A secured private-cloud computing system

20Citations
Citations of this article
39Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The advent of internet and rapid growth of digital media has vastly increased concerns of cloud computing as source of data and information storage ever than before. It allows users to setup their own private clouds since the public clouds available, can’t surpass their expectations at affordable costs. With private cloud computing, users do not need to be in a physical location when accessing personified cloud resources, thus; leading to cost reduction, improved user experience (ux), staff effectiveness, and file sharing with organizational collaborations from remote sites. Despite lots of benefits offered, there have been constant challenges associated with cloud computing from Data loss & breaches, service vulnerabilities, insufficient due diligence, identity, access and credential management, poor footprint tracking for threats & malicious insider attacks etc. which threatens network security. This proposed application is set out to provide immediate solution to help fight against cloud insecurity, particularly in private cloud domains through restriction of access to cloud resources, giving access to only trusted members to prove their identities through Footprint Notifications, Logging Encryption and activities of the authenticated users, as it is essential to monitor information flow on the cloud for information assessment purposes. The implementation of a secured Private-Cloud Computing System is the central focus of this project; the application is designed by using advanced features of HTML, CSS, JAVASCRIPT, & JQUERY for the frontend interface while PHP & MYSQL were used to design the backend of the application and its log encryption.

Cite

CITATION STYLE

APA

Olowu, M., Yinka-Banjo, C., Misra, S., & Florez, H. (2019). A secured private-cloud computing system. In Communications in Computer and Information Science (Vol. 1051 CCIS, pp. 373–384). Springer. https://doi.org/10.1007/978-3-030-32475-9_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free