• Title/Summary/Keyword: Cloud computing services

Search Result 644, Processing Time 0.029 seconds

A Framework for Establishing Cloud Service Certification Systems (클라우드 서비스 인증제도 수립을 위한 프레임워크)

  • Seo, Kwang-Kyu
    • Informatization Policy
    • /
    • v.18 no.1
    • /
    • pp.24-44
    • /
    • 2011
  • The evolution of cloud computing over the past few years is potentially one of the major advances in information technology. However, if cloud computing is to achieve its potential, there needs to be a clear identification and understanding of the various issues involved, both from the perspectives of the providers and the consumers of the technology. While a lot of research is currently taking place in the technology itself, there is an equally urgent need for understanding the business-related issues surrounding cloud computing service. As more and more information on individuals and companies are placed in the cloud service, concerns are beginning to grow about just how safe and reliable an environment it is. For successful implementation of cloud services, it is necessary to establish the certification systems to ensure the safety and reliability of cloud services. This paper provides a safe and reliable framework for cloud service certification systems. In order to develop it, the critical issues related to service quality and certification of cloud services have been identified and the systematic framework for certification systems of cloud services and service provider domains have been developed. An evaluation method for the developed certification systems is also proposed.

  • PDF

SECURITY THREATS AND ATTACKS IN CLOUD

  • Mohammed, Asma;Al khathami, Jamilah;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.184-191
    • /
    • 2021
  • The amount of information and data in the digital era is increasing tremendously. Continuous online connectivity is generating a massive amount of data that needs to store in computers and be made available as and when required. Cloud computing technology plays a pivotal role in this league. Cloud computing is a term that refers to computer systems, resources and online services that aim to protect and manage data in an effective, more efficient and easy way. Cloud computing is an important standard for maintaining the integrity and security of sensitive data and information for organizations and individuals. Cloud security is one of the most important challenges that the security of the entire cloud system depends on. Thus, the present study reviews the security challenges that exist in cloud computing, including attacks that negatively affect cloud resources. The study also addresses the most serious threats that affect cloud security. We also reviewed several studies, specifically those from 2017-20, that cited effective mechanisms to protect authentication, availability and connection security in the cloud. The present analysis aims to provide solutions to the problems and causes of cloud computing security system violations, which can be used now and developed in the future.

Services Quality Improvement through Control Management Cloud-Based SLA

  • Abel Adane
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.89-94
    • /
    • 2023
  • Cloud-based technology is used in different organizations around the world for various purposes. Using this technology, the service providers provide the service mainly SaaS, PaaS and while the cloud service consumer consumes the services by paying for the service they used or accessed by the principle of "pay per use". The customer of the services can get any services being at different places or locations using different machines or electronic devices. Under the conditions of being well organized and having all necessary infrastructures, the services can be accessed suitably. The identified problem in this study is that cloud providers control and monitor the system or tools by ignoring the calculation and consideration of various faults made from the cloud provider side during service delivery. There are currently problems with ignoring the consumer or client during the monitoring and mentoring system for cloud services consumed at the customer or client level by SLA provisions. The new framework was developed to address the above-mentioned problems. The framework was developed as a unified modeling language. Eight basic components are used to develop the framework. For this research, the researcher developed a prototype by using a selected cloud tool to simulate and java programming language to write a code as well as MySQL to store data during SLA. The researcher used different criteria to validate the developed framework i.e. to validate SLA that is concerned with a cloud service provider, validate what happened when the request from the client-side is less than what is specified in SLA and above what is specified in SLA as well as implementing the monitoring mechanism using the developed Monitoring component. The researcher observed that with the 1st and 3rd criteria the service level agreement was violated and this indicated that if the Service level agreement is monitored or managed only by cloud service prover, there is a violation of LSA. Therefore, the researcher recommended that the service level agreement be managed by both cloud service providers and service consumers in the cloud computing environment.

