Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Analysis of Cloud and Self-Web-Hosting Services Based on Security Parameters

Published: 22 April 2022 Publication History
  • Get Citation Alerts
  • Abstract

    Most of the web applications are hosting by cloud due to low cost and low infrastructure setup is required. In continue to this, user no need to maintain the infrastructure by their own. In this paper, both the technology, self-web-hosting, and cloud-web-hosting are compared based on different security parameters like key generation (PKI), automatic authentication and protection of intra-tenant networks, secure logging system events, spam filtering, CAPTCHA generation and authentication, and software widgets such as password metering. These parameters are classified into seven categories and the review has been conducted based on these categories. The bibliometric analysis has been conducted where ever more than 70 research found in Web-of-Science (WoS) database through bibliometric library and biblioshine package in R programming. The outcome of this analysis is presented in tabular form, and open challenges of both the technologies are discussed in details with proposed solutions.

    References

    [1]
    AgarwalA.VenkatadriM.PasrichaA. (2018, December). Autonomic cloud resource management. In 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC) (pp. 138-143). IEEE.
    [2]
    Agarwal, A., Venkatadri, M., & Pasricha, A. (2019). Sla-based autonomic cloud resource management framework by antlion optimization algorithm. International Journal of Innovative Technology and Exploring Engineering, 8(4), 119–123.
    [3]
    AraiT.OkabeY.MatsumotoY.KawamuraK. (2020, January). Detection of bots in captcha as a cloud service utilizing machine learning. In 2020 International conference on information networking (ICOIN) (pp. 584-589). IEEE. 10.1109/ICOIN48656.2020.9016522
    [4]
    BosaeedS.KatibI.MehmoodR. (2020, April). A Fog-Augmented Machine Learning based SMS Spam Detection and Classification System. In 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC) (pp. 325-330). IEEE. 10.1109/FMEC49853.2020.9144833
    [5]
    Cherkasova, L. (1999). Scalable Web Hosting Service. HP Laboratories Technical Report HPL, (52/REV).
    [6]
    Dewangan, B. K., Agarwal, A., Choudhury, T., Pasricha, A., & Chandra Satapathy, S. (2020). Extensive review of cloud resource management techniques in industry 4.0: Issue and challenges. Software, Practice & Experience.
    [7]
    Dewangan, B. K., Agarwal, A., Venkatadri, M., & Pasricha, A. (2019). Design of self-management aware autonomic resource scheduling scheme in cloud. International Journal of Computer Information Systems and Industrial Management Applications, 11, 170–177.
    [8]
    Guerar, M., Merlo, A., Migliardi, M., & Palmieri, F. (2018). Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT. Computers & Security, 78, 255-266.
    [9]
    Jain, A., & Choudhury, T. (2020). GAP: Hybrid task scheduling algo-rithm for cloud. Revue d’Intelligence Artificielle, 34(4), 479–485.
    [10]
    JonesM. D.AndersonZ.WalkerC.SeppiK. (2018, April). PHUI-kit: Interface Layout and Fabrication on Curved 3D Printed Objects. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (pp. 1-11). 10.1145/3173574.3173684
    [11]
    KarandeV.BaumanE.LinZ.KhanL. (2017, April). Sgx-log: Securing system logs with sgx. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (pp. 19-30). 10.1145/3052973.3053034
    [12]
    KoumidisK.KoliosP.EllinasG.PanayiotouC. G. (2019, December). Secure Event Logging Using a Blockchain of Heterogeneous Computing Resources. In 2019 IEEE Global Communications Conference (GLOBECOM) (pp. 1-6). IEEE. 10.1109/GLOBECOM38437.2019.9013452
    [13]
    Layec, P., Dupas, A., Bisson, A., & Bigo, S. (2018). QoS-aware protection in flexgrid optical networks. Journal of Optical Communications and Networking, 10(1), A43–A50.
    [14]
    LeeS.ChoiW.JoH. J.LeeD. H. (2019, July). How to securely record logs based on ARM trustzone. In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security (pp. 664-666). 10.1145/3321705.3331001
    [15]
    Li, J., Tang, X., Wei, Z., Wang, Y., Chen, W., & Tan, Y. A. (2019). Identity-based multi-recipient public key encryption scheme and its application in IoT. Mobile Networks and Applications, 1–8.
    [16]
    Ma, M., Luo, M., Fan, S., & Feng, D. (2020). An Efficient Pairing-Free Certificateless Searchable Public Key Encryption for Cloud-Based IIoT. Wireless Communications and Mobile Computing, 2020, 2020.
    [17]
    Ma, S. (2017). Authorized equi-join for multiple data contributors in the PKC-based setting. The Computer Journal, 60(12), 1822–1838.
    [18]
