Open AccessJournal Article
A Survey on Security Threats for Cloud Computing
Nagaraju Kilari,R. Sridaran +1 more
Reads0
Chats0
TLDR
An attempt has been made to consolidate the various security threats in a classified manner and to illustrate how cloud and virtualization vulnerabilities affect the different cloud service models.Abstract:
Cloud Computing provides an efficient and flexible way for services to meet escalating business needs. Cloudshared infrastructure and associated services make it cost effective alternative to traditional approaches. However, they may also introduce security breaches and privacy issues. As more cloud based applications keep evolving, the associated security threats are also growing. Many research works on cloud security exist in partial forms of either specifically on cloud issues or virtualization-related security issues. In this paper, an attempt has been made to consolidate the various security threats in a classified manner and to illustrate how cloud and virtualization vulnerabilities affect the different cloud service models.read more
Citations
More filters
Journal ArticleDOI
Internet of Things (IoT) Cybersecurity Research: A Review of Current Research Topics
TL;DR: This review provides useful information and insights to researchers and practitioners who are interested in cybersecurity of IoT, including the current research of IoT cybersecurity, IoT cybersecurity architecture and taxonomy, key enabling countermeasures and strategies, major applications in industries, research trends and challenges.
Journal ArticleDOI
A Review of Machine Learning Algorithms for Cloud Computing Security
Umer Ahmed Butt,M. U. Mehmood,Syed Bilal Hussain Shah,Rashid Amin,M. Waqas Shaukat,Syed Mohsan Raza,Doug Young Suh,Md. Jalil Piran +7 more
TL;DR: This review paper presents an analysis of CC security threats, issues, and solutions that utilized one or several ML algorithms used to overcome the cloud security issues including supervised, unsupervised, semi- supervised, and reinforcement learning.
Proceedings ArticleDOI
IoT security: A layered approach for attacks & defenses
TL;DR: The security challenges in the four layers of the IoT architecture and their solutions proposed from 2010 to 2016 are evaluated and important security technologies like encryption are analyzed in the IoT context.
Journal ArticleDOI
Security features embedded in computer aided design (CAD) solid models for additive manufacturing
Fei Chen,Gary Mac,Nikhil Gupta +2 more
TL;DR: The present work aims at developing design features in CAD models that can be used for the purpose of security against counterfeiting and represents design methodologies that need to be developed for the given component design and the desired AM technique.
Journal ArticleDOI
A Hybrid Intrusion Detection Model Using EGA-PSO and Improved Random Forest Method
Amit Kumar Balyan,Sachin Ahuja,Umesh Kumar Lilhore,Sanjeev Kumar Sharma,Poongodi Manoharan,Abeer D. Algarni,Hela Elmannai,Kaamran Raahemifar +7 more
TL;DR: This research develops an efficient hybrid network-based IDS model (HNIDS), which is utilized using the enhanced genetic algorithm and particle swarm optimization (EGA-PSO) and improved random forest (IRF) methods to deal with the data imbalance issue.
References
More filters
Proceedings ArticleDOI
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
TL;DR: This paper addresses the problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re- Encryption.
Proceedings ArticleDOI
Controlling data in the cloud: outsourcing computation without outsourcing control
Richard Chow,Philippe Golle,Markus Jakobsson,Elaine Shi,Jessica Staddon,Ryusuke Masuoka,Jesus Molina +6 more
TL;DR: It is argued that with continued research advances in trusted computing and computation-supporting encryption, life in the cloud can be advantageous from a business intelligence standpoint over the isolated alternative that is more common today.
Journal ArticleDOI
Cloud computing security issues and challenges
Kresimir Popovic,Zeljko Hocenski +1 more
TL;DR: Security issues, requirements and challenges that cloud service providers (CSP) face during cloud engineering are discussed and recommended security standards and management models to address these are suggested for technical and business community.
Proceedings ArticleDOI
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
Zhi Wang,Xuxian Jiang +1 more
TL;DR: This paper presents HyperSafe, a lightweight approach that endows existing Type-I bare-metal hypervisors with a unique self-protection capability to provide lifetime control flow integrity and shows HyperSafe can reliably enable the hypervisor self- protection and provide the integrity guarantee with a small performance overhead.
Proceedings ArticleDOI
The management of security in Cloud computing
TL;DR: Gartner's list on cloud security issues, as well the findings from the International Data Corporation enterprise panel survey based on cloud threats, will be discussed in this paper.