The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Computation outsourcing using virtual appliance is getting prevalent in cloud computing. However, with both hardware and software being controlled by potentially curious or even malicious cloud operators, it is no surprise to see frequent reports of security accidents, like data leakages or abuses. This paper proposes Kite, a hardware-software framework that guards the security of tenant’s virtual...
Cloud computing offers the potential for productivity, cost savings and innovation advantages to organizations. To utilize these benefits, to facilitate wide-scale cloud adoption and to embrace cloud computing, we must address many cloud security challenges. Attackers can compromise the vulnerable hosts and can either take over their resources or use them as stepping stones for future attacks. Open...
Cloud computing has been integrated into manyareas of production and received a great amount of attention from both government and private industry. Despite its popularity, cloud technologies are still not well understood and numerous areas are open for research and development. One critical area that has not received significant attention in the security domain of cloud computing is digital forensics...
Virtualization is the main underlying technology for cloud computing. The popularity of cloud computing had expanded rapidly over the past few years. As any new technology advancement, cloud computing also has vulnerability possibilities and potential security risks. Therefore it is important to study and understand the underlying technologies in cloud computing and test any possible loophole that...
This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the cloud. To secure the factors, a multiway dynamic trust chain transfer model was proposed on the basis of a measurement interactive virtual machine and current behavior to protect the integrity of the system. A trust chain construction module is designed in a virtual machine...
In this paper, we introduce a Micro-Datacenter (MDC) and Integrated Management System (IMS) that controls and manages the MDCs for supporting several services to users. The MDC is a small and rack-based datacentre system that designed to solve different problems or to handle different workloads that cannot be handled by traditional datacenters. The IMS controls and manages a multitude of MDCs to provide...
Cloud Computing enables various users on the way to send their facts over cloud as well as also in distrusted manner. But during the transmission of data over distributed network in cloud, energy consumption is more and hence network becomes unstable and costly. Hence various techniques are implemented for the energy consumption in cloud network, but the technique implemented so far is not an efficient...
Cloud computing has materialized as a new platform in the field of Computer Science. Its focus is on providing different facilities through its flexible infrastructure. With its vast capabilities, the cloud has expanded itself into various applications. In this paper, we have surveyed 15 papers on cloud computing; analyzing its history, development and future aspects. Our paper summarizes how the...
We report on use of Active Privacy Bundles using a Trusted Third Party (APB-TTP) for protecting privacy of users' healthcare data (incl. patients' Electronic Health Records). APB-TTP protects data that are being disseminated among different authorized parties within a healthcare cloud. We are nearing completion of the pilot APB-TTP for healthcare applications, and commencing work on its extension,...
Several cloud schedulers have been proposed in the literature with different optimization goals such as reducing power consumption, reducing the overall operational costs or decreasing response times. A less common goal is to enhance the system security by applying specific scheduling decisions. The security risk of covert channels is known for quite some time, but is now back in the focus of research...
The Cloud attempts to provide its users with automatically scalable platforms to host many applications and operating systems. To allow for quick deployment, they are often homogenised to a few images, restricting the variations used within the Cloud. An exploitable vulnerability stored within an image means that each instance will suffer from it and as a result, an attacker can be sure of a high...
Cloud computing has recently emerged and gained momentum to implement existing networks and data centers in a new architecture to enable services in a timely manner. Although it offers tremendous opportunities, there are some major challenges, such as security, that must be solved for efficient usage. Confidentiality is one of the most important points of information security especially in financial,...
Recent years have witnessed the development of Cloud Computing. The management of images is a big problem in virtualized environment because there are quantities of Virtual Machine images being stored in a Cloud and most of them are outdated. How to detect the outdated images and patch them efficiently? In this paper, we present a prototype called OPS- Offline Patching Scheme for the Images Management...
Security issues of cloud computing are always being concerned by customers. Research on a virtual machine's quantitative or qualitative value of risk will be a good start to know the security status of a cloud data center. Risk assessment is a solution for really understanding security procedures of the network and information system, analyzing where security threats come from and how much loss the...
Cloud computing is a demanding subject and its fans are increasing day by day in the private or corporate areas. Confidentiality is the most important point of information security with respect to integrity and availability in cloud computing especially in financial, governmental and military usage. An Intrusion Detection System (IDS) service increases the cloud's security level. In this paper, a...
Security Issues are the principle concerns of virtualization technology when there is an data transfer and application access from one virtual machine to another, as it is a decisive threat for efficiency. Today's IT intension is to have an outlook for the virtualization technology that allows the business world to run with fewer resources. Still there exist certain virtualization issues when normal...
Validation of configuration and security compliance at the time of creating new service is an important part of service management process and governance in most IT delivery organizations. It is performed to ensure that security risks, governance controls and vulnerabilities are proactively managed through the lifecycle of the services, and to guarantee that all discovered problems and issues are...
Cloud computing is revolutionizing how information technology resources and services are used and managed but the revolution comes with new security problems. This paper identifies the key technologies and current security issues in the cloud computing environments, and recommended some security management policy and methodology for ensuring application and data security and compliance integrity for...
Cloud services are providing on-demand resources via virtualization technologies. This will make cloud computing a potential target for cyber attacks. Most proposed security models for virtualization are working above virtualization on host OS. Almost all proposed cloud security models suffers from this problem in that these models have very limited control over virtualization. In this paper a Hierarchical...
Web has become an open platform where everybody can build and run their applications. Big companies can manage the capital expenditure themselves. Small company or a user wants to provide web services, better they can rent the computing infrastructure. Infrastructure-as-a-Service (IaaS) is the delivery of computer infrastructure such as servers, network, applications, storage, software, hardware as...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.