    Ma, X., Yang, L. T., Xiang, Y., Zeng, W. K., Zou, D., & Jin, H. (2015). Fully reversible privacy region protection for cloud video surveillance. IEEE Transactions on Cloud Computing, 5(3), 510–522.
    [19]
    Mann, Z. Á., Kunz, F., Laufer, J., Bellendorf, J., Metzger, A., & Pohl, K. (2021). RADAR: Data Protection in Cloud-Based Computer Systems at Run Time. IEEE Access: Practical Innovations, Open Solutions, 9, 70816–70842.
    [20]
    Martin, J. (2021). Web Hosting Made Simple With These Easy Steps. Techno Engineering Article, 1(1).
    [21]
    OgielaL.OgielaM. R. (2017, November). Security of visual codes in service management in the cloud. In 2017 International Conference on Intelligent Informatics and Biomedical Sciences (ICIIBMS) (pp. 165-168). IEEE. 10.1109/ICIIBMS.2017.8279717
    [22]
    Ouyang, Z., Zhai, X., Wu, J., Yang, J., Yue, D., Dou, C., & Zhang, T. (2021). A cloud endpoint coordinating CAPTCHA based on multi-view stacking ensemble. Computers & Security, 103, 102178.
    [23]
    Patil, S., Wasnik, K., & Bagade, S. (2019). Pen-Drive Based Password Management System for Online Accounts. In Emerging Technologies in Data Mining and Information Security (pp. 693–704). Springer.
    [24]
    RaneS.WaghS.DixitA. (2020, January). Design of a Forensic Enabled Secure Cloud Logging. In Proceedings of the 21st International Conference on Distributed Computing and Networking (pp. 1-1). 10.1145/3369740.3373803
    [25]
    RaviN. C.MuppalaneniN. B.SrideviR.PrasadV. K.GovardhanA.PadmaJ. (2018, December). Advanced Access Control Mechanism for Cloud Based E-wallet. In International conference on Computer Networks, Big data and IoT (pp. 392-399). Springer.
    [26]
    Song, H., Li, J., & Li, H. (2021). A Cloud Secure Storage Mechanism Based on Data Dispersion and Encryption. IEEE Access: Practical Innovations, Open Solutions, 9, 63745–63751.
    [27]
    Tian, H., Wang, J., Chang, C. C., & Quan, H. (2020). Public auditing of log integrity for shared cloud storage systems via blockchain. Wireless Networks, 1–16.
    [28]
    Valentine, T. (2021). Database-Driven Web Development Fundamentals. In Database-Driven Web Development (pp. 1-18). Apress.
    [29]
    Vasco, M. I. G., Del Pozo, A. P., & Soriente, C. (2019). A key for John Doe: Modeling and designing Anonymous Password-Authenticated Key Exchange protocols. IEEE Transactions on Dependable and Secure Computing.
    [30]
    Vázquez, D. E., Hernández, E., & Meneses, A. (2018). Equivalence Relation Between Widgets for GUIs in Mobile Applications. IEEE Latin America Transactions, 16(7), 2007–2012.
    [31]
    VillasenorS.NguyenT.KolaA.SodermanS.GubanovM. (2017, December). Scalable spam classifier for web tables. In 2017 IEEE International Conference on Big Data (Big Data) (pp. 4849-4851). IEEE. 10.1109/BigData.2017.8258564
    [32]
    Vleju, M. B. (2014). Automatic Authentication to Cloud-Based Services. Journal of Universal Computer Science, 20(3), 385–405.
    [33]
    Xu, Z., Wu, L., Ren, Y., & He, D. (2018). New Efficient Certificateless Aggregate Signature Scheme. Journal of Internet Technology, 19(7), 2023–2033.
    [34]
    Yunakovsky, S. E., Kot, M., Pozhar, N., Nabokov, D., Kudinov, M., Guglya, A., & Fedorov, A. K. (2021). Towards security recommendations for public-key infrastructures for production environments in the post-quantum era. EPJ Quantum Technology, 8(1), 14.
    [35]
    Zeidler, C., & Asghar, M. R. (2018, August). AuthStore: Password-based authentication and encrypted data storage in untrusted environments. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (pp. 996-1001). IEEE.

    Cited By

    View all
    • (2023)Entangled Clouds: Measuring the Hosting Infrastructure of the Free Contents WebProceedings of the 2023 on Cloud Computing Security Workshop10.1145/3605763.3625274(75-87)Online publication date: 26-Nov-2023

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image International Journal of Information System Modeling and Design
    International Journal of Information System Modeling and Design  Volume 13, Issue 6
    Sep 2022
    84 pages
    ISSN:1947-8186
    EISSN:1947-8194
    Issue’s Table of Contents

    Publisher

    IGI Global

    United States

    Publication History

    Published: 22 April 2022

    Author Tags

    1. Authentication
    2. Captcha
    3. Certificate and Public/Private Key Generation
    4. Cloud
    5. Password Hashing
    6. Security

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Entangled Clouds: Measuring the Hosting Infrastructure of the Free Contents WebProceedings of the 2023 on Cloud Computing Security Workshop10.1145/3605763.3625274(75-87)Online publication date: 26-Nov-2023

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media