Skip to main content

An Intelligent Cloud Security System for Critical Applications

  • Conference paper
  • First Online:
Artificial Intelligence and Evolutionary Algorithms in Engineering Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 325))

  • 2221 Accesses

Abstract

Cloud has proven to a cost-effective technology for computing and storage for IT industry. Cloud security has often referred as app security and used to solve the communication issues between the cloud user and the cloud. Cloud security technology will be more attentive. While transforming critical application into a cloud, there is a need for a privacy and security. Cloud technology has not yet compromised with the security especially malicious insider. This paper introduces a novel idea, an intelligent agent system, which is used for an automated security. Whenever there is an alert of hackers/snoopers, the secret intelligent agent will be automatically generated to secure the data from malicious insider attacks. This paper has validated using weighted undirected mathematical model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. G. Boss, P. Malladi, D. Quan, L. Legregni, H. Hall, Cloud computing (2007), www.ibm.com/developerworks/websphere/zones/hipods/

  2. http://www.azure.microsoft.com

  3. R. Piplode, U.K. Singh, An overview and study of security Issues and challenges in cloud computing. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2, 115–120 (2012)

    Google Scholar 

  4. D. Chen, H. Zhao, Data security and privacy protection issues in cloud computing, in 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), 2012, pp. 647, 651

    Google Scholar 

  5. C.-L. Tsai, U.-C. Lin, A.Y. Chang, C.-J. Chen, Information security issue of enterprises adopting the application of cloud computing, in 2010 Sixth International Conference on Networked Computing and Advanced Information Management (NCM), 2010, pp. 645, 649

    Google Scholar 

  6. A.J. Duncan, S. Creese, M. Goldsmith, Insider attacks in cloud computing, in 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012, pp. 857, 862

    Google Scholar 

  7. S. Shrum, P. Murray, Common Risks of Using Business Apps in the Cloud. Carnegie Mellon University, Produced for US-CERT, a government organization (2012)

    Google Scholar 

  8. S.J. Stolfo, M.B. Salem, A.D. Keromytis, Fog computing: mitigating insider data theft attacks in the cloud. Security and Privacy Workshops (SPW) 2012 IEEE Symposium on, 24–25 May 2012 (Angel Diaz, Chris Ferris, IBM’s open cloud architecture, 2013), pp. 125, 128

    Google Scholar 

  9. Easy Deployment of Mission Critical Application to the Cloud—GigaSpace Cloudifies

    Google Scholar 

  10. L.D.D. Babu, A. Gunasekaran, P.V. Krishna, A decision based pre-emptive fair scheduling strategy to process cloud computing work-flows for sustainable enterprise management. Int. J. Bus. Inf. Syst. 16, 409–430 (Inderscience Publishers) (2013)

    Google Scholar 

  11. D. Catteddu, G. Hogben, Benefits, Risks and Recommendations for Information Security (2009)

    Google Scholar 

  12. Cloud Reference Architecture. An Oracle White Paper November (2012)

    Google Scholar 

  13. S. Horrow, S. Gupta, A. Sardana, A. Abraham, Secure private cloud architecture for mobile infrastructure as a service, in 2012 IEEE Eighth World Congress on Services (SERVICES), 2012, pp. 149, 154

    Google Scholar 

  14. Y. Demchenko, M.X. Makkes, R. Strijkers, C. Ngo, Intercloud Architecture for Interoperability and Integration. System and Network Engineering Group UvA (2012)

    Google Scholar 

  15. Architecture for Managing Clouds. A White Paper from the Open Cloud Standards Incubator

    Google Scholar 

  16. J.M. Suri, B.K. Nath, Communication Services in Cloud Computing Environment. Telecommunication Servicing Centre (2011)

    Google Scholar 

  17. B. Panja et al., Monitoring and managing cloud computing security using denial of service bandwidth allowance. Recent Patents Comput. Sci. 6, 73–81 (2013)

    Google Scholar 

  18. E.E. Schultz, A framework for understanding and predicting insider attacks. Comput. Secur. 21, 526–531 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Balamurugan Balusamy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Balusamy, B., Venkatakrishna, P., Palani, G., Ravikumar, U. (2015). An Intelligent Cloud Security System for Critical Applications. In: Suresh, L., Dash, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, vol 325. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2135-7_5

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2135-7_5

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2134-0

  • Online ISBN: 978-81-322-2135-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics