The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the ongoing advancements in Cloud Computing, new technologies and standards are being developed, ever increasing the complexity of this environment along with the associated risks, thus making it difficult for companies to take advantage of the benefits Cloud Computing brings without being exposed to them. Due to this increased complexity, there is an increased chance of a deviation from the...
To reduce CPU, memory and bandwidth usage as cloud platform security consumption, and to prevent vulnerabilities that brought in by VM based antivirus software, we propose an agentless processes monitoring architecture for cloud platform. To demonstrate this architecture, we modified KVM kernel, programed OpenStack plugins, added security module on both management and compute node in a cloud platform...
The lack of novel security controls for the cloud might arise from the fact that Cloud Computing is the convergence of many different technological areas, including Utility Computer, Computational Grid, Autonomous Computing, Virtualization and Service Oriented Architectures. These underlying areas have been independently addressed by existing general-purpose security controls, but we noticed that...
The paper presents an integrated system for energy management provided through cloud computing. The system also includes a network of autonomous addressable, distributed modules, for metering the energy consumption and a module for energy consumption forecast.
In Cloud Computing Resources are allocated to customers based on their requests and prioritization, but sometimes a non-cloud provider organization wants to share their spare resources to same customers through Cloud Brokers so in this type of system a heterogeneous environment is created between regular cloud providers, Non- cloud provider organization, cloud broker and customers. In this paper we...
Software development is not only a single motive process as development but also have to handle number of different issues as like security. For basic software development, we generally use SDLC models for development like web projects, applications, services etc. but in this development process we are not taking care of security issues which are demand of these days. There is no central body who...
Cloud computing has recently emerged as a new paradigm for hosting and delivering services over the Internet. It is evolving as a key computing platform for sharing resources that include infrastructures, software, applications, and business processes. The cloud environment is required to have efficient security techniques as it contains precious assets such as data, users, technologies, resources...
There have been many socio-political and technological developments in the area of Electronic Patient Records (EPR). The technological aspects include EPR implemented using Online Transaction Processing (OTP) using Internet and Internet based systems, more recently via Cloud- Based systems (CBS) exploiting Cloud Service Models (CSM). Additionally, there are many socio-political considerations comprising:...
In spite of the benefits that could flow from its adoption, cloud computing brings new challenges associated with potential lack of transparency, trust, and loss of controls. With a growing number of cloud service providers, potential customers will require methods for selecting trustworthy and appropriate providers. We discuss existing tools, methods and frameworks that promote the adoption of cloud...
Autonomic cloud computing systems react to events and context changes, preserving a stable quality of service for their tenants. Existing assurance techniques supporting trust relations between parties need to be adapted to scenarios where the assumption of responsibility on trust assertions and related information (e.g., in SLAs and certificates) cannot be done at a single point in time and by a...
This paper presents a certification model for Non-repudiation (NR) of cloud storage services. NR, i.e., The possession of proofs that certain exchanges have taken place amongst interacting parties, is a significant security property for cloud data storage services. Our model for certifying NR is based on continuous monitoring and has been defined and realised according to the CUMULUS approach. It...
Due to the rapid development of cloud computing, several cloud computing platforms are developed to build cloud for individuals and companies. Open Nebula is known as one of the most popular open-source cloud computing software platforms. However, Open Nebula does not perform effectively in security. Virtual machines face risks of being attacked, which leads to services halt and data loss. We analyze...
With the recent proliferation of ubiquitous, mobile and cloud-based systems, security, privacy and trust concerns surrounding the use of emerging technologies in the ensuing wake of the Internet of Things (IoT) continues to mount. In most instances, trust and privacy concerns continuously surface as a key deterrent to the adoption of these emergent technologies. The ensuing literature presents a Secure,...
The Cloud Security Alliance identified the "notorious nine" threats for cloud computing. The range of these threats across the cloud indicates that centralized prevention and detection would be highly inefficient, potentially reporting incidents to tenants well after they occur and are difficult to mitigate. This paper presents an auditing framework for the service cloud that distributes...
This demo presents a Security Service Level Agreement (SSLA) management solution for the cloud. In this work we aim to bind security in the Service Level Agreement (SLA) as a measurable and agreeable parameter between cloud service provider (CSP) and the customer. To achieve this, we allow cloud customer to choose between different security levels when negotiating the SLA and then our automated SLA...
E-Capital Market industry today, faced with numerous problems those issues in providing new services. Lack of flexibility, scalability, agility and IT cost structure are examples of these problems. Cloud computing technology has had a significant impact on improving service delivery e-Capital Market industry and In addition to reducing current problems delivery e-Capital Market industry, reduces costs...
As its name suggests, cloud testing is a form of software testing which uses cloud infrastructure. Its effective unlimited storage, quick availability of the infrastructure with scalability, flexibility and availability of distributed testing environment translate to reducing the execution time of testing of large applications and hence lead to cost-effective solutions. In cloud testing, Testing-as-a-Service...
Mobile devices are already included in cloud domain which increases the utilization of cloud apps & services. As the mobile operators offers internal service over mobile network user easily set connected to the cloud. Due to availability of cloud more and more applications are deployed on mobile such as email, e-health, social networking apps etc. Due to 24x7 availability of network to mobile...
We are seeing the deployment of new types of networks such as sensor networks for environmental and infrastructural monitoring, social networks such as facebook, and e-Health networks for patient monitoring. These networks are producing large amounts of data that need to be stored, processed and analysed. Cloud technology is being used to meet these challenges. However, a key issue is how to provide...
The dynamic and elastic nature of cloud computing introduces new security challenges when it comes to maintaining consistent security configurations. This is emphasized by the fact that virtual machines are abruptly migrated between physical hosts, in the same or even in different data centers under different security policies. If security is not correctly enforced at the destination locations, and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.