Abstract
Cloud has proven to a cost-effective technology for computing and storage for IT industry. Cloud security has often referred as app security and used to solve the communication issues between the cloud user and the cloud. Cloud security technology will be more attentive. While transforming critical application into a cloud, there is a need for a privacy and security. Cloud technology has not yet compromised with the security especially malicious insider. This paper introduces a novel idea, an intelligent agent system, which is used for an automated security. Whenever there is an alert of hackers/snoopers, the secret intelligent agent will be automatically generated to secure the data from malicious insider attacks. This paper has validated using weighted undirected mathematical model.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
G. Boss, P. Malladi, D. Quan, L. Legregni, H. Hall, Cloud computing (2007), www.ibm.com/developerworks/websphere/zones/hipods/
R. Piplode, U.K. Singh, An overview and study of security Issues and challenges in cloud computing. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2, 115–120 (2012)
D. Chen, H. Zhao, Data security and privacy protection issues in cloud computing, in 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), 2012, pp. 647, 651
C.-L. Tsai, U.-C. Lin, A.Y. Chang, C.-J. Chen, Information security issue of enterprises adopting the application of cloud computing, in 2010 Sixth International Conference on Networked Computing and Advanced Information Management (NCM), 2010, pp. 645, 649
A.J. Duncan, S. Creese, M. Goldsmith, Insider attacks in cloud computing, in 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012, pp. 857, 862
S. Shrum, P. Murray, Common Risks of Using Business Apps in the Cloud. Carnegie Mellon University, Produced for US-CERT, a government organization (2012)
S.J. Stolfo, M.B. Salem, A.D. Keromytis, Fog computing: mitigating insider data theft attacks in the cloud. Security and Privacy Workshops (SPW) 2012 IEEE Symposium on, 24–25 May 2012 (Angel Diaz, Chris Ferris, IBM’s open cloud architecture, 2013), pp. 125, 128
Easy Deployment of Mission Critical Application to the Cloud—GigaSpace Cloudifies
L.D.D. Babu, A. Gunasekaran, P.V. Krishna, A decision based pre-emptive fair scheduling strategy to process cloud computing work-flows for sustainable enterprise management. Int. J. Bus. Inf. Syst. 16, 409–430 (Inderscience Publishers) (2013)
D. Catteddu, G. Hogben, Benefits, Risks and Recommendations for Information Security (2009)
Cloud Reference Architecture. An Oracle White Paper November (2012)
S. Horrow, S. Gupta, A. Sardana, A. Abraham, Secure private cloud architecture for mobile infrastructure as a service, in 2012 IEEE Eighth World Congress on Services (SERVICES), 2012, pp. 149, 154
Y. Demchenko, M.X. Makkes, R. Strijkers, C. Ngo, Intercloud Architecture for Interoperability and Integration. System and Network Engineering Group UvA (2012)
Architecture for Managing Clouds. A White Paper from the Open Cloud Standards Incubator
J.M. Suri, B.K. Nath, Communication Services in Cloud Computing Environment. Telecommunication Servicing Centre (2011)
B. Panja et al., Monitoring and managing cloud computing security using denial of service bandwidth allowance. Recent Patents Comput. Sci. 6, 73–81 (2013)
E.E. Schultz, A framework for understanding and predicting insider attacks. Comput. Secur. 21, 526–531 (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Balusamy, B., Venkatakrishna, P., Palani, G., Ravikumar, U. (2015). An Intelligent Cloud Security System for Critical Applications. In: Suresh, L., Dash, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, vol 325. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2135-7_5
Download citation
DOI: https://doi.org/10.1007/978-81-322-2135-7_5
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2134-0
Online ISBN: 978-81-322-2135-7
eBook Packages: EngineeringEngineering (R0)