Results 1 - 10
of
19
R.: Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges
- In: IEEE Communication Surveys & Tutorials. IEEE Communications Society Press, USA
"... approaches have gained remarkable ground from academia and industry. CMA is the state-of-the-art mobile augmentation model that employs resource-rich clouds to increase, enhance, and optimize computing capabilities of mobile devices aiming at execution of resource-intensive mobile applications. Augm ..."
Abstract
-
Cited by 17 (3 self)
- Add to MetaCart
(Show Context)
approaches have gained remarkable ground from academia and industry. CMA is the state-of-the-art mobile augmentation model that employs resource-rich clouds to increase, enhance, and optimize computing capabilities of mobile devices aiming at execution of resource-intensive mobile applications. Augmented mobile devices envision to perform extensive computations and to store big data beyond their intrinsic capabilities with least footprint and vulnerability. Researchers utilize varied cloud-based computing resources (e.g., distant clouds and nearby mobile nodes) to meet various computing requirements of mobile users. However, employing cloud-based computing resources is not a straightforward panacea. Comprehending critical factors (e.g., current state of mobile client and remote resources) that impact on augmentation process and optimum selection of cloud-based resource types are some challenges that hinder CMA
A review on modern distributed computing paradigms: Cloud computing, jungle computing and fog computing,” CIT
- Journal of Computing and Information Technology
, 2014
"... The distributed computing attempts to improve perfor-mance in large-scale computing problems by resource sharing. Moreover, rising low-cost computing power coupled with advances in communications/networking and the advent of big data, now enables new distributed computing paradigms such as Cloud, Ju ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
The distributed computing attempts to improve perfor-mance in large-scale computing problems by resource sharing. Moreover, rising low-cost computing power coupled with advances in communications/networking and the advent of big data, now enables new distributed computing paradigms such as Cloud, Jungle and Fog computing. Cloud computing brings a number of advantages to consumers in terms of accessibility and elasticity. It is based on centralization of resources that possess huge processing power and storage capacities. Fog computing, in contrast, is pushing the frontier of computing away from centralized nodes to the edge of a network, to enable computing at the source of the data. On the other hand, Jungle computing includes a simultaneous combination of clusters, grids, clouds, and so on, in order to gain maximum potential computing power. To understand these new buzzwords, reviewing these paradigms together can be useful. Therefore, this paper describes the advent of new forms of distributed com-puting. It provides a definition for Cloud, Jungle and Fog computing, and the key characteristics of them are determined. In addition, their architectures are illustrated and, finally, several main use cases are introduced.
Cloud Computing Data Breaches A socio-technical review of literature
"... Abstract — As more and more personal, enterprise and government data, services and infrastructure moves to the cloud for storage and processing, the potential for data breaches increases. Already major corporations that have outsourced some of their IT requirements to the cloud have become victims o ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract — As more and more personal, enterprise and government data, services and infrastructure moves to the cloud for storage and processing, the potential for data breaches increases. Already major corporations that have outsourced some of their IT requirements to the cloud have become victims of cyber attacks. Who is responsible and how to respond to these data breaches are just two pertinent questions facing cloud computing stakeholders who have entered an agreement on cloud services. This paper reviews literature in the domain of cloud computing data breaches using a socio-technical approach. Socio-technical theory encapsulates three major dimensions- the social, the technical, and the environmental. The outcomes of the search are presented in a thematic analysis. The 7 key themes identified from the literature included: security, data availability, privacy, trust, data flow, service level agreements, and regulation. The paper considers complex issues, pre-empting the need for a better way to deal with breaches that not only affect the enterprise and cloud computing provider, but more importantly, end-users who rely on online services and have had their credentials compromised. Keywords—cloud computing; socio-technical; security; privacy; regulation; literature review I.
