A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Is Cloud Secure Enough
2012
Journal of clean energy technologies
For enterprises, it is important to trade off among risks and benefits introduced by cloud technology before deciding to move to the cloud environments. ...
Although there are some issues, such as security, that cause cloud clients to worry about, with the growing of cloud computing, data security may become one of the most important concerns for IT governments ...
It means that the hacker can copy them into his local machine in order to analyze them to find valuable data before cloud provider can detect that virtual machine is in an out-of-control situation. 1) ...
doi:10.7763/ijcte.2012.v4.608
fatcat:4a67bq6fajgzbcmu7ecwjf2xtq
Cloud Slicing a new architecture for cloud security monitoring
2015
2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)
The dataset consists of several terabytes of data, involving normal activities and a wide variety of attack vectors, collected over multiple phases and periods of time in a real cloud environment. ...
In this dissertation, we introduce the first public dataset of its kind, named ISOT Cloud Intrusion Dataset (ISOT-CID), for cloud intrusion detection. ...
Acknowledgements xv
ACKNOWLEDGEMENTS In the name of ALLAH, the Most Gracious, the Most Merciful. All the praise and thanks is due to Allah, the Lord of al-alamin. ...
doi:10.1109/pacrim.2015.7334802
dblp:conf/pacrim/AldribiTL15
fatcat:xi7hvlfamvgg7lkwe45e6gckhi
CloRoFor: Cloud Robust Forensics
[article]
2015
arXiv
pre-print
In this paper we survey the issues related to host and guest machine time integrity in the cloud. ...
Guest virtual machines are especially vulnerable to attacks coming from their (more privileged) host. ...
CONCLUSION This paper contributes to the protection of timeline integrity, in particular regarding the malicious alteration of cloud virtual machine time. ...
arXiv:1506.01739v1
fatcat:ngmqv5qztbgyllzm4jtdmika4u
An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment
2018
Journal of Cloud Computing: Advances, Systems and Applications
Denial of Service (DoS) attacks threaten the ability of the cloud to respond to clients requests, which results in considerable economic losses. ...
Therefore, the accuracy of detection will be negatively affected. Motivated by this fact, we present a new approach for detecting DoS attacks in a virtualized cloud under changing environment. ...
Acknowledgements The financial support of the Natural Sciences and Engineering Research Council of Canada is gratefully acknowledged. ...
doi:10.1186/s13677-018-0109-4
fatcat:p2c64vko4vbmjhbiq3tzyqlsva
Agreement technologies and their use in cloud computing environments
2012
Progress in Artificial Intelligence
Nowadays, cloud computing is revolutionizing the services provided through the Internet to adapt itself in order to keep the quality of its services. ...
This paper discusses the role of argumentation in the next generation of agreement technologies and its use in cloud computing environments. ...
Nowadays, the greatest challenge in a cloud environment is how to efficiently re-distribute the available resources offered by physical machines among a variable set of virtual machines, taking into account ...
doi:10.1007/s13748-012-0031-9
fatcat:54iz2rqirrdyllbwdej3gauuwe
A Placement Vulnerability Study in Multi-tenant Public Clouds
[article]
2015
arXiv
pre-print
We also found ways to detect co-location with victim web servers in a multi-tiered cloud application located behind a load balancer. ...
Although there have been numerous works on side-channel attacks, there have been no studies on placement vulnerabilities in public clouds since the adoption of stronger isolation technologies such as Virtual ...
Acknowledgments This work was funded by the National Science Foundation under grants CNS-1330308, CNS-1546033 and CNS-1065134. Swift has a significant financial interest in Microsoft Corp. ...
arXiv:1507.03114v1
fatcat:opgteew3c5eafcxo2oicrbfdpq
Virtualization Security in Cloud Computing- A Survey
2021
International Journal of Advanced Trends in Computer Science and Engineering
Cloud computingat present is the most widely adopted computing paradigm across the globe. Oneofthe core attribute of cloud computing virtualization is considered as selling point of cloud services. ...
We have also classified several tool and techniques in use of security of virtualization in cloud computing and their pros and cons. ...
To maximize the overall execution time of completing on-demand user requests, HABBP uses a load balancing policy for binding cloudlets to virtual machines in such a way that each cloudlet is assigned to ...
doi:10.30534/ijatcse/2021/881032021
fatcat:4cdbu5x2wvctrbjwe6hw7ojauq
Applying mathematical models in cloud computing: A survey
[article]
2014
arXiv
pre-print
It gives introduction of how viral attack can invade the virtual machines on the cloud, discusses the top security threats and countermeasures by providing the viral threat modelling in virtual machines ...
The issue of resource allocation and revenue maximization is also equally important especially when it comes to cloud security. ...
