• 제목/요약/키워드: Research Challenges in the Cloud

검색결과 50건 처리시간 0.028초

A Model to Investigate the Security Challenges and Vulnerabilities of Cloud Computing Services in Wireless Networks

  • Desta Dana Data
    • International Journal of Computer Science & Network Security
    • /
    • 제23권10호
    • /
    • pp.107-114
    • /
    • 2023
  • The study provides the identification of vulnerabilities in the security issues by Wireless Network. To achieve it the research focus on packet flow analysis, end to end data communication, and the security challenges (Cybercrime, insider threat, attackers, hactivist, malware and Ransomware). To solve this I have used the systematic literature review mechanisms and demonstrative tool namely Wireshark network analyzer. The practical demonstration identifies the packet flow, packet length time, data flow statistics, end- to- end packet flow, reached and lost packets in the network and input/output packet statics graphs. Then, I have developed the proposed model that used to secure the Wireless network solution and prevention vulnerabilities of the network security challenges. And applying the model that used to investigate the security challenges and vulnerabilities of cloud computing services is used to fulfill the network security goals in Wireless network. Finally the research provides the model that investigate the security challenges and vulnerabilities of cloud computing services in wireless networks

Adaptive Resource Management and Provisioning in the Cloud Computing: A Survey of Definitions, Standards and Research Roadmaps

  • Keshavarzi, Amin;Haghighat, Abolfazl Toroghi;Bohlouli, Mahdi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권9호
    • /
    • pp.4280-4300
    • /
    • 2017
  • The fact that cloud computing services have been proposed in recent years, organizations and individuals face with various challenges and problems such as how to migrate applications and software platforms into cloud or how to ensure security of migrated applications. This study reviews the current challenges and open issues in cloud computing, with the focus on autonomic resource management especially in federated clouds. In addition, this study provides recommendations and research roadmaps for scientific activities, as well as potential improvements in federated cloud computing. This survey study covers results achieved through 190 literatures including books, journal and conference papers, industrial reports, forums, and project reports. A solution is proposed for autonomic resource management in the federated clouds, using machine learning and statistical analysis in order to provide better and efficient resource management.

Dynamic Collaborative Cloud Service Platform: Opportunities and Challenges

  • Yoon, Chang-Woo;Hassan, Mohammad Mehedi;Lee, Hyun-Woo;Ryu, Won;Huh, Eui-Nam
    • ETRI Journal
    • /
    • 제32권4호
    • /
    • pp.634-637
    • /
    • 2010
  • This letter presents a model for a dynamic collaboration (DC) platform among cloud providers (CPs) that prevents adverse business impacts, cloud vendor lock-in and violation of service level agreements with consumers, and also offers collaborative cloud services to consumers. We consider two major challenges. The first challenge is to find an appropriate market model in order to enable the DC platform. The second is to select suitable collaborative partners to provide services. We propose a novel combinatorial auction-based cloud market model that enables a DC platform among CPs. We also propose a new promising multi-objective optimization model to quantitatively evaluate the partners. Simulation experiments were conducted to verify both of the proposed models.

Prospects and Challenges of Implementing Cloud Accounting in Bangladesh

  • SAHA, Trina;DAS, Sumon Kumar;RAHMAN, Md. Moshiur;SIDDIQUE, Fahimul Kader;UDDIN, Mohammad Gias
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제7권12호
    • /
    • pp.275-282
    • /
    • 2020
  • The objectives of this study are to understand the meaning of cloud accounting, to investigate whether it is favorable for performance of the organization and what are the challenges if a country like Bangladesh wants to implement it. Primary data have been collected from 300 respondents selected from the field of accounting, such as accountants, accounting graduates of different universities, teachers and bankers. To measure the reliability and validity of the sample size and data, KMO and Bartlett's test have been adopted and the results proved to be reliable and valid for the study. Regression analysis has been done to find out the positive impact of cloud accounting on organizational performance and negative impact of cloud accounting on existing accounting system of the organization. The results of regression analysis supported our alternative hypotheses that cloud accounting can improve organizational performance, but it has also some negative impacts. Descriptive statistics have been used to find out the probable challenges that may be faced by organizations that want to implement it. This is a pioneering study because there is little research on this topic, thus it is expected to develop awareness about cloud accounting in field of accounting in Bangladesh.

A Survey of Security and Privacy Challenges in Cloud Computing: Solutions and Future Directions

  • Liu, Yuhong;Sun, Yan Lindsay;Ryoo, Jungwoo;Rizvi, Syed;Vasilakos, Athanasios V.
    • Journal of Computing Science and Engineering
    • /
    • 제9권3호
    • /
    • pp.119-133
    • /
    • 2015
  • While cloud computing is gaining popularity, diverse security and privacy issues are emerging that hinder the rapid adoption of this new computing paradigm. And the development of defensive solutions is lagging behind. To ensure a secure and trustworthy cloud environment it is essential to identify the limitations of existing solutions and envision directions for future research. In this paper, we have surveyed critical security and privacy challenges in cloud computing, categorized diverse existing solutions, compared their strengths and limitations, and envisioned future research directions.

