Abstract:The term "cloud computing" has been mentioned for just under two years in relation to services or infrastructural resources, which can be contracted over a network. Cloud computing is a flexible, cost-effective, and proven delivery platform for providing business or consumer it services over the internet. However, cloud computing presents an added level of risk because essential services are often outsourced to a third party, which makes it harder to maintain data security and privacy, support data, service availability and demonstrate compliance. we analyze many technologies, it also inherits their security issues identifying the main vulnerabilities in this kind of systems and the most important threats found in the literature related to cloud computing and its environment as well as to identify and relate vulnerabilities and threats with possible solutions. Cloud computing is surrounded by many security issues like securing data, and examining the utilization of cloud by the cloud computing vendors. Cloud computing has brought lots of security challenges for the consumers and service providers. The study aims to identify the most vulnerable security threats in cloud computing, which will enable both end users and vendors to know about the key security threats associated with cloud computing. It will enable researchers and security professionals to know about users, vendors concerns and also to critical analysis about the different security models and tools proposed.
The Ambient Network project aims at designing a future networking environment where today's networks (cellular, wireless, fixed) are seamlessly integrated offering a richer and smarter networking experience to applications and users. An efficient resource management method to deal with different characteristics of the heterogeneous technologies is the need of the hour. IXP 2800 network processor is the high end device designed for 10 gigabit data rates with typical usage in high speed packet forwarding systems and ambient networks. This project aims at using network processors for solving resource management issues in ambient networks. The problem of fair allocation among contending traffic flows on a link has been extensively reasearched. Moreover, conventional resource scheduling algorithms depend strongly upon the assumption of prior knowledge of network parameters and cannot handle variations or lack of information about these parameters. In this paper a novel scheduler called the Composite Bandwidth and CPU Scheduler (CBCS). Which jointly allocates the fair share of the link bandwidth as well as processing resource to all competing flows. CBCS also uses a simple and adaptive online prediction scheme for reliably estimating the processing time of the packet.
Most of the protocols and algorithms used in MANET, are assuming that all mobile nodes cooperate fully with the functionalities of the network. But some nodes are cooperate partially or not at all cooperating. Network performance and data accessibility, accessing time, query delay are affected by these selfish nodes. The discussion of this paper is about, representing a Replica server which solves the selfishness. The Replica server monitors and maintains the status of all mobile nodes in the network. If it finds any selfish node in the shortest path between source and destination, the replica server will analyze the reason for selfishness and it finds solution. The conducted simulations demonstrate the proposed approach based on proxy method which outperforms in terms of network parameters such as accessing data, time and cost and also it improves the network performance of MANET.
Distributed Denial of Service attacks has become prevalent in the context of ever growing Internet. Numerous attacks have taken place in the past and numerous solutions have been suggested. Intrusion detection and filtering are necessary mechanisms to combat against these attacks and secure networks. However, the existing detection techniques for DDoS attacks have their entities work in isolation. In this paper, we propose an efficient and distributed collaborative architecture that allows the placement and the cooperation of the defense entities to better address the main security challenges. The use of Distributed Spanning Trees (DST) algorithm controls the damage caused by Distributed Denial of Service attacks by using propagation and traceback mechanism. Simulations show that DST-based tracing behave better than randomly generated graphs and trees as it generates less messages to query all computers while avoiding the tree bottlenecks.
General TermsPeer-to-Peer Network, Security.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.