A Survey of Security Attacks in Information-Centric Networking
"... Abstract-Information-centric networking (ICN) is a new communication paradigm that focuses on content retrieval from the network regardless of storage location or physical representation of this content. In ICN, securing the content itself is much more important than securing the infrastructure or ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract-Information-centric networking (ICN) is a new communication paradigm that focuses on content retrieval from the network regardless of storage location or physical representation of this content. In ICN, securing the content itself is much more important than securing the infrastructure or the end-points. To achieve the security goals in this new paradigm, it is crucial to have a comprehensive understanding of the ICN attacks, their classification, and proposed solutions. In this paper, we provide a survey of attacks unique to ICN architectures and other generic attacks that have an impact on ICN. It also provides a taxonomy of these attacks in ICN, which are classified into four main categories: naming, routing, caching, and other miscellaneous related attacks. Further, the paper shows the relation between ICN attacks and unique ICN attributes; ICN attacks and security requirements: confidentiality, integrity, availability, and privacy. Finally, the paper presents the severity levels of ICN attacks and discusses the existing ICN security solutions.
unknown title
"... Abstract-Cloud computing is an emerging technology which is running on a distributed network. Cloud computing provides many services to the users over internet like computing and storage. These services are on demand services to the customers and customers need to pay as they use these services. Ma ..."
Abstract
- Add to MetaCart
Abstract-Cloud computing is an emerging technology which is running on a distributed network. Cloud computing provides many services to the users over internet like computing and storage. These services are on demand services to the customers and customers need to pay as they use these services. Many users use storage services to store their large amount data to the cloud. These outsourced data can be private, so that it should not be disclose to unauthorized cloud users. Users should have the control over their data in cloud, but when user uploads his data to the cloud, he does not know that who is going to use his data over the cloud. All accesses to the user's data should be transparent to the data owner then trust between the cloud users and cloud service providers will increase. Accountability can help to increase the trust among the cloud users and cloud service providers. In this paper, we have done survey on the accountability of data usage in cloud. The accountability can ensure the integrity of data and can help cloud users to monitor their outsourced data and helps to check whether their data is handled according to the service level agreements. Accountability consists of logging of actions and auditing of these actions performed.
A Comparative Study on Privacy-Preserving Public Auditing for Secure Cloud Storage
"... ABSTRACT: The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upl ..."
Abstract
- Add to MetaCart
(Show Context)
ABSTRACT: The Cloud computing is a latest technology which provides various services through internet. The Cloud server allows user to store their data on a cloud without worrying about correctness & integrity of data. Cloud data storage has many advantages over local data storage. User can upload their data on cloud and can access those data anytime anywhere without any additional burden. The User doesn't have to worry about storage and maintenance of cloud data. But as data is stored at the remote place how users will get the confirmation about stored data. Hence Cloud data storage should have some mechanism which will specify storage correctness and integrity of data stored on a cloud. The major problem of cloud data storage is security. The Log Records stored in log file of an organization may contain sensitive data which should be protected properly for proper working of an organization. Maintaining security of such log records is one of the important tasks. Also, over a long period of time maintaining integrity of such log data is very important. However, deploying such a system for security of log records is an overhead for an organization and also itrequires additional cost. Many researchers have proposed their work or new algorithms for security of log records or to resolve this security problem. This study also reveals about consistency rationing and various adaptive policies. In this work, propose a novel privacy-preserving mechanism that supports public auditing on shared data stored in the cloud. In particular, we exploit ring signatures to compute verification metadata needed to audit the correctness of shared data. With our mechanism, the identity of the signer on each block in shared data is kept private from public verifiers, who are able to efficiently verify shared data integrity without retrieving the entire file. In addition, our mechanism is able to perform multiple auditing tasks simultaneously instead of verifying them one by one. Our experimental results demonstrate the effectiveness and efficiency of our mechanism when auditing shared data integrity.
EFFICIENT RETRIEVAL OF DATA FROM CLOUD USING DATA PARTITIONING METHOD FOR BANKING APPLICATIONS [RBAC]
"... ABSTRACT Cloud computing is a pioneering area, where abundant services are provided for storing and handling data. Though the cloud usage reduces the cost of its customers, there is a severe drawback towards its privacy. As access to the data is provided open, there is a tendency for the lack of pr ..."