An Exploratory Study on the Derivation of Characteristics of Personal Cloud Computing (개인용 클라우드 컴퓨팅의 특성 도출에 관한 탐색적 연구)

  • Moon, Hye Young;Ryu, Jae Hong;Choi, Jinho
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.2
    • /
    • pp.57-68
    • /
    • 2013
  • Recently, cloud computing has been viewed as a technology of great influence. Despite the importance of personal cloud services, the majority of cloud computing studies has been focused on an enterprise level. Therefore, in this research, we list variables of personal cloud computing characteristics (accessibility, storage, trust, perceived ease of use, availability) from preceding research done on an enterprise level. So, through pilot testing, we analyze whether examined characteristic variables affect the intention to use personal cloud computing. Next, we investigate the relevancy between user characteristics, including gender, age, and occupation, and the usage rate of personal cloud computing. Lastly, we implement an analysis of variance in order to speculate whether there is any difference between the five characteristic variables in using personal cloud computing between cloud service enterprises. For empirical testing people with experience in personal cloud computing are surveyed. Frequency analysis, exploratory factor analysis, internal consistency analysis, T-test, ANOVA, and multiple regression analysis are implemented with 325 valid samples. The analysis results are as follows: First, among user characteristic variables, 'occupation' shows a significant relationship with cloud service usage, Second, between cloud service enterprises, all five characteristic variables of 'Naver N Drive' are thoroughly evaluated and 'Google Drive' receives a high evaluation in availability and accessibility. Third and finally, all of the selected characteristic variables affect the intention to use personal cloud computing. However, availability is identified to be the most important factor. This research will serve as a reference to enterprises for the practical implementation of personal cloud computing service.

ACCESS CONTROL MODEL FOR DATA STORED ON CLOUD COMPUTING

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Rehan, Akmal;Mumtaz, Imran;Ahmad, Wasi
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.208-221
    • /
    • 2019
  • The inference for this research was concentrated on client's data protection in cloud computing i.e. data storages protection problems and how to limit unauthenticated access to info by developing access control model then accessible preparations were introduce after that an access control model was recommend. Cloud computing might refer as technology base on internet, having share, adaptable authority that might be utilized as organization by clients. Compositely cloud computing is software's and hardware's are conveying by internet as a service. It is a remarkable technology get well known because of minimal efforts, adaptability and versatility according to client's necessity. Regardless its prevalence large administration, propositions are reluctant to proceed onward cloud computing because of protection problems, particularly client's info protection. Management have communicated worries overs info protection as their classified and delicate info should be put away by specialist management at any areas all around. Several access models were accessible, yet those models do not satisfy the protection obligations as per services producers and cloud is always under assaults of hackers and data integrity, accessibility and protection were traded off. This research presented a model keep in aspect the requirement of services producers that upgrading the info protection in items of integrity, accessibility and security. The developed model helped the reluctant clients to effectively choosing to move on cloud while considerate the uncertainty related with cloud computing.

Script-based cloud integration mechanism to support hybrid cloud implementation (하이브리드 클라우드 구축을 지원하기 위한 스크립트 기반의 클라우드 결합 기법)

  • Kim, Ungsoo;Park, Joonseok;Yeom, Keunhyuk
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.5
    • /
    • pp.80-92
    • /
    • 2017
  • The popularity of cloud computing has led to the emergence of various types of cloud services, and the hybrid cloud, a deployment model that integrates public cloud and private cloud and offset their shortcomings, is in the spotlight recently. However, the complexity of different clouds integration and the lack of related integration solutions have delayed the adoption of hybrid cloud and cloud strategy by companies and organizations. Therefore, in this paper, we propose a cloud integration mechanism to solve the integration complexity problem. The cloud integration mechanism proposed in this paper consists of integration script that solves the cloud integration by the script based on the hybrid cloud function, a process of creating and executing it, and a script creation model applying the software design pattern. By integrating the various cloud services, we can quickly generate scripts that meet the user's needs. It is expected that the introduction of hybrid cloud and the acquisition of cloud strategy can be accelerated through this proposed integration mechanism.

