Filters








5,300 Hits in 6.4 sec

Is Cloud Secure Enough

Farzad Sabahi
2012 Journal of clean energy technologies  
For enterprises, it is important to trade off among risks and benefits introduced by cloud technology before deciding to move to the cloud environments.  ...  Although there are some issues, such as security, that cause cloud clients to worry about, with the growing of cloud computing, data security may become one of the most important concerns for IT governments  ...  It means that the hacker can copy them into his local machine in order to analyze them to find valuable data before cloud provider can detect that virtual machine is in an out-of-control situation. 1)  ... 
doi:10.7763/ijcte.2012.v4.608 fatcat:4a67bq6fajgzbcmu7ecwjf2xtq

Cloud Slicing a new architecture for cloud security monitoring

Abdulaziz Aldribi, Issa Traore, Gabriel Letourneau
2015 2015 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM)  
The dataset consists of several terabytes of data, involving normal activities and a wide variety of attack vectors, collected over multiple phases and periods of time in a real cloud environment.  ...  In this dissertation, we introduce the first public dataset of its kind, named ISOT Cloud Intrusion Dataset (ISOT-CID), for cloud intrusion detection.  ...  Acknowledgements xv ACKNOWLEDGEMENTS In the name of ALLAH, the Most Gracious, the Most Merciful. All the praise and thanks is due to Allah, the Lord of al-alamin.  ... 
doi:10.1109/pacrim.2015.7334802 dblp:conf/pacrim/AldribiTL15 fatcat:xi7hvlfamvgg7lkwe45e6gckhi

CloRoFor: Cloud Robust Forensics [article]

Roberto Battistoni, Roberto Di Pietro, Flavio Lombardi
2015 arXiv   pre-print
In this paper we survey the issues related to host and guest machine time integrity in the cloud.  ...  Guest virtual machines are especially vulnerable to attacks coming from their (more privileged) host.  ...  CONCLUSION This paper contributes to the protection of timeline integrity, in particular regarding the malicious alteration of cloud virtual machine time.  ... 
arXiv:1506.01739v1 fatcat:ngmqv5qztbgyllzm4jtdmika4u

An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment

Adel Abusitta, Martine Bellaiche, Michel Dagenais
2018 Journal of Cloud Computing: Advances, Systems and Applications  
Denial of Service (DoS) attacks threaten the ability of the cloud to respond to clients requests, which results in considerable economic losses.  ...  Therefore, the accuracy of detection will be negatively affected. Motivated by this fact, we present a new approach for detecting DoS attacks in a virtualized cloud under changing environment.  ...  Acknowledgements The financial support of the Natural Sciences and Engineering Research Council of Canada is gratefully acknowledged.  ... 
doi:10.1186/s13677-018-0109-4 fatcat:p2c64vko4vbmjhbiq3tzyqlsva

Agreement technologies and their use in cloud computing environments

Stella Heras, Fernando De la Prieta, Vicente Julian, Sara Rodríguez, Vicente Botti, Javier Bajo, Juan M. Corchado
2012 Progress in Artificial Intelligence  
Nowadays, cloud computing is revolutionizing the services provided through the Internet to adapt itself in order to keep the quality of its services.  ...  This paper discusses the role of argumentation in the next generation of agreement technologies and its use in cloud computing environments.  ...  Nowadays, the greatest challenge in a cloud environment is how to efficiently re-distribute the available resources offered by physical machines among a variable set of virtual machines, taking into account  ... 
doi:10.1007/s13748-012-0031-9 fatcat:54iz2rqirrdyllbwdej3gauuwe

A Placement Vulnerability Study in Multi-tenant Public Clouds [article]

Venkatanathan Varadarajan, Yinqian Zhang, Thomas Ristenpart and Michael Swift
2015 arXiv   pre-print
We also found ways to detect co-location with victim web servers in a multi-tiered cloud application located behind a load balancer.  ...  Although there have been numerous works on side-channel attacks, there have been no studies on placement vulnerabilities in public clouds since the adoption of stronger isolation technologies such as Virtual  ...  Acknowledgments This work was funded by the National Science Foundation under grants CNS-1330308, CNS-1546033 and CNS-1065134. Swift has a significant financial interest in Microsoft Corp.  ... 
arXiv:1507.03114v1 fatcat:opgteew3c5eafcxo2oicrbfdpq

Virtualization Security in Cloud Computing- A Survey

2021 International Journal of Advanced Trends in Computer Science and Engineering  
Cloud computingat present is the most widely adopted computing paradigm across the globe. Oneofthe core attribute of cloud computing virtualization is considered as selling point of cloud services.  ...  We have also classified several tool and techniques in use of security of virtualization in cloud computing and their pros and cons.  ...  To maximize the overall execution time of completing on-demand user requests, HABBP uses a load balancing policy for binding cloudlets to virtual machines in such a way that each cloudlet is assigned to  ... 
doi:10.30534/ijatcse/2021/881032021 fatcat:4cdbu5x2wvctrbjwe6hw7ojauq

Applying mathematical models in cloud computing: A survey [article]

Alexander Ngenzi
2014 arXiv   pre-print
It gives introduction of how viral attack can invade the virtual machines on the cloud, discusses the top security threats and countermeasures by providing the viral threat modelling in virtual machines  ...  The issue of resource allocation and revenue maximization is also equally important especially when it comes to cloud security.  ...  The appropriate countermeasure depends upon the specific attack: Viral attack in Virtual Machine (VMs) The way how viruses attack the human cell's body resembles that one of virtual machines on cloud  ... 
arXiv:1403.3649v1 fatcat:vzrgfmec5fdx5dd25qunxepwpm

