<p>Use of the same application by multiple users through internet as a service is supported by cloud computing system. Both the user and attacker stay in the same machine as both of them are users of the same application creating an in-secure environment. Service must ensure secrecy both at the application and data layer level. Data isolation and Application isolation are two basic aspects that must be ensured to cater for security as desired by the clients that accesses the service. In this paper a more secured mechanism has been presented that help ensuring data isolation and security when Multi-tenancy of the users to the same service has been implemented.</p>
The main concern for the customers and the organizations to use services offered by Cloud computing providers is the confidentiality and security of the data stored using the sharable infrastructure. Customers also want to use the support provided by the service providers according to their application requirements, which leads to the configuration of the infrastructure provided to the customers as per their requirements.Most of the cloud computing services provided are rigid and do not allow customers to make changes. Users have options to use Open source-based cloud computing systems such as OpenStack, but these platforms to suffer from various weaknesses especially exposing the vulnerabilities attacked. OpenStack open-source cloud computing systems are frequently being used by many users who want to build a cloud computing infrastructure on their own for either private or public purposes.A dedicated component "Keystone" of OpenStack used for providing security to the resources provisioned and used by the users through processes that are related to authentication, authorization, access control and data security. Keystone uses Ferment Tokens for Authentication and Authorization which exposes much vulnerability. Many authentication systems are in use such as Active Directory System, Integrated Management System etc. The use of such order within the Cloud Computing Architecture helps to implement a high level of security to the user programs and Data.Multi-Factor systems used for implementing high-level security which takes benefit of two authentication systems which are interconnected, while one system being native, the other could be an external authentication system such as ADDS or IMS. In this paper, a Multi-factor based authentication system implemented that focuses on integrating the "Keystone" based authentication system achieved within OpenStack, and Integrated identity Management System applied within the RED Hat Operating System.
Information dissemination is taking place these days heavily using web sites which are hosted on the internet. The effectiveness and effi-ciency of the design of the WEB site will have great effect on the way the content hosted on the WEB can be accessed. Quality of a web site, places a vital role in making available the required information to the end user with ease satisfying the users content requirements. A framework has been proposed comprising 42 quality metrics using which the quality of a web site can be measured. Howevercompu-tations procedures have not been stated in realistic terms.In this paper, computational procedures for measuring “usability” of a WEB site can be measured which can be included into overall computation of the quality of a web site.
One of the most important features of an IOT network is heterogeneity among the devices, subnets, communication systems, data storage and retrieval. IOT can be conceived to be in existence in hierarchal structure having situated in many layers. In each of the layer there is an element of heterogeneity. The heterogeneity is more severe in the layer which deals with real connect and communication.In this paper different strategies are explored for handling heterogeneity among communication protocols that are used for effecting communication among devices, cluster of devices and the alike
Internet of things (IOT) is a layered network and generally heterogeneous as communication between small things like digital cameras and big things like servers has to happen. The communication speeds of various devices connected on to IOT are in great variance affecting the performance of the entire network. The small devices connected on to IOT are fragile in the sense that they tend to fail quite often affecting the performance of the network. The small devices are low in energy depletion of which is rather fast. The small devices also have heavy latency. Many such issues exists that effect the performance of an IOT network. In this paper, various issues/bottlenecks that hamper the performance of an IOT network are and a mitigation strategy for improving the performance of the IOT networks is discussed.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.