New mechanism for Cloud Computing Storage Security
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 7
Abstract
Cloud computing, often referred to as simply the cloud, appears as an emerging computing paradigm which promises to radically change the way computer applications and services are constructed, delivered, managed and finally guaranteed as dynamic computing environments for end users. The cloud is the delivery of on-demand computing resources - everything from applications to data centers - over the Internet on a pay-for-use basis. The revolution of cloud computing has provided opportunities for research in all aspects of cloud computing. Despite the big progress in cloud computing technologies, funding concerns in cloud, security may limit a broader adoption. This paper presents a technique to tolerate both accidental and intentional faults, which is fragmentation-redundancy-scattering (FRS). The possibility to use the FRS technique as an intrusion tolerance one is investigated for providing secure and dependable storage in the cloud environment. Also a cloud computing security (CCS) based on the FRS technique is proposed to explore how this proposal can then be used via several scenarios. To demonstrate the robustness of the proposal, we formalize our design and we carry out a security as well as performance evaluations of the approach and we compare it with the classical model. The paper concludes by strongly suggesting future research proposals for the CCS framework.
Authors and Affiliations
Almokhtar Mrabti, Najim Ammari, Anas Kalam, Abdellah Ouahman, Mina Montfort
Novel Conception of a Tunable RF MEMS Resonator
This paper presents a new monolithic microwave integrated circuit (MMIC) based on coplanar waveguide (CPW) design for a tunable resonator based on RF MEMS. This RF structure, which can be used for system on chip (SOC), i...
Developing Communication Strategy for Multi-Agent Systems with Incremental Fuzzy Model
Communication can guarantee the coordinated behavior in the multi-agent systems. However, in many real-world problems, communication may not be available at every time because of limited bandwidth, noisy environment or c...
Hyperspectral Image Segmentation using Homogeneous Area Limiting and Shortest Path Algorithm
Segmentation, as a preprocessing, plays an important role in hyperspectral images. In this paper, considering the similarity of neighboring pixels, using the size measure, the image spectrum is divided into several segme...
The Impact and Challenges of Cloud Computing Adoption on Public Universities in Southwestern Nigeria
This study investigates the impact and challenges of the adoption of cloud computing by public universities in the Southwestern part of Nigeria. A sample size of 100 IT staff, 50 para-IT staff and 50 students were select...
The Solution Structure and Error Estimation for The Generalized Linear Complementarity Problem
In this paper, we consider the generalized linear complementarity problem (GLCP). Firstly, we develop some equivalent reformulations of the problem under milder conditions, and then characterize the solution of the GLCP....