The appropriate countermeasure depends upon the specific attack:
Viral attack in Virtual Machine (VMs) The way how viruses attack the human cell's body resembles that one of virtual machines on cloud ...
arXiv:1403.3649v1
fatcat:vzrgfmec5fdx5dd25qunxepwpm
"Applying mathematical models in cloud computing: A survey"
2014
IOSR Journal of Computer Engineering
It gives introduction of how viral attack can invade the virtual machines on the cloud, discusses the top security threats and countermeasures by providing the viral threat modelling in virtual machines ...
The issue of resource allocation and revenue maximization is also equally important especially when it comes to cloud security. ...
Viral attack in Virtual Machine (VMs) The way how viruses attack the human cell's body resembles that one of virtual machines on cloud. ...
doi:10.9790/0661-16523646
fatcat:d4nl4rvjqvderdusksoofsj7su
Memory DoS Attacks in Multi-tenant Clouds: Severity and Mitigation
[article]
2017
arXiv
pre-print
Despite the strong memory isolation techniques for virtual machines (VMs) enforced by the software virtualization layer in cloud servers, the underlying hardware memory layers are still shared by the VMs ...
Then, we design an effective, new defense against these memory DoS attacks, using a statistical metric to detect their existence and execution throttling to mitigate the attack damage. ...
To maximize resource utilization, cloud providers schedule virtual machines (VMs) leased by different tenants on the same physical machine, sharing the same hardware resources. ...
arXiv:1603.03404v3
fatcat:xcxi7ara2nfatg5xlbey4l5qu4
Performance Analysis of Cloud Load Balancing Algorithms
2016
Figshare
However out of the various issues that surround it, load balancing is one such important issue which aims for the even distribution of workload in the system for enhancing performance. ...
Cloud computing is the new word that describes an internet based computing technology which enables the users to access information and use various resources from the clouds from any location. ...
Migration Time: This parameter defines the amount of time taken in shifting workload for one virtual machine to another in the event of overload or under load. ...
doi:10.6084/m9.figshare.3821964.v1
fatcat:3mqivpcoxzgzzjfcan42yw7n6y
DDoS Attacks: Tools, Mitigation Approaches, and Probable Impact on Private Cloud Environment
[article]
2017
arXiv
pre-print
The future of the Internet is predicted to be on the cloud, resulting in more complex and more intensive computing, but possibly also a more insecure digital world. ...
The presence of a large amount of resources organized densely is a key factor in attracting DDoS attacks. Such attacks are arguably more dangerous in private individual clouds with limited resources. ...
Virtualization is a key concept in resource provisioning and management in the cloud. Virtualization provides a view of resources used to instantiate virtual machines. ...
arXiv:1710.08628v1
fatcat:qqaa3w3a2bautkkfc22hk3lk5u
On detecting co-resident cloud instances using network flow watermarking techniques
2013
International Journal of Information Security
Virtualization is the cornerstone of the developing third-party compute industry, allowing cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical resources. ...
Our investigation demonstrates the need for the careful design of hardware to be used in the cloud. ...
Through our use of Futuregrid, this material is based upon work supported in part by the National Science Foundation Under Grant No. 0910812 to Indiana University for "FutureGrid: An Experimental, High-Performance ...
doi:10.1007/s10207-013-0210-0
fatcat:xzpe7dvlwvf5bit53mngls3vpi
Know Thy Neighbor: Crypto Library Detection in Cloud
2015
Proceedings on Privacy Enhancing Technologies
In addition, we show how to differentiate between various versions of libraries to better select an attack target as well as the applicable exploit. ...
Our experiments show a complete attack setup scenario with single-trial success rates of up to 90% under light load and up to 50% under heavy load for libraries running in KVM. ...
[54] demonstrated how to track the execution path of a particular victim when co-located in the same virtual machine in PaaS clouds. ...
doi:10.1515/popets-2015-0003
dblp:journals/popets/IrazoquiIES15
fatcat:yjao6hhjj5fpvkq2bnomv3utua
Detail Study of Cloud Infrastructure Attacks and Security Techniques
2021
International Journal of Innovative Research in Computer Science & Technology
A virtual machine should be secured to handle data and maintain privacy. Methods proposed by various scholars are explained which directly or indirectly enhance the security of the cloud. ...
The uses of the cloud attract different industries in the recent decade, but this brings security challenges against attacks from insider or outsider, human or bot. ...
As trust changes may depend on pattern, hence in the future scholars can propose a technique that can learn behaviors of sessions to generate attack alarms. ...
doi:10.21276/ijircst.2021.9.2.4
fatcat:cphxwtf4bjhbpfdsukwfzxx6ve
« Previous
Showing results 1 — 15 out of 5,300 results