Cloud computing has emerged as one of the most groundbreaking technologies to have redefined the bounds of conventional computing techniques. It has ushered in a paradigm shift and pushed the frontiers of how computing assets, inclusive of infrastructure resources, software, and applications can be used, adopted, and purchased. The economic benefits or rather the fundamental economic shift offered by cloud computing in reducing capital expenditure and converting it to operational expenditure has been a primary motivating factor for early adopters. However, despite its inherent advantages that include better access and control, there exist several reservations around cloud computing that have impeded its growth. The control, elasticity, and ease of use that cloud computing is associated with also engender many security issues. Security is considered to be the topmost hurdle out of the nine identified challenges of cloud computing as underlined by the study conducted by the International Data Corporation. It therefore follows that an exceedingly secure system is essential for the safeguarding of an organizational entity, its resources, and assets. In this article, it is our endeavor to offer insights into the implementation of a novel architecture that can deliver an enhanced degree of security for outsourcing information in a cloud computing environment while involving numerous independent cloud providers. The framework comprises of dual encryption and data fragmentation techniques that envision the secure distribution of information in a multicloud environment. The various concerns surrounding this area, specifically, the challenges of integrity, security, confidentiality, and authentication have been addressed. All simulations and scrutiny have been accomplished on an Oracle virtual machine Virtual‐Box and a Fog environment on an Ubuntu 16.04 platform. Extensive safety measures and performance analysis that take into account diverse parameters, especially execution time, integrity, throughput, entropy, transfer rate, and delay demonstrate that our projected proposal is vastly proficient and satisfies the security prerequisites of secure data sharing and can efficiently withstand security attacks.
Wireless Sensor Network (WSN) is powerful and economical key to monitoring and tracking problems. WSN is a perfect unification of sensing, computation and communications tasks. WSN nodes are deployed in both hostile and harsh environment. They lend valuable support for continuous, remote monitoring, and for healthcare applications. WSN nodes can be deployed easily in existing structures without any added infrastructure. In this work, an outline of wireless sensor networks, applications, challenges & issues involved in implementing them is presented.
Cloud computing utilizes enormous clusters of serviceable and manageable resources that can be virtually and dynamically recon gured in order to deliver optimum resource utilization by exploiting the pay-per-use model. However, concerns around security have been an impediment in the extensive adoption of the cloud computing model. In this regard, advancements in cryptography, accelerated by the wide usage of the internet worldwide, has emerged as a key area in addressing some of these security concerns. In this document, a hybrid cryptographic protocol deploying Blow sh and Paillier encryption algorithms has been presented and its strength compared with the existing hybrid Advanced Encryption Standard (AES) and Rivest Shamir Adleman (RSA) techniques. Algorithms for secure data storage protocol in two phases have been presented. The proposed hybrid protocol endeavors to improve the power of cloud storage through a decrease in computation time and ciphertext size. Simulations have been carried out with Oracle Virtual Box and Fog server used on an Ubuntu 16.04 platform. This grouping of asymmetric and homomorphic procedures has demonstrated enhanced security. Compression usage has helped in decreasing the storage space and computation time. Performance analysis in terms of computation overhead and quality of service parameters like loads of parameters with and without attacks, throughput, and stream length for different modes of block cipher mode has been carried out. Security analysis has been carried out by utilizing the Hardening Index as an audit parameter using Lynis 2.7.1. Similarly, for halting the aforementioned approaches and for regulating traf c, rewall protection has been generated in the chosen hybrid algorithms. Finally, enhancements in the performance of the Paillier and Blow sh hybrid scheme with and without compression
The emergence of big data as a novel model gives unparalleled composition and value for an organization. The growth of big data is posing challenges in areas such as processing, analytics, sharing, and visualization. Interestingly, the cloud computing technology also emanated to specify important required infrastructure to tackle these disputes. Cloud computing is an effective interface that’s used to manipulate enormous-scale and complicated calculations. It eliminated the requirement to sustain lavish computing hardware, dedicated infrastructure, and software. Big data and cloud computing (BDCC) are considered to become the source of productivity that drives today’s electronic business transformations. Nonetheless, the ratio of the companies that adopt and use BDCC isn’t significant. There are also obstacles to facilitating BDCC’s market proliferation. Hence, this paper aims to recognize and emphasize the factors that affect the adoption and use of BDCC in technology-organization-environment (TOE) viewpoints in enterprises. Data were obtained from a sample of 100 companies to scientifically check our system. The understanding of BDCC’s potential advantages and technical capabilities are defined as the BDCC’s important elements. Consistency with current infrastructure, data reliability and functionality, and protection and privacy are highly rated within the sense of technologies. Managerial expertise and financial expenditure capacity for the application and use of BDCC and governmental assistance and regulation are defined as organizational and environmental considerations for acceptance and use, simultaneously.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.