–7. http://dx.doi.org/10.55041/ijsrem38330.

Full text
Abstract:
Cloud computing has transformed the IT landscape by providing scalable resources and services over the internet. However, this paradigm shift raises important security issues that need to be addressed to ensure data integrity, privacy and availability. This summary provides an overview of the primary security challenges in cloud computing, including data breaches, unauthorized access rights, and shared infrastructure vulnerabilities. It examines the various strategies and technologies used to mitigate these risks, such as encryption, multi-factor authentication and robust monitoring systems. In addition, he examines the role of compliance and standards in improving cloud security. By reviewing the theoretical and practical aspects of cloud security, this summary aims to highlight current efforts and future directions in fortifying cloud computing environments against emerging threats. Keywords — Cloud Computing, scalable, security issues, shared infrastructure, data breaches.
APA, Harvard, Vancouver, ISO, and other styles
20

Zheng, Luxin, Jian Zhang, Faxin Lin, and Xiangyi Wang. "Feature-Fusion-Based Abnormal-Behavior-Detection Method in Virtualization Environment." Electronics 12, no. 16 (2023): 3386. http://dx.doi.org/10.3390/electronics12163386.

Full text
Abstract:
From general systems to mission-critical systems at financial and government institutions, the application scope of cloud computing services is continuously expanding. Therefore, there is a need for better methods to ensure the stability and security of the cloud data and services. Monitoring the abnormal behavior of virtual machines (VMs) is one of the most-important means to identify the causes of security incidents related to the cloud. However, current traditional abnormal-behavior-detection methods for VMs on cloud platforms face multiple challenges such as privacy protection and the semantic gap. Virtualization technology plays a key role in cloud computing. Meanwhile, virtualization security is the core issue of cloud computing security as well. To address these issues, this paper proposes a feature-fusion-based abnormal-behavior-detection method (FFABD) in a virtualization environment. This method acquires the hardware features and syscalls of the VM at the physical machine level and the virtualization level, respectively. Therefore, this method is not limited by the operating system running on the VM. This makes our method more efficient and universally applicable compared to traditional abnormal-VM-detectionmethods. The ensemble learning model performs the best among all the models, achieving an Accuracy of 99.7%.
APA, Harvard, Vancouver, ISO, and other styles
21

Adil Dheyab, Omar, Ahmed Ibrahim Turki, and B. Rahmatullah B. Rahmatullah. "Threats and Vulnerabilities Affecting the Adoption of Cloud Computing in Iraq." Journal of Social Sciences Research, SPI6 (December 25, 2018): 599–606. http://dx.doi.org/10.32861/jssr.spi6.599.606.

Full text
Abstract:
Cloud computing offers many benefits including enhanced flexibility, disaster recovery, free capital expenditures, automatic software updates, sustainability, and work anytime, anywhere. In addition, many other features and services can be offered to customers. However, cloud computing still suffers many threats which may cause vulnerabilities. Therefore, today many organizations are still hesitant to adopt cloud computing because of fear for privacy of their data and confidentiality. Understanding and addressing security threats are a prerequisite for unleashing the huge potential of cloud computing. In this study, a survey is conducted on some cloud service providers and users to explore security threats and vulnerabilities in cloud computing experienced by many organizations in Iraq. Consequently, many countermeasures are proposed. Descriptive research methodology is adopted in this research. The results of the study showed that privacy, confidentiality, control of data are the main obstacle to cloud computing adoption.
APA, Harvard, Vancouver, ISO, and other styles
22

Narayana, K. E., and K. Jayashree. "Security Analysis of Storage, Virtualization, Infrastructure and Standardization in Cloud Computing." Journal of Computational and Theoretical Nanoscience 17, no. 8 (2020): 3754–58. http://dx.doi.org/10.1166/jctn.2020.9315.

Full text
Abstract:
Nowadays the cloud computing grows in high rate with the help of recent technological advancement. It provides the on demand and low cost services to the customer. Cloud computing distributes the services to various location based on the demand. The services can cross various layers and location which leads the security problem. The existing security system provides reliable solutions which are not enough to secure the resource and services from unauthorized access. Three types of security is available in the cloud namely Infrastructure security, Platform security and application security. The proposed analysis gives the complete information about these security and its issues. Data security management process has various steps for securing the data around the cloud network with reliable access. Virtualization level security is analyzed with different parameter based on the number issues present in the cloud. Authentication types are also identified and analyzed over security level. Various types of cloud framework and vulnerabilities are assessed in order to achieve better security.
APA, Harvard, Vancouver, ISO, and other styles
23

Raja, Vinayak. "Exploring Challenges and Solutions in Cloud Computing: A Review of Data Security and Privacy Concerns." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 4, no. 1 (2024): 121–41. http://dx.doi.org/10.60087/jaigs.vol4.issue1.p141.

