scispace - formally typeset
Search or ask a question
Author

Rohit Bhadauria

Bio: Rohit Bhadauria is an academic researcher from VIT University. The author has contributed to research in topics: Cloud computing & The Internet. The author has an hindex of 6, co-authored 7 publications receiving 482 citations.

Papers
More filters
Posted Content
TL;DR: This extensive survey paper aims to elaborate and analyze the numerous unresolved issues threatening the Cloud computing adoption and diffusion affecting the various stake-holders linked to it.
Abstract: Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for the IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture, accessible through internet for lightweight portable devices. This would allow many-fold increase in the capacity or capabilities of the existing and new software. In a cloud computing environment, the entire data reside over a set of networked resources, enabling the data to be accessed through virtual machines. Since these data centers may lie in any corner of the world beyond the reach and control of users, there are multifarious security and privacy challenges that need to be understood and taken care of. Also, one can never deny the possibility of a server breakdown that has been witnessed, rather quite often in the recent times. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario. This extensive survey paper aims to elaborate and analyze the numerous unresolved issues threatening the Cloud computing adoption and diffusion affecting the various stake-holders linked to it.

242 citations

Journal ArticleDOI
TL;DR: This extensive survey paper aims to elaborate and analyze the numerous unresolved issues threatening the cloud computing adoption and diffusion affecting the various stake-holders associated with it.
Abstract: Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture, accessible through internet for lightweight portable devices. This would allow multi-fold increase in the capacity or capabilities of the existing and new software. In a cloud computing environment, the entire data reside over a set of networked resources, enabling the data to be accessed through virtual machines. Since these data-centers may lie in any corner of the world beyond the reach and control of users, there are multifarious security and privacy challenges that need to be understood and taken care of. Also, one can never deny the possibility of a server breakdown that has been witnessed, rather quite often in the recent times. There are various issues that need to be dealt with respect to security and privacy in a cloud computing scenario. This extensive survey paper aims to elaborate and analyze the numerous unresolved issues threatening the cloud computing adoption and diffusion affecting the various stake-holders linked to it.

122 citations

Journal ArticleDOI
TL;DR: In this article, an extensive survey of security and privacy issues in a cloud computing environment is presented, which aims to elaborate and analyze the numerous unresolved issues threatening the cloud computing adoption and diffusion affecting the various stake-holders associated with it.
Abstract: Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture, accessible through internet from lightweight portable devices. This would allow multi-fold increase in the capacity and capabilities of the existing and new software. In a cloud computing environment, the entire data resides over a set of networked resources, enabling the data to be accessed through virtual machines. Since these data-centres may be located in any part of the world beyond the reach and control of users, there are multifarious security and privacy challenges that need to be understood and addressed. Also, one can never deny the possibility of a server breakdown that has been witnessed, rather quite often in the recent times. There are various issues that need to be addressed with respect to security and privacy in a cloud computing environment. This extensive survey paper aims to elaborate and analyze the numerous unresolved issues threatening the cloud computing adoption and diffusion affecting the various stake-holders associated with it. Keywordsas a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), Interoperability, Denial of Service (DoS), Distributed Denial of Service (DDoS), Mobile Cloud Computing (MCC), Optical Character Recognition (OCR), Community of Interest (COI).

98 citations

05 Feb 2010
TL;DR: The adaptive characteristics of cognitive radio in secure and reliable communication are explored and the possible solutions include integrating the merits of spread spectrum modulation, using encryption algorithms (public key and private key encryption), and its potential to switch over various frequency bands.
Abstract: Support for various multimedia applications in wireless networks demands additional bandwidth in the radio frequency spectrum Efficient spectrum management algorithms are necessary to achieve immense success in wireless communications Cognitive radio seems to be a panacea for increased utilization of licensed spectrum It is defined as the new state of art technique that opportunistically share the licensed spectrum while imposing minimum interference to the licensed users In this paper, we explore the adaptive characteristics of cognitive radio in secure and reliable communication But the question is how to make the communication reliable such that there occurs no eavesdropping and information leakage The possible solutions include integrating the merits of spread spectrum modulation, using encryption algorithms (public key and private key encryption), and its potential to switch over various frequency bands In this paper, we focus on the various applications of cognitive radio and the numerous methodologies which enable a secure communication network

25 citations

Proceedings Article
01 Dec 2009
TL;DR: In this paper, the adaptive characteristics of cognitive radio in secure and reliable communication are explored and the possible solutions include integrating the merits of spread spectrum modulation, using encryption algorithms (public key and private key encryption), and its potential to switch over various frequency bands.
Abstract: Support for various multimedia applications in wireless networks demands additional bandwidth in the radio frequency spectrum. Efficient spectrum management algorithms are necessary to achieve immense success in wireless communications. Cognitive radio seems to be a panacea for increased utilization of licensed spectrum. It is defined as the new state of art technique that opportunistically share the licensed spectrum while imposing minimum interference to the licensed users. In this paper, we explore the adaptive characteristics of cognitive radio in secure and reliable communication. But the question is how to make the communication reliable such that there occurs no eavesdropping and information leakage. The possible solutions include integrating the merits of spread spectrum modulation, using encryption algorithms (public key and private key encryption), and its potential to switch over various frequency bands. In this paper, we focus on the various applications of cognitive radio and the numerous methodologies which enable a secure communication network.

