Despite several cost-effective and flexible characteristics of cloud computing, some clients are reluctant to adopt this paradigm due to emerging security and privacy concerns. Organization such as Healthcare and Payment Card Industry where confidentiality of information is a vital act, are not assertive to trust the security techniques and privacy policies offered by cloud service providers. Malicious attackers have violated the cloud storages to steal, view, manipulate and tamper client's data. Attacks on cloud storages are extremely challenging to detect and mitigate. In order to formulate privacy preserved cloud storage, in this research paper, we propose an improved technique that consists of five contributions such as Resilient role-based access control mechanism, Partial homomorphic cryptography, metadata generation and sound steganography, Efficient third-party auditing service, Data backup and recovery process. We implemented these components using Java Enterprise Edition with Glassfish Server. Finally we evaluated our proposed technique by penetration testing and the results showed that client's data is intact and protected from malicious attackers.
Virtualization is one of the hottest research topics nowadays. Several academic researchers and developers from IT industry are designing approaches for solving security and manageability issues of Virtual Machines (VMs) residing on virtualized cloud infrastructures. Moving the application from a physical to a virtual platform increases the efficiency, flexibility and reduces management cost as well as effort. Cloud computing is adopting the paradigm of virtualization, using this technique, memory, CPU and computational power is provided to clients' VMs by utilizing the underlying physical hardware. Beside these advantages there are few challenges faced by adopting virtualization such as management of VMs and network traffic, unexpected additional cost and resource allocation. Virtual Machine Monitor (VMM) or hypervisor is the tool used by cloud providers to manage the VMs on cloud. There are several heterogeneous hypervisors provided by various vendors that include VMware, Hyper-V, Xen and Kernel Virtual Machine (KVM). Considering the challenge of VM management, this paper describes several techniques to monitor and manage virtualized cloud infrastructures.
Existing educational platforms are highly cost consuming and inefficient in-terms of scalability, flexibility of infrastructures, availability, recovery, accessibility and security. Cloud computing is considered as a flexible business and technological model for providing an Efficient Educational Platform (EEP) due to its significant features. However, an EEP is not a complete solution required by Educational Organizations (EOs), they require Efficient as well as Secure Educational Platform (ESEP). Since cloud computing is an open access global technology, there are several security threats that might take place from malicious users. EOs are reluctant to trust and adopt this paradigm because of threats that can compromise the security of their confidential data. In this research paper, we describe the ICT related challenges faced by educational platforms and we emphasize the significance of cloud computing in enabling an EEP, finally we propose a conceptual model for developing an ESEP. Our contribution consists of several security tools and techniques such as Trusted Virtual Domains (TVDs), Security as a Service (SECaaS), Intrusion Detection Tools, Trusted Platform Module (TPM), virtual TPM (vTPM).
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.