Challenges and Issues of Resource Allocation Techniques in Cloud Computing

  • Abid, Adnan;Manzoor, Muhammad Faraz;Farooq, Muhammad Shoaib;Farooq, Uzma;Hussain, Muzammil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권7호
    • /
    • pp.2815-2839
    • /
    • 2020
  • In a cloud computing paradigm, allocation of various virtualized ICT resources is a complex problem due to the presence of heterogeneous application (MapReduce, content delivery and networks web applications) workloads having contentious allocation requirements in terms of ICT resource capacities (resource utilization, execution time, response time, etc.). This task of resource allocation becomes more challenging due to finite available resources and increasing consumer demands. Therefore, many unique models and techniques have been proposed to allocate resources efficiently. However, there is no published research available in this domain that clearly address this research problem and provides research taxonomy for classification of resource allocation techniques including strategic, target resources, optimization, scheduling and power. Hence, the main aim of this paper is to identify open challenges faced by the cloud service provider related to allocation of resource such as servers, storage and networks in cloud computing. More than 70 articles, between year 2007 and 2020, related to resource allocation in cloud computing have been shortlisted through a structured mechanism and are reviewed under clearly defined objectives. Lastly, the evolution of research in resource allocation techniques has also been discussed along with salient future directions in this area.

Fine Grained Security in Cloud with Cryptographic Access Control

  • Aparna Manikonda;Nalini N
    • International Journal of Computer Science & Network Security
    • /
    • 제24권7호
    • /
    • pp.123-127
    • /
    • 2024
  • Cloud computing services has gained increasing popularity in recent years for supporting various on demand and scalable services for IT consumers where there is a need of less investment towards infrastructure. While storage architecture of cloud enjoys a more robust and fault-tolerant cloud computing network, such architecture also poses a number of security challenges especially when applied in applications related to social networks, Financial transactions, etc. First, as data are stored and maintained by individual virtual machines so Cloud resources are prone to hijacked. Such attacks allow attackers to create, modify and delete machine images, and change administrative passwords and settings successfully. hence, it is significantly harder to ensure data security. Second, Due to dynamic and shared nature of the Cloud, data may be compromised in many ways. Last but not least, Service hijacking may lead to redirect client to an illegitimate website. User accounts and service instances could in turn make a new base for attackers. To address the above challenges, we propose in this paper a distributed data access control scheme that is able to fulfil fine-grained access control over cloud data and is resilient against strong attacks such as compromise and user colluding. The proposed framework exploits a novel cryptographic primitive called attribute-based encryption (ABE), tailors, and adapts it for cloud computing with respect to security requirements

Future Trends of Blockchain and Crypto Currency: Challenges, Opportunities, and Solutions

  • Sung, Yunsick;Park, James J.(Jong Hyuk)
    • Journal of Information Processing Systems
    • /
    • 제15권3호
    • /
    • pp.457-463
    • /
    • 2019
  • The blockchain and crypto currency has become one of the most essential components of a communication network in the recent years. Through communication networking, we browse the internet, make VoIP phone calls, have video conferences and check e-mails via computers. A lot of researches are being conducting to address the blockchain and crypto currency challenges in communication networking and provide corresponding solutions. In this paper, a diverse kind of novel research works in terms of mechanisms, techniques, architectures, and frameworks have been proposed to provide possible solutions against the existing challenges in the communication networking. Such novel research works involve thermal load capacity techniques, intelligent sensing mechanism, secure cloud computing system communication algorithm for wearable healthcare systems, sentiment analysis, optimized resources.

Analysis of Cybercrime Investigation Problems in the Cloud Environment

  • Khachatryan, Grigor
    • International Journal of Computer Science & Network Security
    • /
    • 제22권7호
    • /
    • pp.315-319
    • /
    • 2022
  • Cloud computing has emerged to be the most effective headway for investigating crime especially cybercrime in this modern world. Even as we move towards an information technology-controlled world, it is important to note that when innovations are made, some negative implications also come with it, and an example of this is these criminal activities that involve technology, network devices, and networking that have emerged as a result of web improvements. These criminal activities are the ones that have been termed cybercrime. It is because of these increased criminal activities that organizations have come up with different strategies that they use to counter these crimes, and one of them is carrying out investigations using the cloud environment. A cloud environment has been defined as the use of web-based applications that are used for software installation and data stored in computers. This paper examines problems that are a result of cybercrime investigation in the cloud environment. Through analysis of the two components in play; cybercrime and cloud environment, we will be able to understand what are the problems that are encountered when carrying out investigations in cloud forensics. Through the use of secondary research, this paper found out that most problems are associated with technical and legal channels that are involved in carrying out these investigations. Investigator's mistakes when extracting pieces of evidence form the most crucial problems that take a lead when it comes to cybercrime investigation in the cloud environment. This paper not only flags out the challenges that are associated with cybercrime investigation in cloud environments but also offer recommendations and suggested solutions that can be used to counter the problems in question here. Through a proposed model to perform forensics investigations, this paper discusses new methodologies solutions, and developments for performing cybercrime investigations in the cloud environment.

An Engine for DRA in Container Orchestration Using Machine Learning

  • Gun-Woo Kim;Seo-Yeon Gu;Seok-Jae Moon;Byung-Joon Park
    • International journal of advanced smart convergence
    • /
    • 제12권4호
    • /
    • pp.126-133
    • /
    • 2023
  • Recent advancements in cloud service virtualization technologies have witnessed a shift from a Virtual Machine-centric approach to a container-centric paradigm, offering advantages such as faster deployment and enhanced portability. Container orchestration has emerged as a key technology for efficient management and scheduling of these containers. However, with the increasing complexity and diversity of heterogeneous workloads and service types, resource scheduling has become a challenging task. Various research endeavors are underway to address the challenges posed by diverse workloads and services. Yet, a systematic approach to container orchestration for effective cloud management has not been clearly defined. This paper proposes the DRA-Engine (Dynamic Resource Allocation Engine) for resource scheduling in container orchestration. The proposed engine comprises the Request Load Procedure, Required Resource Measurement Procedure, and Resource Provision Decision Procedure. Through these components, the DRA-Engine dynamically allocates resources according to the application's requirements, presenting a solution to the challenges of resource scheduling in container orchestration.