Abstract
Cloud computing has become a catchphrase in the academia and industry. The technical definition of the Cloud is very important due to its ability to support different types of software and network services. Cloud computing, also known as on-demand computing, is a kind of Internet-based computing, where shared resources and information are provided to computers and other devices on-demand.
References
- 1.Rexford, J., Dovrolis, C.: Future internet architecture: clean-slate versus evolutionary research. Commun. ACM 53(9), 36–40 (2010)CrossRefGoogle Scholar
- 2.Goswami, A., Pattanaik, K., Bharadwaj, A., Bharti, S.: Loss rate control mechanism for fan-in-burst traffic in data center network. Proc. Comput. Sci. 32, 125–132 (2014)CrossRefGoogle Scholar
- 3.Bessis, N., Asimakopoulou, E., Xhafa, F.: The big picture, from grids and clouds to crowds: a data collective computational intelligence case proposal for managing disasters. In: International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Fukuoka, Nov 2010, pp. 351–356 (2010)Google Scholar
- 4.Ma, K., Sun, R., Abraham, A.: Towards lightweight framework for monitoring public cloud. In: 4th International Conference on Computational Aspects of Social Networks (CASoN-2012), Sao Carlos, Nov 2012, pp. 361–365 (2012)Google Scholar
- 5.Shamala, P., Ahmad, R., Yusoff, M.: A conceptual framework of info structure for information security risk assessment. J. Inf. Secur. Appl. 18(1), 45–52 (2013)Google Scholar
- 6.Shi, Q., Zhang, N., Merabti, M.: Fair signature exchange via delegation on ubiquitous networks. J. Comput. Syst. Sci. 81(4), 615–631 (2015)MathSciNetCrossRefGoogle Scholar
- 7.Brown, E.: NIST issues cloud computing guidelines for managing security and privacy. National Institute of Standards and Technology Special Publication, Report No.: 800-144 (2012)Google Scholar
- 8.Deshpande, P., Sharma, S.C., Peddoju, S.K.: Implementation of a private cloud: a case study. In: Advances in Intelligent Systems and Computing, vol. 259. Springer, New Delhi (2014)Google Scholar
- 9.Osathanunkul, K., Zhang, N.: A countermeasure to black hole attacks in mobile Ad hoc networks. In: IEEE International Conference on Networking, Sensing and Control, Delft, The Netherlands, April 2011, pp. 508–513 (2011)Google Scholar
- 10.Deshpande, P., Sharma, S.C., Peddoju, S.K., et al.: Security and service assurance issues in cloud environment. Int. J. Syst. Assur. Eng. Manage. 9, 194–207 (2018)CrossRefGoogle Scholar
- 11.Bisong, A., Rahman, S.: An overview of the security concerns in enterprise cloud computing. Int. J. Netw. Secur. Appl. 3(1), 30–45 (2011)Google Scholar
- 12.Harauz, J., Kauifman, M., Potter, B.: Data security in the world of cloud computing. IEEE Secur. Priv. 7(9), 61–64 (2009)Google Scholar
- 13.Chou, Y., Oetting, J.: Risk assessment for cloud-based IT systems. Int. J. Grid High Perform. Comput. 3(2), 1–13 (2011)CrossRefGoogle Scholar
- 14.Hashizume, K., Rosado, D., Medina, E., Fernandez, E.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4(5), 1–13 (2013)Google Scholar
- 15.Iyengar, S., Ganapathy, G., Kumar, M., Abraham, A.: A multilevel thrust filtration defending mechanism against DDoS attacks in cloud computing environment. Int. J. Grid Util. Comput. 5(4), 236–248 (2014)CrossRefGoogle Scholar
- 16.Takabi, H., Joshi, J., Ahn, G.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24–31 (2010)CrossRefGoogle Scholar