Full text
Abstract:
As organizations transition towards cloud computing environments, the significance of security and privacy concerns escalates. This research report conducts a systematic exploration of diverse challenges and vulnerabilities inherent in cloud computing, with a particular emphasis on security and privacy issues. The study extensively evaluates potential threats ranging from data breaches to unauthorized access, and it evaluates the repercussions of these challenges on user trust and data integrity within cloud infrastructure. Moreover, it proposes and discusses effective strategies and solutions aimed at mitigating security risks and safeguarding user privacy in cloud computing. This paper contributes to the ongoing discourse on cloud security and privacy, offering both practitioners and researchers a valuable reference for navigating the dynamic landscape of cloud-based services.
APA, Harvard, Vancouver, ISO, and other styles
24

Raja, Vinayak. "Exploring Challenges and Solutions in Cloud Computing: A Review of Data Security and Privacy Concerns." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 4, no. 1 (2024): 121–44. http://dx.doi.org/10.60087/jaigs.v4i1.86.

Full text
Abstract:
As organizations transition towards cloud computing environments, the significance of security and privacy concerns escalates. This research report conducts a systematic exploration of diverse challenges and vulnerabilities inherent in cloud computing, with a particular emphasis on security and privacy issues. The study extensively evaluates potential threats ranging from data breaches to unauthorized access, and it evaluates the repercussions of these challenges on user trust and data integrity within cloud infrastructure. Moreover, it proposes and discusses effective strategies and solutions aimed at mitigating security risks and safeguarding user privacy in cloud computing. This paper contributes to the ongoing discourse on cloud security and privacy, offering both practitioners and researchers a valuable reference for navigating the dynamic landscape of cloud-based services.
APA, Harvard, Vancouver, ISO, and other styles
25

Zhu, Hui, Yingfang Xue, Xiaofeng Chen, Qiang Li, and Hui Li. "V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service." Mobile Information Systems 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/841292.

Full text
Abstract:
With the pervasiveness of smart phones and the advance of Mobile Internet, more and more Mobile Internet services migrated to the cloud service platform for better user experience. As one of the most indispensable components of the cloud computing infrastructure, virtualization technology has attracted considerable interest recently. However, the flourish of virtualization still faces many challenges in information security. In this paper, we propose a novel architecture, called multilevel and grouping security model for virtualization (V-MGSM), for the security of resources in cloud computing platform. Specifically, to fulfill the balance between information sharing and privacy preservation, the virtual machines (VMs) are divided into diverse groups based on their corresponding entities, and each VM in the same group is assigned to different security level according to security requirements. Besides, the operation between VMs is based on mandatory access control mechanism. Detailed security analysis shows that the proposed V-MGSM can provide a secure communication mechanism for VMs and implement the synchronous updates of the borrowed data. Ultimately, we implement V-MGSM in Xen for experiments, and the results demonstrate that V-MGSM can indeed achieve data security and privacy protection efficiently for Mobile Internet service.
APA, Harvard, Vancouver, ISO, and other styles
26

Djamal, Ziani, and Al-Muwayshir Ruba. "Improving Privacy and Security in Multi-Tenant Cloud ERP Systems." Advanced Computing: An International Journal (ACIJ) 8, no. 5 (2017): 01–15. https://doi.org/10.5121/acij.2017.8500.

Full text
Abstract:
This paper discusses cloud ERP security challenges and their existing solutions. Initially, a set of definitions associated with ERP systems, cloud computing, and multi-tenancy, along with their respective challenges and issues regarding security and privacy, are provided. Next, a set of security challenges is listed, discussed, and mapped to the existing solutions to solve these problems. This thesis aims to build an effective approach to the cloud ERP security management model in terms of data storage, data virtualization, data isolation, and access security in cloud ERP. The following proposed techniques are used to improve the security for multi-tenant SaaS: database virtualization, implementation of data encryption and search functionality on databases and developed systems, distribution of data between tenant and ERP providers, secure application deployment in multi-tenant environments, implementation of the authentication and developed systems together as a two-factor authentication, and improved user access control for multi-tenant ERP clouds.
APA, Harvard, Vancouver, ISO, and other styles
27

Djamal, Ziani, and Al-Muwayshir Ruba. "Improving Privacy and Security in Multi-Tenant Cloud ERP Systems." Advanced Computing: An International Journal (ACIJ) 8, no. 5 (2017): 01–15. https://doi.org/10.5121/acij.2017.8501.