17 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The security issues that arise due to the very nature of cloud computing are detailed and the recent solutions presented in the literature to counter the security issues are presented.

694 citations

Journal ArticleDOI
TL;DR: The scope of this work is to give an overview of the security threats and challenges that cognitive radios and cognitive radio networks face, along with the current state-of-the-art to detect the corresponding attacks.
Abstract: With the rapid proliferation of new technologies and services in the wireless domain, spectrum scarcity has become a major concern. The allocation of the Industrial, Medical and Scientific (ISM) band has enabled the explosion of new technologies (e.g. Wi-Fi) due to its licence-exempt characteristic. The widespread adoption of Wi-Fi technology, combined with the rapid penetration of smart phones running popular user services (e.g. social online networks) has overcrowded substantially the ISM band. On the other hand, according to a number of recent reports, several parts of the static allocated licensed bands are under-utilized. This has brought up the idea of the opportunistic use of these bands through the, so-called, cognitive radios and cognitive radio networks. Cognitive radios have enabled the opportunity to transmit in several licensed bands without causing harmful interference to licensed users. Along with the realization of cognitive radios, new security threats have been raised. Adversaries can exploit several vulnerabilities of this new technology and cause severe performance degradation. Security threats are mainly related to two fundamental characteristics of cognitive radios: cognitive capability, and reconfigurability. Threats related to the cognitive capability include attacks launched by adversaries that mimic primary transmitters, and transmission of false observations related to spectrum sensing. Reconfiguration can be exploited by attackers through the use of malicious code installed in cognitive radios. Furthermore, as cognitive radio networks are wireless in nature, they face all classic threats present in the conventional wireless networks. The scope of this work is to give an overview of the security threats and challenges that cognitive radios and cognitive radio networks face, along with the current state-of-the-art to detect the corresponding attacks. In addition, future challenges are addressed.

434 citations

Journal ArticleDOI
TL;DR: This paper proposes a dynamic resource allocation strategy to counter DDoS attacks against individual cloud customers and establishes a mathematical model to approximate the needs of the resource investment based on queueing theory.
Abstract: Cloud is becoming a dominant computing platform. Naturally, a question that arises is whether we can beat notorious DDoS attacks in a cloud environment. Researchers have demonstrated that the essential issue of DDoS attack and defense is resource competition between defenders and attackers. A cloud usually possesses profound resources and has full control and dynamic allocation capability of its resources. Therefore, cloud offers us the potential to overcome DDoS attacks. However, individual cloud hosted servers are still vulnerable to DDoS attacks if they still run in the traditional way. In this paper, we propose a dynamic resource allocation strategy to counter DDoS attacks against individual cloud customers. When a DDoS attack occurs, we employ the idle resources of the cloud to clone sufficient intrusion prevention servers for the victim in order to quickly filter out attack packets and guarantee the quality of the service for benign users simultaneously. We establish a mathematical model to approximate the needs of our resource investment based on queueing theory. Through careful system analysis and real-world data set experiments, we conclude that we can defeat DDoS attacks in a cloud environment.

228 citations

Journal ArticleDOI
TL;DR: This work identifies cloud vulnerabilities, classify known security threats and attacks, and presents the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks.
Abstract: Cloud computing is an emerging technology paradigm that migrates current technological and computing concepts into utility-like solutions similar to electricity and water systems. Clouds bring out a wide range of benefits including configurable computing resources, economic savings, and service flexibility. However, security and privacy concerns are shown to be the primary obstacles to a wide adoption of clouds. The new concepts that clouds introduce, such as multi-tenancy, resource sharing and outsourcing, create new challenges to the security community. Addressing these challenges requires, in addition to the ability to cultivate and tune the security measures developed for traditional computing systems, proposing new security policies, models, and protocols to address the unique cloud security challenges. In this work, we provide a comprehensive study of cloud computing security and privacy concerns. We identify cloud vulnerabilities, classify known security threats and attacks, and present the state-of-the-art practices to control the vulnerabilities, neutralize the threats, and calibrate the attacks. Additionally, we investigate and identify the limitations of the current solutions and provide insights of the future security perspectives. Finally, we provide a cloud security framework in which we present the various lines of defense and identify the dependency levels among them. We identify 28 cloud security threats which we classify into five categories. We also present nine general cloud attacks along with various attack incidents, and provide effectiveness analysis of the proposed countermeasures.

207 citations