The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security challenges in cloud environments remain largely catastrophic due to the nature of the cloud; complex, heterogeneous, widely accessible over the internet, and virtualised resource sharing. Static and boundary-based conventional security approaches are clearly not effective as the sole countermeasures. Instead, countermeasures need to be intelligent with a high degree of autonomous, self-managing...
A federated cloud environment is composed of interconnected clouds that share resources using an interface, transparent to users. In such environments, ensuring security is a complex task, since individual characteristics of each federated cloud has to be considered. This is one important issue, which can prevent companies and organizations from adopting federated clouds. In this context, this paper...
The idea of employees leveraging their personal mobile devices for their work (Bring Your Own Device, or BYOD) is becoming increasingly popular in recent years. As BYOD users will use various digital goods (such as cloud services and mobile software) for their work and personal purposes via the same mobile devices, it brings serious security risks into both the cloud and mobile devices. Generally,...
The ability for IBM researchers and development teams to take an idea or business opportunity and quickly solution it by requesting resources from a self-service cloud portal or an application-programming interface, API, has drastically changed how IBM Research procures information technology resources. In this poster, we'll present a brief history, the current IBM Research Hybrid cloud and our analysis...
The evolution of the economy, competition, development of new technologies and globalization explain the blooming of inter-organizations cooperation. The interorganizations cooperation represents a new opportunity to answer to complex challenges that a single organization can't face alone. Cloud Computing is an emerging computation paradigm in information technology and networking. Most recently business...
‘Utility computing’ was the concept introduced by John McCarthy in 1961 in a speech given at MIT. He proposed that sharing the computing power on a time-sharing basis will help grow business of ‘providing computing power as an utility’ and this was the inception of the cloud computing. Cloud computing can deliver the best to the end users either through the private, public or hybrid cloud infrastructures...
Biometric-established authentication method is maturing into fitting one probably the most promising candidate for either replacing or bettering normal approaches founded on password or token on the cloud. This technological know-how is a deterministic characteristic to provide a safer and more user friendly approach to authentication. However some vulnerability threatens the adoption of biometrics...
The adoption of Cloud computing involves many advantages in terms of flexibility, scalability and reliability, but also implies new challenges on security, data privacy and protection of personal data. Since more and more sensitive applications and data are moved to the cloud, the verification of the digital identity of the participants in the electronic communication has become a crucial challenge...
Patterns abstract good practices to define basic models that can be used to build new systems and evaluate existing systems. Security patterns join the extensive knowledge accumulated about security with the structure provided by patterns to provide guidelines for secure system requirements, design, and evaluation. We built a catalog of over 100 security patterns, which is still growing. We complement...
In this paper, we propose an autonomic trust management framework for cloud based and highly dynamic Internet of Things (IoT) applications and services. IoT is creating a world where physical objects are seamlessly integrated in order to provide advanced and intelligent services for human-beings in their day-to-day life style. Therefore, trust on IoT devices plays an important role in IoT based services...
The emergence of a closer relationship between cloud service providers in the cloud computing market is the inevitable consequence of the computing as utility concept. The closer cooperation creates competitive advantages for providers and users of cloud services as well. Capacities and services can be used in a collaborative and flexible way. Despite the numerous potentials of composite cloud services,...
In recent years, cloud computing is no doubt one of the most-talked-about terms in both the industry and academic worlds. In clouds, resources are delivered as services over the Internet in a pay-as-you-go fashion. By leasing cloud platforms to run their business, startups can achieve cost-saving and scale-up elasticity without being concerned about over-provisioning or under-provisioning for a service...
Cloud computing has emerged as a fast-growing paradigm for storing/sharing data and delivering services over the Internet. It provides its users with a way to deal with information or data without investing in any new technology or resources of their own. Although cloud computing environment is viewed as a promising Internet-based computing platform, the security challenges it poses are also equally...
Preserving identity privacy is a significant challenge for the security in cloud services. Indeed, an important barrier to the adoption of cloud services is user fear of privacy loss in the cloud. One interesting issue from a privacy perspective is to hide user's usage behavior or meta-information which includes access patterns and frequencies when accessing services. Users may not want the cloud...
In this paper we deal with the cloud brokering problem in the context of a multi-cloud infrastructure. The problem is by nature a multi-criterion optimization problem. The focus is put mainly (but not only) on the security/trust criterion which is rarely considered in the litterature. We use the well known Promethee method to solve the problem which is original in the context of cloud brokering. In...
The last decade has witnessed a huge number of innovations and new technologies which have impacted our routines and have simplified our lives. Higher Education is an exception to this scenario and still in its nascent stage when it comes to technology adoption and collaboration. This paper attempts to figure out the reasons and suggest remedial measures. The world around us is moving so fast and...
Software development is not only a single motive process as development but also have to handle number of different issues as like security. For basic software development, we generally use SDLC models for development like web projects, applications, services etc. but in this development process we are not taking care of security issues which are demand of these days. There is no central body who...
Cloud Computing has transformed the software support for large systems from server to service oriented paradigm. This drift has evolved new challenges for design and delivery of services over heterogeneous requirements and environments. This brings about risks and challenges for systems. The system over internet are vulnerable to performance and security risks. The performance is a composite evaluation...
As Cloud Computing continues to evolve the majority of research tends to lean towards optimising, securing and improving Cloud technologies. Less work appears which leverages the architectural and economic advantages of the Cloud. This paper examines the Cloud as a security testing environment, having a number of purposes such as penetration testing, and the dynamic creation and testing of environments...
In today's information technology (IT) era, a major part of the costs is being spent on computational needs. Enterprises are in efforts to increase their Return on Investment (ROI) and individuals are trying to reduce their costs. In this regard, cloud computing which emerges as a fifth utility can reduce costs and enhance performance of IT solutions. A large number of companies and institutions are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.