scholarly journals Security Issues and Risks for Banking Services under Cloud Computing

In present day time, immense beginnings identified with jumpers working field use the advantages of cloud computing for reducing their operational expense and overseeing data. Notwithstanding, Cloud computing offers different advantages to associations, yet it is an online network system thusly financial organizations like banks consider that this plan relates to the few risk factors. Among different viewpoints data security, protection, legitimate, compliance and regulatory risks are key limitations. Moreover, fast presentation of high expert's aggressors into this field has scaled up such issue's everyday into an extreme issue. This paper shows the thought of cloud computing and its offered models. Besides, this paper traces the related risk elements of cloud computing, extraordinarily under financial sectors to help credulous researchers.

Author(s):  
Navin Jambhekar ◽  
Chitra Anil Dhawale

Information security is a prime goal for every individual and organization. The travelling from client to cloud server can be prone to security issues. The big data storages are available through cloud computing system to facilitate mobile client. The information security can be provided to mobile client and cloud technology with the help of integrated parallel and distributed encryption and decryption mechanism. The traditional technologies include the plaintext stored across cloud and can be prone to security issues. The solution provided by applying the encrypted data upload and encrypted search. The clouds can work in collaboration; therefore, the encryption can also be done in collaboration. Some part of encryption handle by client and other part handled by cloud system. This chapter presents the security scenario of different security algorithms and the concept of mobile and cloud computing. This chapter precisely defines the security features of existing cloud and big data system and provides the new framework that helps to improve the data security over cloud computing and big data security system.


2016 ◽  
pp. 2076-2095
Author(s):  
Abhishek Majumder ◽  
Sudipta Roy ◽  
Satarupa Biswas

Cloud is considered as future of Information Technology. User can utilized the cloud on pay-as-you use basis. But many organizations are stringent about the adoption of cloud computing due to their concern regarding the security of the stored data. Therefore, issues related to security of data in the cloud have become very vital. Data security involves encrypting the data and ensuring that suitable policies are imposed for sharing those data. There are several data security issues which need to be addressed. These issues are: data integrity, data intrusion, service availability, confidentiality and non-repudiation. Many schemes have been proposed for ensuring data security in cloud environment. But the existing schemes lag in fulfilling all these data security issues. In this chapter, a new Third Party Auditor based scheme has been proposed for secured storage and retrieval of client's data to and from the cloud service provider. The scheme has been analysed and compared with some of the existing schemes with respect to the security issues. From the analysis and comparison it can be observed that the proposed scheme performs better than the existing schemes.


2016 ◽  
pp. 1162-1190
Author(s):  
Peter Sasvari ◽  
Zoltán Nagymate

Innovation capability has increasingly been searched by the ICT sector in cloud computing applications recently. This chapter describes the economic potentials of cloud computing and explores the characteristics of its usage among Hungarian enterprises. Although enterprises are aware of the basic concept of cloud computing, they have concerns about its application mainly due to data security issues and the lack of education. The chance of using cloud computing services is mainly facilitated by the creation of easier application and consultation would positively affect their usage. According to microenterprises and corporations, faster information flow and remote access are the key benefits of cloud usage. In the case of small-sized enterprises, the two main advantages are easier system recoverability and a higher level of mobility in case of a system breakdown. For the medium-sized enterprises, remote access and greater data security were the key benefits of using cloud computing services in 2014.


2014 ◽  
Vol 701-702 ◽  
pp. 1106-1111 ◽  
Author(s):  
Xin Zheng Zhang ◽  
Ya Juan Zhang

As information and processes are migrating to the cloud, Cloud Computing is drastically changing IT professionals’ working environment. Cloud Computing solves many problems of conventional computing. However, the new technology has also created new challenges such as data security, data ownership and trans-code data storage. We discussed about Cloud computing security issues, mechanism, challenges that Cloud service providers and consumers face during Cloud engineering. Based on concerning of security issues and challenges, we proposed several encryption algorithms to make cloud data secure and invulnerable. We made comparisons among DES, AES, RSA and ECC algorithms to find combinatorial optimization solutions, which fit Cloud environment well for making cloud data secure and not to be hacked by attackers.


2017 ◽  
Vol 16 (3) ◽  
pp. 6219-6224
Author(s):  
Jaspreet Kaur ◽  
Navdeep Kaler

Cloud computing is a way to increase the capacity or add capabilities dynamically without investing in new infrastructure, training new personnel, or licensing new software. As information exchange plays an important role in today’s life, information security becomes more important. This paper is focused on the security issues of cloud computing and techniques to overcome the data security issue. Before analyzing the security issues, the definition of cloud computing and brief discussion to under cloud computing is presented. The various components that affect the security of the cloud and the problems faced by cloud service provider have been discussed in this paper.


Author(s):  
Hussam Alddin Shihab Ahmed ◽  
◽  
Mohamad Fadli Zolkipli ◽  

2019 ◽  
Vol 8 (1) ◽  
pp. 53-61
Author(s):  
S. Hendry Leo Kanickam ◽  
L. Jayasimman

Cloud computing is ensuring the security of stored data in cloud computing servers is one of the mainly demanding issues. In Cloud numerous security issues arises such as authentication, integrity and confidentiality. Different encryption techniques attempt to overcome these data security issues to an enormous extent. Hashing algorithm plays an important role in data integrity, message authentication, and digital signature in modern information security. For security purpose using encryption algorithm like ECC (Elliptic Curve Cryptography) and Authentication of data integrity using hashing algorithms like MD5, and SHA-512. This combination method provides data security, authentication and verification for secure cloud computing.


Cloud Computing is a very viable data storage structure where the users can store and access the data from anywhere. Cloud computing use is increasing at a very rapid pace nowadays. But as cloud allows us data accessibility quite easily data security is a major concern and is an emerging area of study. Other issues related to cloud computing are data privacy and internet dependency. On the other cloud computing also has wide range of benefits over traditional storage and accessibility environment such as scalability, flexibility and resource utilization. We have worked in the area of mobile cloud computing to analyse and solve the problems of anomaly attacks. Our work focuses on preventing the adaptive anomaly attacks and some other security issues of cloud computing


2018 ◽  
Author(s):  
Mohammed-Ali Anwar

Mobile Cloud Computing (MCC) is a recent technological development, which has emerged from two popular technology trends; mobile computing and cloud. In essence it revolutionises the capabilities of mobile devices by integrating both storage and processing of the cloud environment with mobile computing and in doing so providing greater optimisation and operating power, allowing for transparent and seamless use of resources provided by the cloud. However, expanding the capability of resource constrained mobile devices in this manner comes at a price. There are many risks associated with the security of data within the cloud environment and as MCC essentially uses the cloud, it also inherits any security issues that are associated with cloud computing. The aim of this survey is to identify potential data security issues, and analyse and present some pioneering security mechanisms and finally suggest some future directions for better data security with MCC.


2019 ◽  
Vol 8 (2) ◽  
pp. 40-43
Author(s):  
Sheik Saidhbi

Internet working security has become one of the biggest uprising points of concern now days. People are getting attached more and more to the internet in order to fulfill their demands. Not only customers but also the IT based companies are also getting themselves relying on up growing technology called as cloud computing. Cloud is a branch of computer science that provides the services on lease. In this paper we will make a comparative analysis of various technical security issues towards cloud computing, cloud deployment based security and model based security issues. A comparative analysis has been made at the end of the paper.


Sign in / Sign up

Export Citation Format

Share Document