2018 IEEE International Conference on Consumer Electronics (ICCE) 2018
DOI: 10.1109/icce.2018.8326350
|View full text |Cite
|
Sign up to set email alerts
|

Light-weight accountable privacy preserving (LAPP) protocol to determine dishonest role of third party auditor in cloud auditing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Lastly, to reduce the dangers of brute-force, DoS and other types of attacks against the servers and services, Intrusion Detection System (IDS) can be introduced to the servers. Intrusion detection system in a simple language is a software which analyses the incoming requests to the servers and network and if it detects any abnormalities or high amounts of requests from a single source to the parts of the network higher than allowed threshold, it will block the requests coming from said source (11). This will help to ensure if an attacker is brute-forcing SSH port 22 in order to gain access to the server or just simply a user is trying to bring the system down in a DoS attack, they are either stopped or at the bare minimum they are slowed down as much as possible.…”
Section: Virtual Private Cloudsmentioning
confidence: 99%
“…Lastly, to reduce the dangers of brute-force, DoS and other types of attacks against the servers and services, Intrusion Detection System (IDS) can be introduced to the servers. Intrusion detection system in a simple language is a software which analyses the incoming requests to the servers and network and if it detects any abnormalities or high amounts of requests from a single source to the parts of the network higher than allowed threshold, it will block the requests coming from said source (11). This will help to ensure if an attacker is brute-forcing SSH port 22 in order to gain access to the server or just simply a user is trying to bring the system down in a DoS attack, they are either stopped or at the bare minimum they are slowed down as much as possible.…”
Section: Virtual Private Cloudsmentioning
confidence: 99%
“…[46]Detect and prevent malware attacks to keep your stored data secure. Seamlessly integrate multiple storage instances to review and manage the health of all your data in one unified view [47]Designed mainly to optimize your workloads for the cloud, Rapid Scaling debts for pace and license availability to scale cloud assets back down to zero even as they'll be now not needed, bringing cloud charges closer than ever to a particular demand.…”
Section: Literature Surveymentioning
confidence: 99%