Full text
Abstract:
This paper discusses cloud ERP security challenges and their existing solutions. Initially, a set of definitions associated with ERP systems, cloud computing, and multi-tenancy, along with their respective challenges and issues regarding security and privacy, are provided. Next, a set of security challenges is listed, discussed, and mapped to the existing solutions to solve these problems. This thesis aims to build an effective approach to the cloud ERP security management model in terms of data storage, data virtualization, data isolation, and access security in cloud ERP. The following proposed techniques are used to improve the security for multi-tenant SaaS: database virtualization, implementation of data encryption and search functionality on databases and developed systems, distribution of data between tenant and ERP providers, secure application deployment in multi-tenant environments, implementation of the authentication and developed systems together as a two-factor authentication, and improved user access control for multi-tenant ERP clouds. 
APA, Harvard, Vancouver, ISO, and other styles
28

Kazi, Abdullah A. "Enhancing Security in Cloud Computing: Challenges, Techniques and Future Trends." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50628.

Full text
Abstract:
Abstract - Cloud computing has revolutionized the way organizations store, manage, and process data by offering scalable and on-demand resources. However, this shift to the cloud introduces significant security challenges that demand rigorous attention. Issues such as data breaches, insecure interfaces, insider threats, and regulatory compliance remain major concerns for both cloud service providers and consumers. This paper investigates the key security challenges in cloud computing environments and evaluates the current techniques employed to mitigate these risks. Additionally, it explores emerging trends and technologies, including artificial intelligence, zero-trust architectures, and confidential computing, that are shaping the future of cloud security. The objective is to provide a comprehensive understanding of the cloud security landscape, highlight existing solutions, and identify areas requiring further research and innovation. Key Words: Cloud Computing, Security, Data privacy, Virtualization, Encryption, Authentication
APA, Harvard, Vancouver, ISO, and other styles
29

Motawie, Rola, Mahmoud M. El-Khouly, and Samir Abou El-Seoud. "Security Problems in Cloud Computing." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 4, no. 4 (2016): 36. http://dx.doi.org/10.3991/ijes.v4i4.6538.

Full text
Abstract:
Cloud is a pool of computing resources which are distributed among cloud users. Cloud computing has many benefits like scalability, flexibility, cost savings, reliability, maintenance and mobile accessibility. Since cloud-computing technology is growing day by day, it comes with many security problems. Securing the data in the cloud environment is most critical challenges which act as a barrier when implementing the cloud. There are many new concepts that cloud introduces, such as resource sharing, multi-tenancy, and outsourcing, create new challenges for the security community. In this work, we provide a comparable study of cloud computing privacy and security concerns. We identify and classify known security threats, cloud vulnerabilities, and attacks.
APA, Harvard, Vancouver, ISO, and other styles
30

Ahmed Ibrahim Turki and Qasim Mohammed Hussein. "Solutions of diagnosis of security issues and attacks for storage in cloud computing." Tikrit Journal of Pure Science 23, no. 4 (2018): 118–23. http://dx.doi.org/10.25130/tjps.v23i4.532.

Full text
Abstract:
Cloud computing is technique cost-effective, flexible, and convenient in remote access to applications and storage services, making it easy to provide information technology services and business across the Internet. Nevertheless, the use of cloud computing is an additional source of security risk due to third-party outsourcing, as makes maintaining the privacy, availability and security of data is very difficult. Cloud computing has many of its supporting technologies (virtualization, Web 2.0, service-oriented architecture), which inherits many security issues and makes them susceptible to attacks. Most of the previous work focused on storing data in the cloud without taking security issues and attacks into consideration. In this paper, we provide an analysis of security issues in cloud storage and possible solutions. With regard to the attacks on the data stored in the clouds, parametric comparison including all the details and countermeasures are provided. Finally, this paper provides a significant contribution to building a secure cloud environment for data storage, its privacy and recovery in disaster situations.
APA, Harvard, Vancouver, ISO, and other styles
31

Annane, Boubakeur, Adel Alti, and Osman Ghazali. "Research gaps based virtualization in mobile cloud computing." International Journal of Advanced Computer Research 10, no. 51 (2020): 212–22. http://dx.doi.org/10.19101/ijacr.2020.1048101.