- 17.Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE J. Internet Comput. 16(1), 69–73 (2012)CrossRefGoogle Scholar
- 18.Rosado, D., Gomez, R., Mellado, D., Medina, E.: Security analysis in the migration to cloud environment. J. Future Internet 4(2), 469–487 (2012)CrossRefGoogle Scholar
- 19.Sotiriadis, S., Bessis, N., Xhafa, F., Antonopoulos, N.: Cloud virtual machine scheduling: modelling the cloud virtual machine instantiation. In: Sixth International Conference on Complex, Intelligent and Software Intensive Systems, Palermo, July 2012, pp. 233–240Google Scholar
- 20.Noureddin, A., Damodaran, M.: Security in Web 2.0 application development. In: Proceedings of the 10th International Conference on Information Integration and Web-based Applications and Services, Linz, Austria, Nov 2008, pp. 681–685 (2008)Google Scholar
- 21.Kim, J., Tong, L., Thomas, R.: Data framing attack on state estimation. IEEE J. Sel. Areas Commun. 32(7), 1460–1470 (2014)CrossRefGoogle Scholar
- 22.Gilad, Y., Herzberg, A., Shulman, H.: Off-path hacking: the illusion of challenge-response authentication. IEEE Secur. Priv. 12(5), 68–77 (2014)CrossRefGoogle Scholar
- 23.Trabelsi, Z., Rahemani, H., Kamel, K., Mounir, M.: Malicious sniffing system detection platform. In: Proceedings of International Symposium on Applications and the Internet, Tokyo, Japan, Jan 2004, pp. 201–207 (2004)Google Scholar
- 24.Samy, G., Ahmad, R., Ismail, Z.: Investigating security threats in information systems. In: 12th IBIMA Conference on Creating Global Economics through Innovation and Knowledge Management, Kuala Lumpur, Malaysia, June 2009, pp. 1412–1419 (2009)Google Scholar
- 25.Jeon, H., Min, Y., Seo, K.: A performance measurement framework of cloud storage services. Indian J. Sci. Technol. 8(8), 105–111 (2015)CrossRefGoogle Scholar
- 26.Ho, J., Woo, P., Ho, E., Myoung, C.: Multi-level intrusion detection system and log management in cloud computing. In: Proceedings of 13th International Conference on Advanced Communication Technology, Seoul, Feb 2011, pp. 552–555 (2011)Google Scholar
- 27.Yaar, A., Perrig, A., Song, D.: StackPi: new packet marking and filtering mechanisms for DDoS and IP spoofing defence. IEEE J. Sel. Areas Commun. 24(10), 1853–1863 (2006)CrossRefGoogle Scholar
- 28.Sklavos, N., Koufopavlou, O.: Computer network security: report from MMM-ACNS. IEEE Secur. Priv. 2(1), 49–52 (2004)CrossRefGoogle Scholar
- 29.Balepin, I., Maltsev, S., Rowe, J., Levitt, K.: Using specification based intrusion detection for automated response. Lect. Notes Comput. Sci. 2820, 136–154 (2003)CrossRefGoogle Scholar
- 30.Verwoerd, T., Hunt, R.: Intrusion detection techniques and approaches. Comput. Commun. 25(15), 1356–1365 (2002)CrossRefGoogle Scholar
- 31.Deshpande, P., Sharma, S., Peddoju, S.K., Junaid, S.: HIDS: an host based intrusion detection system. Int. J. Syst. Assur. Eng. Manage. (2014). https://doi.org/10.1007/s13198-014-0277-7CrossRefGoogle Scholar
- 32.Debar, H., Dacier, M., Wespi, A.: Towards a taxonomy of intrusion-detection systems. Comput. Netw. Int. J. Comput. Telecommun. Netw. 31(8), 805–822 (1999)Google Scholar
- 33.Kruegel, C., Valeur, F., Vigna, G.: Intrusion detection and correlation-challenges and solutions. In: Advances in Information Security. Springer, US (2005)Google Scholar
Copyright information
© Springer Nature Singapore Pte Ltd. 2019