Cloud Network Data Security

  • Kianoosh G. Boroojeni
  • M. Hadi Amini
  • S. S. Iyengar


The recent advances in cloud computing have substantially changed people’s understanding of computing hardware/software infrastructure and development methods. This fast transition to the clouds has coincided with the transition of mainframe computers to client/server models which has facilitated the utilization of cloud computing in different enterprises. This world wide transition has caused serious concerns regarding the confidentiality, integrity, and availability of communication and information systems participating in the cloud models as relocating data through the communication systems to the clouds causes various security and privacy issues that did not exist in traditional models before.


Cloud Computing Cloud Server Sink Node Cloud Environment Cloud System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    C. Almond, A practical guide to cloud computing security, Aug 2009Google Scholar
  2. 2.
    B. Joshi, A. Santhana Vijayan, B.K. Joshi, Securing cloud computing environment against DDoS attacks, 2012 International Conference on Computer Communication and Informatics (ICCCI-2012), Coimbatore, 10–12 Jan 2012Google Scholar
  3. 3.
    S. Yu, W. Zhou, R. Doss, Information theory based detection against network behavior mimicking DDoS attacks. IEEE Commun. Lett. 12 (4), 318–321 (2008)CrossRefGoogle Scholar
  4. 4.
    S. Yu, W. Zhou, Entropy-based collaborative detection of DDoS attacks on community networks, in Sixth Annual IEEE International Conference on Pervasive Computing and Communications, Piscataway, NJ, 2008, pp. 566–571Google Scholar
  5. 5.
    J.J.B. Krishnamurthy, M. Rabinovich, Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites, in Proceedings of International WWW Conferences, 2002Google Scholar
  6. 6.
    Y. Chen, K. Hwang, Collaborative change detection of DDoS attacks on community and ISP networks, in Proceedings of IEEE CTS, 2006Google Scholar
  7. 7.
    R.B.G. Carl, G. Kesidis, S. Rai, Denial of service attack detection techniques. IEEE Internet Comput. 10 (1), 82–89 (2006)CrossRefGoogle Scholar
  8. 8.
    B. Wang, Y. Zheng, W. Lou, Y.T. Hou, DDoS attack protection in the era of cloud computing and software-defined networking. Comput. Netw. 81, 308–319 (2015)CrossRefGoogle Scholar
  9. 9.
    A. Mishra, R. Mathur, S. Jain, J. Singh Rathore, Cloud computing security. Int. J. Recent Innov. Trends Comput. Commun. 1 (1), 36–39 (2013)Google Scholar
  10. 10.
    D. Zissis, D. Lekkas, Addressing cloud computing security issues. Futur. Gener. Comput. Syst. 28 (3), 583–592 (2012)CrossRefGoogle Scholar
  11. 11.
    S.S. Iyengar, K.G. Boroojeni, Oblivious Network Routing: Algorithms and Applications (MIT Press, Cambridge, 2015)zbMATHGoogle Scholar
  12. 12.
    A. Gupta, M.T. Hajiaghayi, H. Racke, Oblivious network design, in SODA ’06: Proceedings of the 17th Annual ACM-SIAM Symposium on Discrete Algorithm (ACM, New York, 2006), pp. 970–979CrossRefGoogle Scholar
  13. 13.
    MATLAB version 8.5. Miami, The MathWorks Inc., Florida, 2015Google Scholar
  14. 14.
    S. Knight, H.X. Nguyen, N. Falkner, R. Bowden, M. Roughan, The internet topology zoo. IEEE J. Sel. Areas Commun. 29 (9), 1765–1775 (2011)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2017

Authors and Affiliations

  • Kianoosh G. Boroojeni
    • 1
  • M. Hadi Amini
    • 2
    • 3
  • S. S. Iyengar
    • 1
  1. 1.School of Computing and Information SciencesFlorida International UniversityMiamiUSA
  2. 2.SYSU-CMU Joint Institute of Engineering School of Electronics and Information TechnologySun Yat-sen UniversityGuangzhouChina
  3. 3.Department of Electrical and Computer EngineeringCarnegie Mellon UniversityPittsburghUSA

Personalised recommendations