Full text
Abstract:
Recently, mobile computing is known as a fast-growing utilization of people's daily life. However, the main is the limited mobile devices’ resources such as processing capability, storage space and battery life. With the development of cloud computing, mobile devices’ resources are improved with the help of cloud services, which resulted an emerged technology named Mobile Cloud Computing (MCC). Although the MCC has several advantages for mobile users, it is also challenged by many critical issues like security and privacy of the mobile user's data that offloaded on the cloud’ servers and processed on the virtual machines (VMs). In virtualization, various investigations showed that malicious users are able to break down the cloud security methods by spreading their VMs in order to alter or violate the user sensitive data that executed on cloud’ VMs. This paper deeply analyzes the recent MCC based virtualization approaches and methods by criticizing them. We found out that no approach protects the data from being stolen while distributed VMs that deployed on different cloud servers exchanging data. Hence, the paper provides practical gaps related to virtualization in MCC and future perspectives.
APA, Harvard, Vancouver, ISO, and other styles
32

Alharbe, Nawaf, Abeer Aljohani, and Mohamed Ali Rakrouki. "A Novel Data Partitioning Method for Active Privacy Protection Applied to Medical Records." Electronics 12, no. 6 (2023): 1489. http://dx.doi.org/10.3390/electronics12061489.

Full text
Abstract:
In recent years, cloud computing has attracted extensive attention from industry and academia due to its convenience and ubiquity. As a new Internet-based IT service model, cloud computing has brought revolutionary changes to traditional computing and storage services. More and more individual users and enterprises are willing to deploy their own data and applications on the cloud platform, but the accompanying security issues have also become an obstacle to the development of cloud computing. Multi-tenancy and virtualization technologies are the main reasons why cloud computing faces many security problems. Through the virtualization of storage resources, multi-tenant data are generally stored as shared physical storage resources. To distinguish the data of different tenants, labels are generally used to distinguish them. However, this simple label cannot resist the attack of a potential malicious tenant, and data still has the risk of leakage. Based on this, this paper proposed a data partitioning method in a multi-tenant scenario to prevent privacy leakage of user data. We demonstrate the use of the proposed approach in protecting patient data in medical records in health informatics. Experiments show that the proposed algorithm can partition the attributes more fine-grained and effectively protect the sensitive information in the data.
APA, Harvard, Vancouver, ISO, and other styles
33

Khan, Nayeem, and Tariq Ahmad. "A Deep Study on Security Vulnerabilities in Virtualization at Cloud Computing." International Journal of Computer Applications 173, no. 1 (2017): 15–19. http://dx.doi.org/10.5120/ijca2017915204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Singh, Dr Satinderjeet. "A Comprehensive Review on Data Security and Threats for Data Management in Cloud Computing." Middle East Journal of Applied Science & Technology 05, no. 02 (2022): 201–9. http://dx.doi.org/10.46431/mejast.2022.5220.

Full text
Abstract:
The cloud is a network of virtual computers that are linked together and may exhibit and offer computational capabilities continuously depending on certain Service Level Agreements (SLAs) that have been agreed between the parties to a contract between the clients and the internet provider. Cloud computing has several benefits, including endless computational resources, cheap cost, security controls, hypervisor protection, instantaneous elasticity, high throughput, and fault-tolerant solutions with increased performance. Since cloud computing is a comparatively recent computing model, there exists a lot of uncertainty about how well confidentiality of all levels, including host, network, data levels, and implementation, can be achieved. As a result, there still are important obstacles to cloud computing adoption. These constraints include security issues concerning privacy, compliance, and legal issues. When databases and software applications are moved from the cloud to large data centers, data management becomes a major challenge. Numerous security issues may develop while using cloud computing, including issues with privacy and control, virtualization and accessibility issues, confidentiality, management of credentials and identities, authentication of responding devices, and authenticity. In this paper, an effort is made to offer a comprehensive review of data security and threats in cloud computing.
APA, Harvard, Vancouver, ISO, and other styles
35

Dr., Satinderjeet Singh. "A Comprehensive Review on Data Security and Threats for Data Management in Cloud Computing." Middle East Journal of Applied Science & Technology 5, no. 2 (2022): 201–9. https://doi.org/10.46431/MEJAST.2022.5220.

Full text
Abstract:
The cloud is a network of virtual computers that are linked together and may exhibit and offer computational capabilities continuously depending on certain Service Level Agreements (SLAs) that have been agreed between the parties to a contract between the clients and the internet provider. Cloud computing has several benefits, including endless computational resources, cheap cost, security controls, hypervisor protection, instantaneous elasticity, high throughput, and fault-tolerant solutions with increased performance. Since cloud computing is a comparatively recent computing model, there exists a lot of uncertainty about how well confidentiality of all levels, including host, network, data levels, and implementation, can be achieved. As a result, there still are important obstacles to cloud computing adoption. These constraints include security issues concerning privacy, compliance, and legal issues. When databases and software applications are moved from the cloud to large data centers, data management becomes a major challenge. Numerous security issues may develop while using cloud computing, including issues with privacy and control, virtualization and accessibility issues, confidentiality, management of credentials and identities, authentication of responding devices, and authenticity. In this paper, an effort is made to offer a comprehensive review of data security and threats in cloud computing.
APA, Harvard, Vancouver, ISO, and other styles
36

Researcher. "IMPROVING SECURITY FOR VIRTUAL MACHINES IN CLOUD VIRTUALIZATION." International Journal of Computer Engineering and Technology (IJCET) 15, no. 5 (2024): 351–65. https://doi.org/10.5281/zenodo.13828259.

