Improvising Information Security in Cloud Computing Environment
نویسندگان
چکیده
The evolution of internet has introduced an immense change in the usage of information and communication technologies. The fast, easy-to-use and pay per usage criteria leads to cloud computing infrastructure. Cloud Computing provides network services to its clients as per their requirements. Nowadays, information security has become a serious issue while clientserver interaction in cloud computing environment. The privacy and integrity of information to be exchanged or stored needs to be protected to ensure a safe cloud computing platform establishment. In this paper, a security framework has been proposed to alleviate the security level of information transferred from client end to cloud service provider (server). Certain authentication and file integrity techniques have been studied and are suggested to be implemented under the proposed scheme. This way, scheme ensures good quality of confidentiality, Integrity and Authentication during storage and access of information in cloud computing. Certain cryptographic (symmetric and asymmetric) techniques have been used to design the proposed framework. General Terms Cloud computing, Security.
منابع مشابه
A Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملRESCUE: Reputation based Service for Cloud User Environment
Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملTop Benefits and Hindrances to Cloud Computing Adoption in Saudi Arabia: A Brief Study
Cloud computing is an emerging concept of information technology that in many countries has an influence on many companies. The research was conducted to evaluate cloud computing adoption in Saudi Arabia; Benefits and hindrances for small and medium-sized enterprises (SMEs). The qualitative research approach is performed by interviews with the management of a variety of SMEs active in the infor...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014