Nowadays, C loud C omputing is the fir st choice of ever y I T or ganization because of its scalable and flexible natur e. H owever , the secur ity and pr ivacy is a major concer n in its success because of its open and distr ibuted ar chitectur e that is open for intr uder s. I ntr usion Detection System (I DS) is the most commonly used mechanism to detect var ious attacks on cloud. T his paper shar es an over view of differ ent intr usions in cloud. T hen, we analyze some existing cloud based intr usion detection systems with r espect to their var ious types, positioning, detection time, detection techniques, data sour ce and attacks. T he analysis also pr ovides limitations of each technique to deter mine whether they fulfill the secur ity needs of cloud computing envir onment or not. W e highlight the deployment of I DS that uses multiple detection methods to manage with secur ity challenges in cloud.
Mobile cloud computing can be defined as the cloud computing which can be access by mobile devices anytime anywhere. It is a pay as you use service. Due to the high use of cloud services the security provisions must be there to protect mobile cloud computing. The attack of unauthorized users to access the cloud services is the dangerous threat to authorized user as well as to the computing environment. To prevent such environment there are various techniques designed some of them are biometric and some are non-biometric. In this research paper we study that various techniques proposed for securing mobile cloud computing.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.