Full text
Abstract:
Cloud computing is a prominent developing technology that primarily focuses on data storage and the provision of on-demand computer resources for diverse applications. Users may save their data on the cloud and access it quickly and effortlessly. The accessibility of cloud data from any location at any time has drawn many users to this technology; yet, a significant concern in this setting is the privacy of user data. The consolidation of many users' data in a single location raises concerns over data privacy among the users. Virtualization is a method used to provide a virtual environment for the identification and isolation of user data. It enables a user to execute numerous operating systems concurrently on a single computer by generating virtual instances of an operating system, server, or network resource. Virtualization enables the operation of numerous servers on a single system while maintaining isolation between them, since they function on distinct virtual machines.
APA, Harvard, Vancouver, ISO, and other styles
37

Ali, Gholami, and Laure Erwin. "BIG DATA SECURITY AND PRIVACY ISSUES IN THE CLOUD." International Journal of Network Security & Its Applications (IJNSA) 8, no. 1 (2016): 59 to 79. https://doi.org/10.5281/zenodo.3345302.

Full text
Abstract:
Many organizations demand efficient solutions to store and analyze huge amount of information. Cloud computing as an enabler provides scalable resources and significant economic benefits in the form of reduced operational costs. This paradigm raises a broad range of security and privacy issues that must be taken into consideration. Multi-tenancy, loss of control, and trust are key challenges in cloud computing environments. This paper reviews the existing technologies and a wide array of both earlier and state-ofthe-art projects on cloud security and privacy. We categorize the existing research according to the cloud reference architecture orchestration, resource control, physical resource, and cloud service management layers, in addition to reviewing the recent developments for enhancing the Apache Hadoop security as one of the most deployed big data infrastructures. We also outline the frontier research on privacy-preserving data-intensive applications in cloud computing such as privacy threat modeling and privacy enhancing solutions.
APA, Harvard, Vancouver, ISO, and other styles
38

Ouda, Alia J., Ali N. Yousif, Ayat S. Hasan, Hassan M. Ibrahim, and Methaq A. Shyaa. "The Impact of Cloud Computing on Network Security and the Risk for Organization Behaviors." Webology 19, no. 1 (2022): 195–206. http://dx.doi.org/10.14704/web/v19i1/web19015.

Full text
Abstract:
Cloud computing is currently provided consumer or business IT support via social media or by using the internet. Cloud computing on the other hand, is increasing the level of the network security risk due to the services are basically presented by a third party. This results in hard to control the privacy and data security. In addition, to maintain the service availability and support data collections. Cloud computing clouts several technologies such as virtualization, SOA, and Web 2.0, it is also claimed their security risk matters. In this paper, the most serious and important risks and threats of cloud computing are discussed. The main vulnerability is identifying through a review of the published works on the cloud computing environment with possible solutions to overcome these threats and risks.
APA, Harvard, Vancouver, ISO, and other styles
39

Dr. Ashutosh Sharma. "The Role of Cloud Computing in Shaping Network Security: Implications for Organizational Behavior." Innovative Research Thoughts 10, no. 3 (2024): 183–205. http://dx.doi.org/10.36676/irt.v10.i3.1501.

Full text
Abstract:
Cloud computing is currently provided consumer or business IT support via social media or by using the internet. Cloud computing on the other hand, is increasing the level of the network security risk due to the services are basically presented by a third party. This results in hard to control the privacy and data security. In addition, to maintain the service availability and support data collections. Cloud computing clouts several technologies such as virtualization, SOA, and Web 2.0, it is also claimed their security risk matters. In this paper, the most serious and important risks and threats of cloud computing are discussed. The main vulnerability is identifying through a review of the published works on the cloud computing environment with possible solutions to overcome these threats and risks.
APA, Harvard, Vancouver, ISO, and other styles
40

Khan, Nabeel, and Adil Al-Yasiri. "Cloud Security Threats and Techniques to Strengthen Cloud Computing Adoption Framework." International Journal of Information Technology and Web Engineering 11, no. 3 (2016): 50–64. http://dx.doi.org/10.4018/ijitwe.2016070104.

