2015
DOI: 10.14569/ijacsa.2015.060601
|View full text |Cite
|
Sign up to set email alerts
|

Intrusion Detection and Countermeasure of Virtual Cloud Systems - State of the Art and Current Challenges

Abstract: Abstract-Clouds are distributed Internet-based platforms that provide highly resilient and scalable environments to be used by enterprises in a multitude of ways. Cloud computing offers enterprises technology innovation that business leaders and IT infrastructure managers can choose to apply based on how and to what extent it helps them fulfil their business requirements. It is crucial that all technical consultants have a rigorous understanding of the ramifications of cloud computing as its influence is likel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 40 publications
(20 citation statements)
references
References 45 publications
(69 reference statements)
0
20
0
Order By: Relevance
“…Security and privacy issues are a major vulnerability to any technology, this can become quite serious if not treated correctly by adopting the appropriate methods [15], [16], [17], [18], [19], [20]. It has been known in recent years that RFID contactless cards have one of the most serious vulnerabilities due to the accessibility of RFID readers that can be bought online.…”
Section: Related Workmentioning
confidence: 99%
“…Security and privacy issues are a major vulnerability to any technology, this can become quite serious if not treated correctly by adopting the appropriate methods [15], [16], [17], [18], [19], [20]. It has been known in recent years that RFID contactless cards have one of the most serious vulnerabilities due to the accessibility of RFID readers that can be bought online.…”
Section: Related Workmentioning
confidence: 99%
“…These industries include; the gaming, healthcare, and education industries. Mobile gaming can now off-load computational power to the cloud [18], meaning users no longer need powerful devices to be able to run games and can essentially just use the mobile device as a thin-client with the computation and graphics rendering done entirely via the cloud [9,20].…”
Section: Mobile Gaming (M-gaming)mentioning
confidence: 99%
“…In short Cloud Computing offers various services (e.g. IAAS, PAAS and SAAS) to Mobile Computing as a means to tackle the issue of lack of storage space and processing power most mobile devices offer; which have a tremendous impact on service quality [9].…”
Section: Introductionmentioning
confidence: 99%
“…Both [9,38] state that availability of data is more of an important issue within the realm of Mobile Cloud Computing than it is in wired networks when dealing with Cloud Computing. Users that are using 'mobile' hand held devices may not be able to access the cloud to obtain a service due to factors like traffic congestion, network failure, and the out of signal issue.…”
Section: Service Availability Riskmentioning
confidence: 99%
“…Another possible mechanism which resolves the issues of the above mechanism is provided by [40] and also stated in [9]. Suggests a WIFI based multi-hop networking system known as 'MoNet' as well as a distributed content sharing protocol for the issue as well as without any infrastructure.…”
Section: Possible Security Mechanismmentioning
confidence: 99%