2012
DOI: 10.1016/j.future.2012.01.006
|View full text |Cite
|
Sign up to set email alerts
|

A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
101
0
1

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 262 publications
(115 citation statements)
references
References 33 publications
0
101
0
1
Order By: Relevance
“…New cloud customer needs the security and trust certificate or report of these providers for making a decision to choose the right provider in terms of reliability, security and trustworthiness. So, clearly security issues are the most significant issue which is impeding the growth of mobile cloud computing [18] [19].…”
Section: The Conceptual Model Of Cloud Service Brokering System mentioning
confidence: 99%
See 1 more Smart Citation
“…New cloud customer needs the security and trust certificate or report of these providers for making a decision to choose the right provider in terms of reliability, security and trustworthiness. So, clearly security issues are the most significant issue which is impeding the growth of mobile cloud computing [18] [19].…”
Section: The Conceptual Model Of Cloud Service Brokering System mentioning
confidence: 99%
“…New cloud customer needs the security and trust certificate or report of these providers for making a decision to choose the right provider in terms of reliability, security and trustworthiness. So, clearly security issues are the most significant issue which is impeding the growth of mobile cloud computing [18] [19].However, few ranked systems are available in service provisioning or performance issues but not adequate cloud service provider security ranking system is currently available.In front of the several security issues [20] [21], we need to have some sort of monitoring, assurance and trust which not only come from the cloud service provider but also from a trusted cloud brokering system as shown in Fig. 1.…”
mentioning
confidence: 99%
“…The term 'Cloud computing' has been defined by many researchers and experts. It is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction (Khorshed et al, 2012). Indeed, Cloud computing is a metaphor which refers to a set of characteristics such as resource sharing, multi-tenancy, virtualization, elasticity, pay-as-you-go and on-demand services.…”
Section: Cloud Computingmentioning
confidence: 99%
“…Among these challenges, security is the most significant challenge which can cause a serious threat to users' assets (Khorshed et al, 2012). Due to the high usage of encryption in Cloud environment, security issues of encrypted traffic are concerned in this research.…”
Section: Cloud Computingmentioning
confidence: 99%
“…Authors of [148] test a cloud traceback model using back propagation neural network called Cloud Protector, which is trained to detect and filter DDoS attack traffic in cloud environment. More studies on DDoS related issues in cloud computing environments can be found in [149][150][151][152][153].…”
Section: Ddos Defense In Cloud Computing Environmentmentioning
confidence: 99%