Full text
Abstract:
Cloud Computing allows firms to outsource their entire information technology (IT) process, allowing them to concentrate more on their core business to enhance their productivity and innovation in offering services to customers. It allows businesses to cut down heavy cost incurred over IT infrastructure without losing focus on customer needs. However, to a certain limit adopting Cloud computing has struggled to grow among many established and growing organizations due to several security and privacy related issues. Throughout the course of this study several interviews were conducted, with cloud developers and security experts, and the literature was reviewed. This study enabled us to understand, current and future, security and privacy challenges with cloud computing by providing suitable solutions to identified challenges. The outcome of this study led to identification of total 18, current and future, security issues affecting several attributes of cloud computing. In this process of identification, the author also found mitigation techniques to avert these security issues. A security guide is formulated which enables organizations to be aware of security challenges, vulnerabilities and techniques to evade them.
APA, Harvard, Vancouver, ISO, and other styles
41

Neerav Nishant, Et al. "The Proposed Framework for Cloud Computing System Security and Privacy Services." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 1197–205. http://dx.doi.org/10.17762/ijritcc.v11i9.9034.

Full text
Abstract:
Public cloud computing has emerged as a popular and efficient solution for organizations to store, process, and access their data and applications. However, with the increasing adoption of public cloud services, concerns regarding security have become a critical factor in decision-making processes. This study aims to investigate the security aspects of public cloud computing and identify potential vulnerabilities and threats that organizations may face. The aim of this study is to examine the challenges associated with cloud computing and its security concerns. Cloud computing is a technology that utilizes the internet to share data and resources. It is characterized by five key features: On-Demand self-service, Resource Pooling, Broad network access, Rapid elasticity, and Measured Service. However, despite these benefits, cloud computing has several open issues, including Security, Availability, Scalability, and Interoperability. Traditional security techniques are insufficient in fully securing cloud computing. Security and privacy issues often arise during cloud deployment and delivery models. As a result, researchers are interested in learning more about cloud computing security and its methods. Industries are creating architectural models with a high level of protection for their data center to solve current security challenges. This article examines the security of cloud deployment strategies and analyzes cloud security and privacy challenges. The cloud computing service models are also discussed, along with any security issues. The study emphasizes the significance of Audit as a key factor in offering a security solution that covers all relevant security characteristics as determined by the literature. The study's conclusions present a fresh challenge to cloud service providers and suggest a new security paradigm that explains customer security needs. Overall, this study offers a parameter-by-parameter assessment of available security solutions and makes recommendations for enhancements to address cloud security issues.
APA, Harvard, Vancouver, ISO, and other styles
42

Tang, Kai. "Research on Security Strategies of Digital Library Based on Cloud Computing Platform." Advanced Materials Research 734-737 (August 2013): 3171–74. http://dx.doi.org/10.4028/www.scientific.net/amr.734-737.3171.

Full text
Abstract:
Based on the application of cloud computing, digital library is a cloud with a powerful computing capability, which is integrated from many relatively low cost computing entities through network. This cloud can be applied to store all types of document resources and conduct computing application, so as to unify the management by the means of resources sharing. The users can use a variety of terminal equipment to access it without any limitation of time and place, and it can carry on the service charge process based on the use of resources. The framework of digital library based on cloud platform can be divided into 3 layers: core service, service management as well as user access interface. Digital library based on the cloud computing platform is confronted with some security problems, such as data security, user privacy leaks, virtualization security etc. The paper discusses the corresponding strategies from the perspectives of WEB browser security, data encryption, identity authentication and authorization decision, virtual security technology, and establishment of cloud computing security standards and evaluation system.
APA, Harvard, Vancouver, ISO, and other styles
43

Janak Bharat Bhalla. "Safeguarding sensitive data with confidential computing." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 421–27. https://doi.org/10.30574/wjaets.2025.15.2.0505.

Full text
Abstract:
Confidential computing emerges as a transformative solution in modern data protection, addressing critical vulnerabilities in cloud environments and digital infrastructure. By implementing hardware-based security mechanisms through Trusted Execution Environments (TEEs), organizations can now protect sensitive information throughout their entire computational lifecycle. The technology revolutionizes secure data processing across healthcare, financial services, government, and IoT sectors, enabling unprecedented levels of privacy and security. With innovations in homomorphic encryption, confidential virtual machines, and secure AI processing, organizations can harness the power of cloud computing while maintaining stringent data protection standards. The integration of these advanced security measures creates new possibilities for secure collaboration, data sharing, and privacy-preserving computation in an increasingly interconnected digital landscape.
APA, Harvard, Vancouver, ISO, and other styles
44

Asvija B., Eswari R., and Bijoy M. B. "Security Threat Modelling With Bayesian Networks and Sensitivity Analysis for IAAS Virtualization Stack." Journal of Organizational and End User Computing 33, no. 4 (2021): 44–69. http://dx.doi.org/10.4018/joeuc.20210701.oa3.

