scispace - formally typeset
Book ChapterDOI

An Intelligent Cloud Security System for Critical Applications

TLDR
Whenever there is an alert of hackers/snoopers, the secret intelligent agent will be automatically generated to secure the data from malicious insider attacks using weighted undirected mathematical model.
Abstract
Cloud has proven to a cost-effective technology for computing and storage for IT industry. Cloud security has often referred as app security and used to solve the communication issues between the cloud user and the cloud. Cloud security technology will be more attentive. While transforming critical application into a cloud, there is a need for a privacy and security. Cloud technology has not yet compromised with the security especially malicious insider. This paper introduces a novel idea, an intelligent agent system, which is used for an automated security. Whenever there is an alert of hackers/snoopers, the secret intelligent agent will be automatically generated to secure the data from malicious insider attacks. This paper has validated using weighted undirected mathematical model.

read more

Citations
More filters

Intercloud Architecture for Interoperability and Integration

TL;DR: The Intercloud Architecture (ICA) Framework as discussed by the authors is a conceptual model for developing Intercloud middleware and in this way will facilitate clouds interoperability and integration, which can be used as a basis for building multilayer cloud services integration framework that can allow optimised provisioning of both computing, storage and networking resources.

A Practical Mechanism for Password Change of Multiple Systems in an Organisational Setting

TL;DR: A functional and minimal effort verification application that lessens client reliance to reset and confirm client for clients' password change on multiple sites and does not require any extra equipment for achieving new password immediately to access to organisations.
References
More filters
Book ChapterDOI

Cloud Computing: Benefits, Risks and Recommendations for Information Security

TL;DR: The presentation “Cloud Computing: Benefits, risks and recommendations for information security” will cover some the most relevant information security implications of cloud computing from the technical, policy and legal perspective.
Proceedings ArticleDOI

Data Security and Privacy Protection Issues in Cloud Computing

TL;DR: This paper provides a concise but all-round analysis on data security and privacy protection issues associated with cloud computing across all stages of data life cycle and describes future research work about dataSecurity and privacy Protection issues in cloud.
Journal ArticleDOI

A framework for understanding and predicting insider attacks

TL;DR: This framework defines relevant types of insider attack-related behaviors and symptoms-''indicators'' that include deliberate markers, meaningful errors, preparatory behaviors, correlated usage patterns, verbal behavior and personality traits that can be pieced together to predict and detect an attack.
Proceedings ArticleDOI

Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud

TL;DR: Experiments conducted in a local file setting provide evidence that this approach to securing data in the cloud using offensive decoy technology may provide unprecedented levels of user data security in a Cloud environment.
Proceedings ArticleDOI

Insider Attacks in Cloud Computing

TL;DR: An assessment of current insider threat definitions and classifications, and their applicability to the cloud, and examples of insider attacks which are specific to cloud environments (and hence hard to detect using current techniques) are presented.
Related Papers (5)