"Applying mathematical models in cloud computing: A survey"

Alexander Ngenzi, Dr. Selvarani R, Dr. Suchithrar
2014 IOSR Journal of Computer Engineering  
It gives introduction of how viral attack can invade the virtual machines on the cloud, discusses the top security threats and countermeasures by providing the viral threat modelling in virtual machines  ...  The issue of resource allocation and revenue maximization is also equally important especially when it comes to cloud security.  ...  Viral attack in Virtual Machine (VMs) The way how viruses attack the human cell's body resembles that one of virtual machines on cloud.  ... 
doi:10.9790/0661-16523646 fatcat:d4nl4rvjqvderdusksoofsj7su

Memory DoS Attacks in Multi-tenant Clouds: Severity and Mitigation [article]

Tianwei Zhang, Yinqian Zhang, Ruby B. Lee
2017 arXiv   pre-print
Despite the strong memory isolation techniques for virtual machines (VMs) enforced by the software virtualization layer in cloud servers, the underlying hardware memory layers are still shared by the VMs  ...  Then, we design an effective, new defense against these memory DoS attacks, using a statistical metric to detect their existence and execution throttling to mitigate the attack damage.  ...  To maximize resource utilization, cloud providers schedule virtual machines (VMs) leased by different tenants on the same physical machine, sharing the same hardware resources.  ... 
arXiv:1603.03404v3 fatcat:xcxi7ara2nfatg5xlbey4l5qu4

Performance Analysis of Cloud Load Balancing Algorithms

IIIR Publication
2016 Figshare  
However out of the various issues that surround it, load balancing is one such important issue which aims for the even distribution of workload in the system for enhancing performance.  ...  Cloud computing is the new word that describes an internet based computing technology which enables the users to access information and use various resources from the clouds from any location.  ...  Migration Time: This parameter defines the amount of time taken in shifting workload for one virtual machine to another in the event of overload or under load.  ... 
doi:10.6084/m9.figshare.3821964.v1 fatcat:3mqivpcoxzgzzjfcan42yw7n6y

DDoS Attacks: Tools, Mitigation Approaches, and Probable Impact on Private Cloud Environment [article]

Rup Kumar Deka, Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita
2017 arXiv   pre-print
The future of the Internet is predicted to be on the cloud, resulting in more complex and more intensive computing, but possibly also a more insecure digital world.  ...  The presence of a large amount of resources organized densely is a key factor in attracting DDoS attacks. Such attacks are arguably more dangerous in private individual clouds with limited resources.  ...  Virtualization is a key concept in resource provisioning and management in the cloud. Virtualization provides a view of resources used to instantiate virtual machines.  ... 
arXiv:1710.08628v1 fatcat:qqaa3w3a2bautkkfc22hk3lk5u

On detecting co-resident cloud instances using network flow watermarking techniques

Adam Bates, Benjamin Mood, Joe Pletcher, Hannah Pruse, Masoud Valafar, Kevin Butler
2013 International Journal of Information Security  
Virtualization is the cornerstone of the developing third-party compute industry, allowing cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical resources.  ...  Our investigation demonstrates the need for the careful design of hardware to be used in the cloud.  ...  Through our use of Futuregrid, this material is based upon work supported in part by the National Science Foundation Under Grant No. 0910812 to Indiana University for "FutureGrid: An Experimental, High-Performance  ... 
doi:10.1007/s10207-013-0210-0 fatcat:xzpe7dvlwvf5bit53mngls3vpi

Know Thy Neighbor: Crypto Library Detection in Cloud

Gorka Irazoqui, Mehmet Sinan IncI, Thomas Eisenbarth, Berk Sunar
2015 Proceedings on Privacy Enhancing Technologies  
In addition, we show how to differentiate between various versions of libraries to better select an attack target as well as the applicable exploit.  ...  Our experiments show a complete attack setup scenario with single-trial success rates of up to 90% under light load and up to 50% under heavy load for libraries running in KVM.  ...  [54] demonstrated how to track the execution path of a particular victim when co-located in the same virtual machine in PaaS clouds.  ... 
doi:10.1515/popets-2015-0003 dblp:journals/popets/IrazoquiIES15 fatcat:yjao6hhjj5fpvkq2bnomv3utua

Detail Study of Cloud Infrastructure Attacks and Security Techniques

Surendranath Singh B.G, Research Scholar, Department of Computer Science & Engineering, LNCT University, Bhopal, Madhya Pradesh, India., Dr. Sunil Phulre, Associate Professor, Department of Computer Science & Engineering, LNCT University, Bhopal, Madhya Pradesh, India.
2021 International Journal of Innovative Research in Computer Science & Technology  
A virtual machine should be secured to handle data and maintain privacy. Methods proposed by various scholars are explained which directly or indirectly enhance the security of the cloud.  ...  The uses of the cloud attract different industries in the recent decade, but this brings security challenges against attacks from insider or outsider, human or bot.  ...  As trust changes may depend on pattern, hence in the future scholars can propose a technique that can learn behaviors of sessions to generate attack alarms.  ... 
doi:10.21276/ijircst.2021.9.2.4 fatcat:cphxwtf4bjhbpfdsukwfzxx6ve
« Previous Showing results 1 — 15 out of 5,300 results