Full text
Abstract:
Designing security mechanisms for cloud computing infrastructures has assumed importance with the widespread adoption of public clouds. Virtualization security is a crucial component of the overall cloud infrastructure security. In this article, the authors employ the concept of Bayesian networks and attack graphs to carry out sensitivity analysis on the different components involved in virtualization security for infrastructure as a service (IaaS) cloud infrastructures. They evaluate the Bayesian attack graph (BAG) for the IaaS model to reveal the sensitive regions and thus help the administrators to secure the high risk components in the stack. They present a formal definition of the sensitivity analysis and then evaluate using the BAG model for IaaS stack. The model and analysis presented here can also be used by security analysts and designers to make a selection of the security solutions based on the risk profile of vulnerable nodes and the corresponding cost involved in adding a defense against the identified vulnerabilities.
APA, Harvard, Vancouver, ISO, and other styles
45

Ke, Changbo, Zhiqiu Huang, Weiwei Li, Yi Sun, and Fangxiong Xiao. "Service Outsourcing Character Oriented Privacy Conflict Detection Method in Cloud Computing." Journal of Applied Mathematics 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/240425.

Full text
Abstract:
Cloud computing has provided services for users as a software paradigm. However, it is difficult to ensure privacy information security because of its opening, virtualization, and service outsourcing features. Therefore how to protect user privacy information has become a research focus. In this paper, firstly, we model service privacy policy and user privacy preference with description logic. Secondly, we use the pellet reasonor to verify the consistency and satisfiability, so as to detect the privacy conflict between services and user. Thirdly, we present the algorithm of detecting privacy conflict in the process of cloud service composition and prove the correctness and feasibility of this method by case study and experiment analysis. Our method can reduce the risk of user sensitive privacy information being illegally used and propagated by outsourcing services. In the meantime, the method avoids the exception in the process of service composition by the privacy conflict, and improves the trust degree of cloud service providers.
APA, Harvard, Vancouver, ISO, and other styles
46

Ahirwar, Dr Anamika, Nikita Prajapat, and Simran Raj. "AN ANALYTICAL STUDY ON CLOUD COMPUTING." BSSS journal of computer 12, no. 1 (2021): 30–35. http://dx.doi.org/10.51767/jc1204.

Full text
Abstract:
This paper is about the An Analytical Study on Cloud Computing. Cloud computing is the development of parallel computing, grid computing, distributed computing, and virtualization technologies which define the shape of a new area. In contrast to a variety of benefits related with cloud computing, there are certain challenges as well. These challenges include security, privacy and reliability of data, high costs of data transfers, and regularity in the availability of services, and bugs in large-scale distributed systems. Cloud computing is a method of computing in a place that provides users with the ability of information technology as a service and allows them to have access to these services on the Internet without having limited information. Cloud computing can help businesses transform their closing server infrastructures into dynamic environments, expanding and reducing server capacity depending on their demand. Cloud is a image to describe web as a space where computing has been pre-installed and close as a service; data, operating systems, applications, storage and processing power close on the web ready to be shared. In cloud computing data owners expand their complex data management systems from community sites to the public cloud for great pliability and cost-effective. The searching of this study that highlight there are five main issues related with cloud computing execution which are Mobility and Cloud Government Application security issues, Cloud Security data, cloud security platform, Cloud Security Services and Application, cloud network security issues and infrastructure issues.
APA, Harvard, Vancouver, ISO, and other styles
47

Singh, Devesh, and Ashwini Kumar Dautaniya. "Cloud Computing Security Challenges and Solution." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 10, no. 3 (2019): 1185–90. http://dx.doi.org/10.61841/turcomat.v10i3.14399.

Full text
Abstract:
Cloud computing has become a fundamental part of present-day IT infrastructure, presenting unprecedented tiers of scalability, flexibility, and value efficiency. However, this paradigm shift in computing comes with its very own set of protection demanding situations that demand meticulous examination. This evaluation paper delves into the multifaceted panorama of cloud computing security challenges and explores modern solutions to mitigate these concerns. The primary focus areas encompass records safety, get admission to manipulate, compliance and prison concerns, community safety, virtualization demanding situations, and incident reaction. For each task, the paper evaluates existing vulnerabilities and ability threats, providing a comprehensive overview of the tricky security landscape inside cloud environments. Furthermore, the overview discusses rising technology and developments that keep promise in bolstering cloud safety, together with blockchain for statistics integrity, the Zero Trust Security version for non-stop verification, and cloud-native protection answers. Realinternational case research is analysed to offer practical insights into how organizations have efficiently navigated and mitigated protection demanding situations within the cloud. 
 In conclusion, the overview synthesizes the key findings, underscoring the dynamic nature of cloud security and the need for ongoing research and variation to counter evolving threats. The paper serves as a treasured resource for researchers, practitioners, and decision-makers, imparting a comprehensive information of the current kingdom of cloud computing safety demanding situations and the modern answers shaping the future of stable cloud adoption.
APA, Harvard, Vancouver, ISO, and other styles
48

