Proceedings ArticleDOI
Security concerns and risk at different levels in Cloud Computing
E. Aruna,A. Abirami Shri,Ajanthaa Lakkshmanan +2 more
- pp 743-746
Reads0
Chats0
TLDR
This paper aims to elaborate numerous security issues threatening web service based Cloud architecture and to analyze several existing and proposed solution models to mitigate the risks.Abstract:
Cloud Computing has been emerged as a new consumption and delivery model of virtualization of high cost computing infrastructures for the web service based IT solutions. However, technical concern about security and privacy has been a key challenge for virtual centralization. In a cloud computing environment, multiple applications reside over networked hosts removing physical barriers between them. In this paper we aim to elaborate numerous security issues threatening web service based Cloud architecture and to analyze several existing and proposed solution models to mitigate the risks.read more
Citations
More filters
Predicting Critical Cloud Computing Security Issues using Artificial Neural Network (ANNs) Algorithms in Banking Organizations
TL;DR: The Levenberg–Marquardt based Back Propagation (LMBP) Algorithms are proposed to predict the performance for cloud security level to combine another optimal technique with ANNs algorithms to predict and mitigate critical security cloud issues.
Journal ArticleDOI
A New Conceptual Framework Modelling for Cloud Computing Risk Management in Banking Organizations
Abdelrafe Elzamly,Burairah Hussin,Samy S. Abu Naser,Khalid Khanfar,Mohamed Doheir,Ali Selamat,Abdullah Rashed +6 more
TL;DR: A new conceptual framework modelling for cloud computing risk management in banking organizations is proposed and will greatly improve the probability of cloud computing success in banking organization.
Journal ArticleDOI
Cloud Computing: State of the Art and Security Issues
Shruti Chhabra,Veer Sain Dixit +1 more
TL;DR: This paper focuses on the various concepts related to cloud computing, its various business and service models and its entities along with several issues and challenges related to it.
Journal ArticleDOI
A Review Study on Cloud Computing Issues
Qusay Kanaan Kadhim,Qusay Kanaan Kadhim,Robiah Yusof,Hamid Sadeq Mahdi,Sayed Samer Ali Al-Shami,Siti Rahayu Selamat +5 more
Journal ArticleDOI
Classification of Critical Cloud Computing Security Issues for Banking Organizations: A Cloud Delphi Study
TL;DR: A successful classification of critical cloud security issues will greatly improve the probability of cloud banking success rate and control and mitigate the critical security issues by using artificial intelligence techniques (ANN).
References
More filters
Journal ArticleDOI
Data Security in the World of Cloud Computing
TL;DR: To ensure that decisions are informed and appropriate for the cloud computing environment, the industry itself should establish coherent and effective policy and governance to identify and implement proper security methods.
Proceedings ArticleDOI
Resource management for isolation enhanced cloud services
TL;DR: Experimental results demonstrate that two resource management approaches are effective in isolating cache interference impacts a VM may have on another VM, and incorporate these approaches in the resource management framework of the example cloud infrastructure, which enables the deployment of VMs with isolation enhanced SLAs.
Journal ArticleDOI
Autonomous security for autonomous systems
TL;DR: The paper describes a distributed anomaly detection and response system that provides comparable security to cryptographic methods and has a more plausible adoption path and determines the minimum number of ASes that would have to adopt a distributed security solution to provide global protection against these exploits.
Proceedings ArticleDOI
Transparent security for cloud
TL;DR: The integrity protection problem in the clouds is discussed and a novel architecture is sketches, Transparent Cloud Protection System (TCPS), which can be tailored to different cloud flavors to monitor the integrity of guests and infrastructure components while remaining transparent to virtual machines.
Proceedings ArticleDOI
A practical Chinese wall security model in cloud computing
TL;DR: The Chinese Wall Central Management System (CWCMS) is built with the proposed centralized control mechanism based on the Chinese Wall security policy to forbid deploying and running the competitors' VMs on the same physical machines so that physical isolation is achieved.