scispace - formally typeset
Proceedings ArticleDOI

Security concerns and risk at different levels in Cloud Computing

Reads0
Chats0
TLDR
This paper aims to elaborate numerous security issues threatening web service based Cloud architecture and to analyze several existing and proposed solution models to mitigate the risks.
Abstract
Cloud Computing has been emerged as a new consumption and delivery model of virtualization of high cost computing infrastructures for the web service based IT solutions. However, technical concern about security and privacy has been a key challenge for virtual centralization. In a cloud computing environment, multiple applications reside over networked hosts removing physical barriers between them. In this paper we aim to elaborate numerous security issues threatening web service based Cloud architecture and to analyze several existing and proposed solution models to mitigate the risks.

read more

Citations
More filters

Predicting Critical Cloud Computing Security Issues using Artificial Neural Network (ANNs) Algorithms in Banking Organizations

TL;DR: The Levenberg–Marquardt based Back Propagation (LMBP) Algorithms are proposed to predict the performance for cloud security level to combine another optimal technique with ANNs algorithms to predict and mitigate critical security cloud issues.
Journal ArticleDOI

A New Conceptual Framework Modelling for Cloud Computing Risk Management in Banking Organizations

TL;DR: A new conceptual framework modelling for cloud computing risk management in banking organizations is proposed and will greatly improve the probability of cloud computing success in banking organization.
Journal ArticleDOI

Cloud Computing: State of the Art and Security Issues

TL;DR: This paper focuses on the various concepts related to cloud computing, its various business and service models and its entities along with several issues and challenges related to it.
Journal ArticleDOI

Classification of Critical Cloud Computing Security Issues for Banking Organizations: A Cloud Delphi Study

TL;DR: A successful classification of critical cloud security issues will greatly improve the probability of cloud banking success rate and control and mitigate the critical security issues by using artificial intelligence techniques (ANN).
References
More filters
Journal ArticleDOI

Data Security in the World of Cloud Computing

TL;DR: To ensure that decisions are informed and appropriate for the cloud computing environment, the industry itself should establish coherent and effective policy and governance to identify and implement proper security methods.
Proceedings ArticleDOI

Resource management for isolation enhanced cloud services

TL;DR: Experimental results demonstrate that two resource management approaches are effective in isolating cache interference impacts a VM may have on another VM, and incorporate these approaches in the resource management framework of the example cloud infrastructure, which enables the deployment of VMs with isolation enhanced SLAs.
Journal ArticleDOI

Autonomous security for autonomous systems

TL;DR: The paper describes a distributed anomaly detection and response system that provides comparable security to cryptographic methods and has a more plausible adoption path and determines the minimum number of ASes that would have to adopt a distributed security solution to provide global protection against these exploits.
Proceedings ArticleDOI

Transparent security for cloud

TL;DR: The integrity protection problem in the clouds is discussed and a novel architecture is sketches, Transparent Cloud Protection System (TCPS), which can be tailored to different cloud flavors to monitor the integrity of guests and infrastructure components while remaining transparent to virtual machines.
Proceedings ArticleDOI

A practical Chinese wall security model in cloud computing

TL;DR: The Chinese Wall Central Management System (CWCMS) is built with the proposed centralized control mechanism based on the Chinese Wall security policy to forbid deploying and running the competitors' VMs on the same physical machines so that physical isolation is achieved.