A Cloud Workflow Model Based on the Information Control Net (정보제어넷 기반 클라우드 워크플로우 모델)

  • Sun, Kai;Ahn, Hyun;Kim, Kwanghoon Pio
    • Journal of Internet Computing and Services
    • /
    • v.19 no.3
    • /
    • pp.25-33
    • /
    • 2018
  • This paper proposes a cloud workflow model theoretically supported by the information control net modeling methodology as a cloud workflow modeling methodology that is mandatory in implementing realtime enterprise workflow management systems running with cloud computing environments. The eventual goal of the cloud workflow model proposed in this paper is to support those cloud workflow architectures reflecting the types of cloud deployment models such as private, community, public, and hybrid cloud deployment models. Moreover, the proposed model is a mathematical graph model that is extended from the information control net modeling methodology used in conventional enterprise workflow modeling, and it aims to theoretically couple this methodology with the cloud deployment models. Finally, this paper tries to verify the feasibility of the proposed model by building a possible cloud workflow architecture and its cloud workflow services on a realtime enterpeise cloud workflow management system.

Efficient Public Verification on the Integrity of Multi-Owner Data in the Cloud

  • Wang, Boyang;Li, Hui;Liu, Xuefeng;Li, Fenghua;Li, Xiaoqing
    • Journal of Communications and Networks
    • /
    • v.16 no.6
    • /
    • pp.592-599
    • /
    • 2014
  • Cloud computing enables users to easily store their data and simply share data with others. Due to the security threats in an untrusted cloud, users are recommended to compute verification metadata, such as signatures, on their data to protect the integrity. Many mechanisms have been proposed to allow a public verifier to efficiently audit cloud data integrity without receiving the entire data from the cloud. However, to the best of our knowledge, none of them has considered about the efficiency of public verification on multi-owner data, where each block in data is signed by multiple owners. In this paper, we propose a novel public verification mechanism to audit the integrity of multi-owner data in an untrusted cloud by taking the advantage of multisignatures. With our mechanism, the verification time and storage overhead of signatures on multi-owner data in the cloud are independent with the number of owners. In addition, we demonstrate the security of our scheme with rigorous proofs. Compared to the straightforward extension of previous mechanisms, our mechanism shows a better performance in experiments.

Cloud Computing Acceptance at Individual Level Based on Extended UTAUT (확장된 UTAUT 모형에 기반한 개인차원에서의 클라우드 컴퓨팅 수용)

  • Jung, Chul Ho;Namn, Su Hyeon
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.287-294
    • /
    • 2014
  • Cloud computing is a new method of computing and managing organizational information technology resources strategically. From the user perspective, it involves computing environment for accessing applications remotely, storing data, and supporting cooperative works. For the cloud computing to be effective in an organization, it should be accepted by individual users. In this paper we propose a research model, extending and modifying UTAUT model. We also test the validity of the model using the questionnaire from a sample of cloud computing services users.

Open Source Cloud Computing: An Experience Case of Geo-based Image Handling in Amazon Web Services

  • Lee, Ki-Won
    • Korean Journal of Remote Sensing
    • /
    • v.28 no.3
    • /
    • pp.337-346
    • /
    • 2012
  • In the view from most application system developers and users, cloud computing becomes popular in recent years and is still evolving. But in fact it is not easy to reach at the level of actual operations. Despite, it is known that the cloud in the practical stage provides a new pattern for deploying a geo-spatial application. However, domestically geo-spatial application implementation and operation based on this concept or scheme is on the beginning stage. It is the motivation of this works. Although this study is an introductory level, a simple and practical processed result was presented. This study was carried out on Amazon web services platform, as infrastructure as a service in the geo-spatial areas. Under this environment, cloud instance, a web and mobile system being previously implemented in the multi-layered structure for geo-spatial open sources of database and application server, was generated. Judging from this example, it is highly possible that cloud services with the functions of geo-processing service and large volume data handling are the crucial point, leading a new business model for civilian remote sensing application and geo-spatial enterprise industry. The further works to extend geo-spatial applications in cloud computing paradigm are left.