Abstract
- Add to MetaCart
ABSTRACT Cloud computing is a pioneering area, where abundant services are provided for storing and handling data. Though the cloud usage reduces the cost of its customers, there is a severe drawback towards its privacy. As access to the data is provided open, there is a tendency for the lack of privacy of data. The existing methods use different encryption algorithms to handle this issue. Encryption algorithms being costlier and depends on the chosen key value the method becomes less secured. Hence, in this paper a simple yet secured perturbation procedure using integer partitioning which uses the keyword itself for generating the key value. The procedure is explained with the algorithm and the results are compared with the existing method.
IEEE COMMUNICATIONS SURVEYS & TUTORIALS, ACCEPTED FOR PUBLICATION 1 Cloud-Based Augmentation for Mobile Devices: Motivation, Taxonomies, and Open Challenges
"... approaches have gained remarkable ground from academia and industry. CMA is the state-of-the-art mobile augmentation model that employs resource-rich clouds to increase, enhance, and optimize computing capabilities of mobile devices aiming at execution of resource-intensive mobile applications. Augm ..."
Abstract
- Add to MetaCart
(Show Context)
approaches have gained remarkable ground from academia and industry. CMA is the state-of-the-art mobile augmentation model that employs resource-rich clouds to increase, enhance, and optimize computing capabilities of mobile devices aiming at execution of resource-intensive mobile applications. Augmented mobile devices envision to perform extensive computations and to store big data beyond their intrinsic capabilities with least footprint and vulnerability. Researchers utilize varied cloudbased computing resources (e.g., distant clouds and nearby mobile nodes) to meet various computing requirements of mobile users. However, employing cloud-based computing resources is not a straightforward panacea. Comprehending critical factors (e.g., current state of mobile client and remote resources) that impact on augmentation process and optimum selection of cloudbased resource types are some challenges that hinder CMA
Cloud Computing: Data Storage Security Analysis and its Challenges
"... Cloud computing is emerging as a new technology in the field of computing which effects many aspects of computing. The users are enabled to move their data and application software to the network and access the services on-demand. Moving data outside the organizational boundaries and access them thr ..."
Abstract
- Add to MetaCart
(Show Context)
Cloud computing is emerging as a new technology in the field of computing which effects many aspects of computing. The users are enabled to move their data and application software to the network and access the services on-demand. Moving data outside the organizational boundaries and access them through internet makes complete loss of control from the owner’s side. The data over the cloud servers is easily accessed by both the computing providers and law enforcement agencies easier in comparison to data stored on your local disk. Cloud brings many different security issues and among them data security acts as one of the major challenge in cloud computing. Data security becomes an important issue for securing outsourced data and to maintain a level of trust among data owners. In this paper we will analyze the security requirements and the various approaches for data security. We also highlight the new emerging research challenges in data security and privacy.
A Modified Heuristic-Block Protocol Model for Privacy and Concurrency in Cloud
"... Abstract—With boost in the figure of cloud users and the magnitude of sensitive data on cloud, shielding of cloud has become more important. Competent methods are consistently desirable to ensure the information privacy and load management of outsource data on un-trusted cloud servers. The base of o ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract—With boost in the figure of cloud users and the magnitude of sensitive data on cloud, shielding of cloud has become more important. Competent methods are consistently desirable to ensure the information privacy and load management of outsource data on un-trusted cloud servers. The base of our proposed idea is the chronological display of metaheuristic firefly algorithm and blocks based Merkle hash tree protocol. This pool of combination significantly reduces the communication delay and I/O costs. The projected scheme in addition considers the dynamic data operations at block level while maintaining the equivalent security assurance. Our method makes use of third party auditor to periodically verify the data stored at cloud provider side. Our elucidation removes the burden of verification from the user side and alleviates both the user’s and storage service’s fear about data outburst and data corruptions.