Table 1 - uploaded by Mahmoud Mohamed
Content may be subject to copyright.
Different types of cloud security category 

Different types of cloud security category 

Source publication
Article
Full-text available
Cloud is a pool of computing resources which are distributed among cloud users. Cloud computing has many benefits like scalability, flexibility, cost savings, reliability, maintenance and mobile accessibility. Since cloud-computing technology is growing day by day, it comes with many security problems. Securing the data in the cloud environment is...

Similar publications

Conference Paper
Full-text available
Managers increasingly seek ways to explore insights from data for business improvements and innovation. Data Analytics (DA) platforms hold promise for businesses, especially small businesses that cannot afford tailor-made proprietary analytics services. DA platforms offer generic analytics features to a pool of businesses, saving costs and enabling...

Citations

... The following lines describe the types of increasing noise in ciphertexts during homomorphic operations and present the most commonly used noise management strategies. Homomorphic encryption scheme When the encrypted data is stored on cloud [20,21], all kinds of computations [19] such as analyzing data, the calculation of variance, data mining, … are performed after prior decryption. The prior decryption brings an additional cost in terms of resources and time and introduces a possibility of loss of confidentiality and privacy. ...
Article
Full-text available
Homomorphic encryption is the Swiss army of cryptography. It allows to perform computations on encrypted data. this conjecture of processing on encrypted data was stated by [RAD78]. Until Gentry breakthrough in 2009, only partial solutions were offered. They deal with encrypted data with bounded functions in operations. Gentry raised the bound of number of operations by introducing a new method called the bootstrapping. This method allows to reduce the noise in the ciphertext and to perform more computing on it. Since Gentry's breakthrough, several improvements and several alternatives to the bootstrapping technique have been proposed to improve execution time and reduce resource consumption. This article studies the growth of noise and the noise management strategy in homomorphic encryption. It also presents the trend of hoping strategy from 2009 to 2016. Through the DGHV, it shows the management of noise on a one-bit encrypted message.
... Motawie, et al. [16] revealed how Base64 algorithm was implemented to encode the JAR file for securing data from unauthorised users. The proposed work gives benefits of log files, and these log files send to Administrators periodically. ...
Article
Full-text available
em>There is always a need to transfer money from one user to another for either payment of services or settlement of business transactions and so on. Research has shown that traditional money transaction systems are prone to attacks through falsified deposit slips and drafts, theft of debit cards, forgery of signatures, use of false cheques and so on. Electronic money transaction is a payment performed from an electronic device which enables users to have access to their money anywhere and at any time with the aid of a network but not adequately secured. This application offers a platform independent of securing and transferring money using data masking and an enhanced base64 algorithm from one account to another. The study improves on existing money transfer and transaction systems by achieving a secured mobile money transaction system with masked and encrypted financial details both on the mobile application and also on the short message service application (Text Message Notification) sent to user’s platform which makes it difficult for third party to intercept and understand. </em
... The chief design goal of this system is assisting the owner of data for achieving superior control to access files saved on Cloud computing data Servers [8]. Basically, in the system the data owner is enabled to implement an exclusive accessing framework over every end user, who is responsible for designating the set of records which precisely whose access permission is granted to the user. ...
Article
Full-text available
C l o u d computing has started to gain extensive appreciation inside the corporate world as well, because it has given permission to access the required resource as Internet. The process of accessing and sharing of the resources is performed in a very virtual and protected way so that a general user is not aware of the task that is performed. In this paper, we aim to derive a mechanism to make data safe and control the access of the sensitive information over the cloud servers.
... At [12] the authors mentioned an efficient key management for IOT owner in the cloud [13], they present a security a minimal cost for the client model without encryption and an access control model to minimize the key management cost for IOT owner. Also they provide an update authorization method to minimize the cost dynamically. ...
Conference Paper
Full-text available
Cloud services can be categorized into Infrastructure as a Service (IaaS), the Platform as a Service (PaaS) and the Software as a Service (SaaS). In (Iaas), the whole IT infrastructure can be delivered as a service. In (Paas), a virtual platform over the internet gives users the ability to develop and deploy applications. In (SaaS), it provides accessing an application through the internet on demand. In the (SaaS) layer, a single instance on the cloud for multiple users could be provided. Google Apps, one of the most powerful (SaaS) that is used by many institutes to provide a variety of Web-based applications for business, education, and government. Security in Cloud computing is an important and critical problem. Cloud service provider and the cloud service consumer should make sure that the cloud is safe enough from all the external threats so that the customer does not face any problem such as loss of data or data theft. Internets of Things (IoT) are small IP enabled devices that can cooperate to perform specific functions for various set of applications. This new emerging technology is strongly involved in applications that have direct impact on human welfare, such as business, education and government. Securing IoT device’s communications are becoming a must. In this paper a lightweight technique for secure and authentic communication between IoT devices. That lightweight technique is based on framework of ideas from virtual server, network management and cloud services.
Article
Full-text available
Machine learning is a branch of computer science that enables computers to learn without being explicitly programmed. One of the most exciting technologies that one has ever encountered is machine learning. As the name implies, it provides the computer with the ability to learn, which makes it more human-like. Machine learning is now employed in a variety of applications, including self-driving cars, personal assistants such as Cortana, Alexa, and Siri, and security technologies such as face recognition. Developers of mobile applications are increasingly being pushed to include machine learning technology in their apps. This is unfamiliar territory for many of them. In this research paper, we will look at how machine learning relates to AI in this context, with an emphasis on application developers. This paper demonstrates different machine learning types, frameworks, and tools available on the market and how to use them to create the statistical models needed to use them in mobile applications without having to learn more about the complexity of algorithms and how they train and learn models. Also, this article covers the basic architectures that mobile applications can leverage to work with machine learning.
Chapter
Cloud computing is having the capacity to dispose off the prerequisites for setting up high-cost computing framework and promises to provide the flexible architecture which is accessible from anywhere. The data in the cloud computing resides over an arrangement of network resources which enables position of the requirements for setting up costly data centers framework and information to be acquired to via virtual machines, and these serves might be arranged in any piece of the world. The cloud computing environment is adopted by a large number of organizations so the rapid transition toward the clouds has fueled concerns about security perspective. There are numbers of risks and challenges that have emerged due to use of cloud computing. The aim of this paper is to identify security issues in cloud computing which will be helpful to both cloud service providers and users to resolve those issues. As a result, this paper will access cloud security by recognizing security requirements and attempt to present the feasible solution that can reduce these potential threats.