Advertisement

Introduction

  • Prachi S. Deshpande
  • Subhash C. Sharma
  • Sateesh K. Peddoju
Chapter
Part of the Studies in Big Data book series (SBD, volume 52)

Abstract

Cloud computing has become a catchphrase in the academia and industry. The technical definition of the Cloud is very important due to its ability to support different types of software and network services. Cloud computing, also known as on-demand computing, is a kind of Internet-based computing, where shared resources and information are provided to computers and other devices on-demand.

References

  1. 1.
    Rexford, J., Dovrolis, C.: Future internet architecture: clean-slate versus evolutionary research. Commun. ACM 53(9), 36–40 (2010)CrossRefGoogle Scholar
  2. 2.
    Goswami, A., Pattanaik, K., Bharadwaj, A., Bharti, S.: Loss rate control mechanism for fan-in-burst traffic in data center network. Proc. Comput. Sci. 32, 125–132 (2014)CrossRefGoogle Scholar
  3. 3.
    Bessis, N., Asimakopoulou, E., Xhafa, F.: The big picture, from grids and clouds to crowds: a data collective computational intelligence case proposal for managing disasters. In: International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Fukuoka, Nov 2010, pp. 351–356 (2010)Google Scholar
  4. 4.
    Ma, K., Sun, R., Abraham, A.: Towards lightweight framework for monitoring public cloud. In: 4th International Conference on Computational Aspects of Social Networks (CASoN-2012), Sao Carlos, Nov 2012, pp. 361–365 (2012)Google Scholar
  5. 5.
    Shamala, P., Ahmad, R., Yusoff, M.: A conceptual framework of info structure for information security risk assessment. J. Inf. Secur. Appl. 18(1), 45–52 (2013)Google Scholar
  6. 6.
    Shi, Q., Zhang, N., Merabti, M.: Fair signature exchange via delegation on ubiquitous networks. J. Comput. Syst. Sci. 81(4), 615–631 (2015)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Brown, E.: NIST issues cloud computing guidelines for managing security and privacy. National Institute of Standards and Technology Special Publication, Report No.: 800-144 (2012)Google Scholar
  8. 8.
    Deshpande, P., Sharma, S.C., Peddoju, S.K.: Implementation of a private cloud: a case study. In: Advances in Intelligent Systems and Computing, vol. 259. Springer, New Delhi (2014)Google Scholar
  9. 9.
    Osathanunkul, K., Zhang, N.: A countermeasure to black hole attacks in mobile Ad hoc networks. In: IEEE International Conference on Networking, Sensing and Control, Delft, The Netherlands, April 2011, pp. 508–513 (2011)Google Scholar
  10. 10.
    Deshpande, P., Sharma, S.C., Peddoju, S.K., et al.: Security and service assurance issues in cloud environment. Int. J. Syst. Assur. Eng. Manage. 9, 194–207 (2018)CrossRefGoogle Scholar
  11. 11.
    Bisong, A., Rahman, S.: An overview of the security concerns in enterprise cloud computing. Int. J. Netw. Secur. Appl. 3(1), 30–45 (2011)Google Scholar
  12. 12.
    Harauz, J., Kauifman, M., Potter, B.: Data security in the world of cloud computing. IEEE Secur. Priv. 7(9), 61–64 (2009)Google Scholar
  13. 13.
    Chou, Y., Oetting, J.: Risk assessment for cloud-based IT systems. Int. J. Grid High Perform. Comput. 3(2), 1–13 (2011)CrossRefGoogle Scholar
  14. 14.
    Hashizume, K., Rosado, D., Medina, E., Fernandez, E.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4(5), 1–13 (2013)Google Scholar
  15. 15.
    Iyengar, S., Ganapathy, G., Kumar, M., Abraham, A.: A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment. Int. J. Grid Util. Comput. 5(4), 236–248 (2014)CrossRefGoogle Scholar
  16. 16.
    Takabi, H., Joshi, J., Ahn, G.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24–31 (2010)CrossRefGoogle Scholar
  17. 17.
    Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE J. Internet Comput. 16(1), 69–73 (2012)CrossRefGoogle Scholar
  18. 18.
    Rosado, D., Gomez, R., Mellado, D., Medina, E.: Security analysis in the migration to cloud environment. J. Future Internet 4(2), 469–487 (2012)CrossRefGoogle Scholar
  19. 19.
    Sotiriadis, S., Bessis, N., Xhafa, F., Antonopoulos, N.: Cloud virtual machine scheduling: modelling the cloud virtual machine instantiation. In: Sixth International Conference on Complex, Intelligent and Software Intensive Systems, Palermo, July 2012, pp. 233–240Google Scholar
  20. 20.
    Noureddin, A., Damodaran, M.: Security in Web 2.0 application development. In: Proceedings of the 10th International Conference on Information Integration and Web-based Applications and Services, Linz, Austria, Nov 2008, pp. 681–685 (2008)Google Scholar
  21. 21.
    Kim, J., Tong, L., Thomas, R.: Data framing attack on state estimation. IEEE J. Sel. Areas Commun. 32(7), 1460–1470 (2014)CrossRefGoogle Scholar
  22. 22.
    Gilad, Y., Herzberg, A., Shulman, H.: Off-path hacking: the illusion of challenge-response authentication. IEEE Secur. Priv. 12(5), 68–77 (2014)CrossRefGoogle Scholar
  23. 23.
    Trabelsi, Z., Rahemani, H., Kamel, K., Mounir, M.: Malicious sniffing system detection platform. In: Proceedings of International Symposium on Applications and the Internet, Tokyo, Japan, Jan 2004, pp. 201–207 (2004)Google Scholar
  24. 24.
    Samy, G., Ahmad, R., Ismail, Z.: Investigating security threats in information systems. In: 12th IBIMA Conference on Creating Global Economics through Innovation and Knowledge Management, Kuala Lumpur, Malaysia, June 2009, pp. 1412–1419 (2009)Google Scholar
  25. 25.
    Jeon, H., Min, Y., Seo, K.: A performance measurement framework of cloud storage services. Indian J. Sci. Technol. 8(8), 105–111 (2015)CrossRefGoogle Scholar
  26. 26.
    Ho, J., Woo, P., Ho, E., Myoung, C.: Multi-level intrusion detection system and log management in cloud computing. In: Proceedings of 13th International Conference on Advanced Communication Technology, Seoul, Feb 2011, pp. 552–555 (2011)Google Scholar
  27. 27.
    Yaar, A., Perrig, A., Song, D.: StackPi: new packet marking and filtering mechanisms for DDoS and IP spoofing defence. IEEE J. Sel. Areas Commun. 24(10), 1853–1863 (2006)CrossRefGoogle Scholar
  28. 28.
    Sklavos, N., Koufopavlou, O.: Computer network security: report from MMM-ACNS. IEEE Secur. Priv. 2(1), 49–52 (2004)CrossRefGoogle Scholar
  29. 29.
    Balepin, I., Maltsev, S., Rowe, J., Levitt, K.: Using specification based intrusion detection for automated response. Lect. Notes Comput. Sci. 2820, 136–154 (2003)CrossRefGoogle Scholar
  30. 30.
    Verwoerd, T., Hunt, R.: Intrusion detection techniques and approaches. Comput. Commun. 25(15), 1356–1365 (2002)CrossRefGoogle Scholar
  31. 31.
    Deshpande, P., Sharma, S., Peddoju, S.K., Junaid, S.: HIDS: an host based intrusion detection system. Int. J. Syst. Assur. Eng. Manage. (2014).  https://doi.org/10.1007/s13198-014-0277-7CrossRefGoogle Scholar
  32. 32.
    Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusion-detection systems. Comput. Netw. Int. J. Comput. Telecommun. Netw. 31(8), 805–822 (1999)Google Scholar
  33. 33.
    Kruegel, C., Valeur, F., Vigna, G.: Intrusion detection and correlation-challenges and solutions. In: Advances in Information Security. Springer, US (2005)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Prachi S. Deshpande
    • 1
  • Subhash C. Sharma
    • 2
  • Sateesh K. Peddoju
    • 3
  1. 1.Department of Computer EngineeringDr. Babasaheb Ambedkar Technological UniversityLonereIndia
  2. 2.Indian Institute of Technology RoorkeeRoorkeeIndia
  3. 3.Indian Institute of Technology RoorkeeRoorkeeIndia

Personalised recommendations