Sahmim Ep Guerbouj, Syrine, Hamza Gharsellaoui, and Sadok Bouamama. "A Comprehensive Survey on Privacy and Security Issues in Cloud Computing, Internet of Things and Cloud of Things." International Journal of Service Science, Management, Engineering, and Technology 10, no. 3 (2019): 32–44. http://dx.doi.org/10.4018/ijssmet.2019070103.

Full text
Abstract:
This journal article deals with the most important existing problems of security and privacy of the Cloud Computing (CC), Internet of Things (IoT) and Cloud of Things (CoT) concepts especially confidentiality issues. With the evolution of ubiquitous computing, everything is connected everywhere, therefore these concepts have been widely studied in the literature. However, due to the systems complexity and the difficulty to control each access attempt, intrusions and vulnerabilities will be more recurrent. To tackle this issue, researchers have been focused on various approaches enforcing security and privacy. In the present article, risk factors and solutions regarding these technologies are reviewed then current and future trends are discussed.
APA, Harvard, Vancouver, ISO, and other styles
49

Leyla Kerimli, Leyla Kerimli. "SECURITY ISSUES IN MOBILE CLOUD COMPUTING TECHNOLOGY." PAHTEI-Procedings of Azerbaijan High Technical Educational Institutions 47, no. 12 (2024): 406–13. https://doi.org/10.36962/pahtei47122024-43.

Full text
Abstract:
The widespread use of smartphones and other mobile devices has brought significant changes to the storage requirements of cloud systems, necessitating a reevaluation of security protocols. Mobile Cloud Computing (MCC) is a computing paradigm that combines the capabilities of mobile devices with the flexibility and scalability of cloud computing. MCC allows mobile users to access computational power, storage, and applications over the internet, facilitating resource-intensive tasks such as data analysis, gaming, and multimedia streaming on resource-constrained mobile devices. The integration of mobile and cloud technologies has revolutionized industries such as healthcare, education, and entertainment, offering benefits like enhanced mobility, improved resource utilization, and cost efficiency. Despite its advantages, MCC faces significant security challenges that could undermine user trust and disrupt its adoption. Since mobile devices and cloud servers are connected via insecure networks, malicious actors can exploit vulnerabilities in the system. This paper aims to analyze the primary security issues in MCC technology, focusing on data protection, authentication, access control, and other critical concerns. Unlike other issues, when dealing with business objectives, protection and privacy in financial activities are of paramount importance. This article examines mobile cloud computing, its technological model, and its role in detail. Keywords: Mobile cloud computing, Technology, Privacy issues, Security.
APA, Harvard, Vancouver, ISO, and other styles
50

ALhadi, Fatima Ismail, Nagi Ali AL-Shaibany, and Sharaf Abdulhak AL-Homdyl. "Survey on Cloud Computing Security." مجلة جامعة صنعاء للعلوم التطبيقية والتكنولوجيا 2, no. 4 (2024): 381–90. http://dx.doi.org/10.59628/jast.v2i4.1025.

Full text
Abstract:
One of the most popular IT subfields today is cloud computing. With a simple Internet connection, it enables users to access cutting-edge information, technology, and infrastructure. Because of the numerous benefits offered, most international organizations have started to move toward cloud computing environments during the last few decades. Companies and organizations find cloud computing appealing because it eliminates the need to plan for provisioning and enables them to start with modest resources and progressively raise them as service demand increases. Cloud computing presents opportunities for research as well as obstacles. The security and privacy of data in cloud systems are important issues. Now that cloud computing technology is developing quickly, it is more convenient for businesses to move their workload there. It asks for a smaller investment and guarantees quick delivery of cutting-edge technologies. Cloud security is of the utmost importance. It is susceptible to cyberattacks that exploit its vulnerabilities in an insecure cloud environment. This puts the cloud environment’s assets, resources, and data in danger. In this paper, we reviewed some cloud computing studies about various attacks on cloud computing services. This paper’s main objective is to give readers a better understanding of security issues and solutions.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography