메뉴 건너뛰기




Volumn 28, Issue 6, 2012, Pages 833-851

A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing

Author keywords

Cloud computing; Machine learning; Security; Threats; Trust

Indexed keywords

ATTACK DETECTION; ATTACK PREDICTION; BUSINESS OUTCOMES; CLOUD PROVIDERS; COST OF SERVICE; CYBER-ATTACKS; HYPERVISOR; LARGE DATABASE; LONG-TERM POTENTIAL; MACHINE-LEARNING; MEMORY PERFORMANCE; MODEL PERFORMANCE; MODERN MACHINES; PERFORMANCE DATA; SECURITY; SECURITY ISSUES; SECURITY LOGS; SECURITY THREATS; SUPPORT VECTOR MACHINE TECHNIQUES; THIRD PARTY SOFTWARE; THREAT DETECTION; THREATS; TRUST; USER COMMUNITIES;

EID: 84858158707     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2012.01.006     Document Type: Conference Paper
Times cited : (246)

References (83)
  • 4
    • 63649117166 scopus 로고    scopus 로고
    • Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility
    • R. Buyya, C.S. Yeo, S. Venugopal, J. Broberg, and I. Brandic Cloud computing and emerging IT platforms: vision, hype, and reality for delivering computing as the 5th utility Future Generation Computer Systems 25 6 2009 599 616
    • (2009) Future Generation Computer Systems , vol.25 , Issue.6 , pp. 599-616
    • Buyya, R.1    Yeo, C.S.2    Venugopal, S.3    Broberg, J.4    Brandic, I.5
  • 10
    • 84858156668 scopus 로고    scopus 로고
    • Press release retrieved 20 May 2011, 2009
    • S. Covert, Press release retrieved 20 May 2011, 2009 from http://cloud-standards.org/wiki/index.php?title=PressRelease.
    • Covert, S.1
  • 11
    • 84858156667 scopus 로고    scopus 로고
    • Cloud standards wiki retrieved 20 May 2011, from
    • M. Rutkowski, A. Sill, M. Edwards, L. Vreck, C. harding, P. Lipton, et al., 2011, Cloud standards wiki retrieved 20 May 2011, from http://cloud- standards.org/wiki/index.php?title=MainPage.
    • (2011)
    • Rutkowski, M.1    Sill, A.2    Edwards, M.3    Vreck, L.4    Harding, C.5    Lipton, P.6
  • 12
    • 78650609369 scopus 로고    scopus 로고
    • Security guidance for critical areas of focus in cloud computing
    • J. Archer, and A. Boehm Security guidance for critical areas of focus in cloud computing Cloud Security Alliance 2009
    • (2009) Cloud Security Alliance
    • Archer, J.1    Boehm, A.2
  • 15
    • 84858148905 scopus 로고    scopus 로고
    • CloudAudit, CloudAudit (codename: A6) retrieved 8 May 2011, from
    • CloudAudit, 2010, CloudAudit (codename: A6) retrieved 8 May 2011, from http://www.cloudaudit.org/index.html.
    • (2010)
  • 16
    • 84858148909 scopus 로고    scopus 로고
    • DMTF, Cloud management retrieved 21 May 2011, from
    • DMTF, 2011, Cloud management retrieved 21 May 2011, from http://www.dmtf.org/standards/cloud.
    • (2011)
  • 17
    • 84858156671 scopus 로고    scopus 로고
    • ETSI, Grid and cloud computing retrieved 21 May 2011, from.
    • ETSI, 2011, Grid and cloud computing retrieved 21 May 2011, from http://www.etsi.org/WebSite/Technologies/GRIDCLOUD.aspx.
    • (2011)
  • 18
    • 84858148906 scopus 로고    scopus 로고
    • NIST, NIST cloud computing program retrieved 21 May 2011, from
    • NIST, 2011, NIST cloud computing program retrieved 21 May 2011, from http://www.nist.gov/itl/cloud/.
    • (2011)
  • 19
    • 84858154029 scopus 로고    scopus 로고
    • OCCI, Open cloud computing interface retrieved 21 May 2011, from.
    • OCCI, 2011, Open cloud computing interface retrieved 21 May 2011, from http://occi-wg.org/.
    • (2011)
  • 20
    • 84858154026 scopus 로고    scopus 로고
    • OCCI, Open cloud consortium retrieved 21 May 2011, from.
    • OCCI, 2011, Open cloud consortium retrieved 21 May 2011, from http://opencloudconsortium.org/working-groups/.
    • (2011)
  • 21
    • 84858154028 scopus 로고    scopus 로고
    • SNIA Cloud storage initiative retrieved 21 May 2011, from.
    • SNIA 2011, Cloud storage initiative retrieved 21 May 2011, from http://www.snia.org/forums/csi.
    • (2011)
  • 22
    • 84858156669 scopus 로고    scopus 로고
    • Security for the cloud and SOA retrieved 8 May 2011
    • O. Arasatnam, S. Boardman, 2010, Security for the cloud and SOA retrieved 8 May 2011, from http://www.opengroup.org/soa/projects/security.htm.
    • (2010)
    • Arasatnam, O.1    Boardman, S.2
  • 25
    • 79955732000 scopus 로고    scopus 로고
    • Resources and services of the EGEE production infrastructure
    • T. Ferrari, and L. Gaido Resources and services of the EGEE production infrastructure Journal of Grid Computing 2011 1 15
    • (2011) Journal of Grid Computing , pp. 1-15
    • Ferrari, T.1    Gaido, L.2
  • 27
    • 79955706905 scopus 로고    scopus 로고
    • Using a simple prioritisation mechanism to effectively interoperate service and opportunistic grids in the EELA-2 e-Infrastructure
