The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing is a new IT delivery paradigm that offers computing resources as on-demand services over the Internet. Like all forms of outsourcing, cloud computing raises serious concerns about the security of the data assets that are outsourced to providers of cloud services. Security issues of cloud platform have gradually drawn the attention of research institutions and various security companies...
A multitude of issues affect the broader adoption of Cloud computing, with the perceived lack of trust on the Cloud Service Providers (CSPs) often listed as a significant concern. To address this, CSPs typically set up Service Level Agreements (SLAs) that contractually list what the CSP is obligated to provide to meet the customer requirements. While SLAs are promising as a concept, the inadequacy...
Mobile device consumerisation has introduced the Bring-Your-Own-Device (BYOD) trend to the organisational context, allowing employees to work using their personal devices. However, as personal mobile devices are perceived as less secure than those provided by the organisation, BYOD has risen security concerns about corporate information being accessed by mobile devices from inside and outside the...
Most of security measures for network computing are provided by service provider itself. However, this kind of methods cannot be trusted radically by the user for lacking the ability to control the resource directly. The computing environment for the user is unable to know what software will be provided. To address this problem, we present a security scheme, named Cleanroom Monitoring System (CMS),...
This paper proposes a 4-layer device virtualization system architecture based on multi peer nodes. First, the different layers of deployment and the operation processes of the system are discussed, then the resource management and the information flow are described. Finally, the interface and task assignment of the proposed system is discussed using experiments and the effectiveness and stability...
Grid computing systems are complex and dynamic systems and therefore require appropriate automated management, which would enable stable and reliable operation of the whole grid environment. The research community has addressed this requirement with a number of monitoring frameworks, which serve to collect data at various levels to support decision taking and management activities within grids. However,...
This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the cloud. To secure the factors, a multiway dynamic trust chain transfer model was proposed on the basis of a measurement interactive virtual machine and current behavior to protect the integrity of the system. A trust chain construction module is designed in a virtual machine...
The extensive use of cloud services by both individual users and organizations induces several security risks. The risk perception is higher when Cloud Service Providers (CSPs) do not clearly state their security policies and/or when such policies do not directly match user-defined requirements. Security-oriented Service Level Agreements (Security SLAs) represent a fundamental means to encourage the...
To secure IaaS cloud environments, multiple layers of security mechanisms must be deployed and monitored. When a threat is detected, it must be appropriately acted upon. A common problem with monitoring such approaches is the sheer volume of alarms generated. Some alerts may be false positives, others are informational. It is challenging for cloud providers to quickly interpret which events to act...
Recent years witness the successful adoption of Cloud computing. However, security remains the top concern for cloud users. The fundamental issue is that cloud providers cannot convince cloud users the trustworthiness of cloud platforms. In this paper, we propose a cloud auditing framework, named CloudAuditor, to examine the behaviors of cloud platforms. By leveraging nested virtualization technology,...
The requirements for new web applications supporting different types of devices and purposes are continuously growing. The main advantages of web application development as well as popular development features covering integration with different technologies are considered initially in this paper. Integration and possibilities of application of cloud based web applications in real scenarios with different...
This paper presents a virtual eHealth journal and analysis system for connected health. Traditional patient attributes are complemented with a broader spectrum of health indicator data from normal daily activities. Core to the system is a cloud-based federation architecture and its implementation, providing 24/365 continuous monitoring, capturing, and storage of each individual human user's lifelog...
When enterprises decide to outsource their business processes to the Cloud, various considerations should be tackled. Indeed, the enterprises aim to reduce the business processes investment cost, to enhance their performance, and to focus on the enterprise core competency while considering security constraints. Hence, it is essential to assist enterprises to take the suitable decision by providing...
In this work, we propose a framework for a Virtual Machine Monitor (VMM)-based Anomaly Detection System (ADS). This framework uses a sequence-based analysis Hidden Markov Model (HMM) on static probe instrumentation data collected within the VMM. Long observations are split into multiple, uniformed-length, small sequences. The list of likelihood score of sequences in the new observation is compared...
In the cloud computing context, Service Level Agreements (SLAs) are contracts between Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs), stating the guaranteed quality level of the services offered by CSPs. Existing cloud SLAs focus only on few service terms, completely ignoring all security related aspects. They are often reported in a way that is hardly understandable for customers...
Security issues of cloud computing environments are considered a major challenge for its full adoption. A Service Level Agreement (SLA) corroborates the shared management vision provided by the cloud computing paradigm, which can assist with related security issues. The necessity to address security requirements in cloud computing SLAs is considered important for both providers and consumers, along...
Body Area Networks (BAN) is a special purpose Wireless Sensor Network (WSN) which is designed for patient monitoring. BAN requires to transmit the monitored data to the medical personals as quick as possible in real time. It is possible to make it web based. The integration of the BAN and cloud computing allows the sensors to transmit their data in a short time and show it in the web application....
Security issues in cloud computing have increasingly become important issue with the growing popularity of cloud computing as it provides buyers accessibility and reliability services. Security in cloud computing are classified into two types, namely data security and network security. Our paper focus on network security issue. The types of attacks that are common in network security are ports scan,...
Software-defined networking (SDN) removes the limitations of hardware by, for example, allowing the networking hardware's behavior to be changed on the fly. The shift to SDN has the potential to turn the hardware-driven concept of networking into one that's more software-defined and on-demand. This column reviews the advantages of SDN, explains related business and technology opportunities, and looks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.