    • F. Brasileiro, M. Gaudencio, R. Silva, A. Duarte, D. Carvalho, and D. Scardaci Using a simple prioritisation mechanism to effectively interoperate service and opportunistic grids in the EELA-2 e-Infrastructure Journal of Grid Computing 9 2 2011 241 257
    • (2011) Journal of Grid Computing , vol.9 , Issue.2 , pp. 241-257
    • Brasileiro, F.1    Gaudencio, M.2    Silva, R.3    Duarte, A.4    Carvalho, D.5    Scardaci, D.6
  • 28
    • 78349257582 scopus 로고    scopus 로고
    • The future of cloud computing opportunities for European cloud computing beyond 2010
    • public version, 1
    • K. Jeffery, H. Schubert, B. Neidecker-Lutz, The future of cloud computing opportunities for European cloud computing beyond 2010, Expert Group Report, public version, 1 2010.
    • (2010) Expert Group Report
    • Jeffery, K.1    Schubert, H.2    Neidecker-Lutz, B.3
  • 30
    • 84856142134 scopus 로고    scopus 로고
    • Monitoring insiders activities in cloud computing using rule based learning
    • Nov. 1618, Changsha, China
    • M.T. Khorshed, A.B.M.S. Ali, S.A. Wasimi, Monitoring insiders activities in cloud computing using rule based learning, Paper presented at the Proceedings of IEEE TrustCom-11, Nov. 1618, Changsha, China, 2011.
    • (2011) Proceedings of IEEE TrustCom-11
    • Khorshed, M.T.1    Ali, A.B.M.S.2    Wasimi, S.A.3
  • 31
    • 84856619555 scopus 로고    scopus 로고
    • Trust issues that create threats for cyber attacks in cloud computing
    • December 79, Tainan, Taiwan
    • M.T. Khorshed, A.B.M.S. Ali, S.A. Wasimi, Trust issues that create threats for cyber attacks in cloud computing, Paper presented at the Proceedings of IEEE ICPADS, December 79, Tainan, Taiwan, 2011.
    • (2011) Proceedings of IEEE ICPADS
    • Khorshed, M.T.1    Ali, A.B.M.S.2    Wasimi, S.A.3
  • 34
    • 80052387522 scopus 로고    scopus 로고
    • Is cloud computing really ready for prime time?
    • N. Leavitt Is cloud computing really ready for prime time? Growth 27 2009 5
    • (2009) Growth , vol.27 , pp. 5
    • Leavitt, N.1
  • 35
    • 77949840689 scopus 로고    scopus 로고
    • Gartner: Seven cloud-computing security risks
    • J. Brodkin Gartner: seven cloud-computing security risks Infoworld 2008 1 3
    • (2008) Infoworld , pp. 1-3
    • Brodkin, J.1
  • 38
    • 67649425263 scopus 로고    scopus 로고
    • Cloud computing-a question of trust
    • C. Everett Cloud computing-a question of trust Computer Fraud & Security 6 2009 5 7
    • (2009) Computer Fraud & Security , Issue.6 , pp. 5-7
    • Everett, C.1
  • 44
    • 71749105371 scopus 로고    scopus 로고
    • Assessing the security risks of cloud computing
    • J. Heiser, M. Nicolett, Assessing the security risks of cloud computing, Gartner Report, 2009.
    • (2009) Gartner Report
    • Heiser, J.1    Nicolett, M.2
  • 45
    • 79952065844 scopus 로고    scopus 로고
    • Retrieved 21 May 2011
    • D. Lacey, 2010, Top threats to cloud computing? Retrieved 21 May 2011, from http://www.computerweekly.com/blogs/davidlacey/2010/03/ topthreatstocloudcomputing.html.
    • (2010) Top Threats to Cloud Computing?
    • Lacey, D.1
  • 47
    • 77955641901 scopus 로고    scopus 로고
    • Privacy and consumer risks in cloud computing
    • D. Svantesson, and R. Clarke Privacy and consumer risks in cloud computing Computer Law & Security Review 26 4 2010 391 397
    • (2010) Computer Law & Security Review , vol.26 , Issue.4 , pp. 391-397
    • Svantesson, D.1    Clarke, R.2
  • 52
    • 79953653695 scopus 로고    scopus 로고
    • Monitoring cloud computing by layer, part 1
    • J. Spring Monitoring cloud computing by layer, part 1 Security & Privacy, IEEE 9 2 2011 66 68
    • (2011) Security & Privacy, IEEE , vol.9 , Issue.2 , pp. 66-68
    • Spring, J.1
  • 59
    • 71749086537 scopus 로고    scopus 로고
    • Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
    • L. Yan, C. Rong, and G. Zhao Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography Cloud Computing 2009 167 177
    • (2009) Cloud Computing , pp. 167-177
    • Yan, L.1    Rong, C.2    Zhao, G.3
  • 66
    • 84858154022 scopus 로고    scopus 로고
    • Cross-site scripting worms and viruses
    • J. Grossman Cross-site scripting worms and viruses Whitehat Security 2006
    • (2006) Whitehat Security
    • Grossman, J.1
  • 68
    • 84870705926 scopus 로고    scopus 로고
    • VMware, retrieved 16 July 2011
    • VMware, VMware vSphere hypervisor retrieved 16 July 2011, from https://www.vmware.com/tryvmware/?p=esxi&ie=utf-8&oe=utf-8&aq= t&rls=org.mozilla:en-US:official&client=firefox-a.
    • VMware vSphere Hypervisor
  • 72
    • 84858151329 scopus 로고    scopus 로고
    • US-CERT retrieved 22 June 2011
    • US-CERT, 2011, What is phishing? retrieved 22 June 2011, from http://www.us-cert.gov/nav/reportphishing.html.
    • (2011) What Is Phishing?
  • 78
    • 0020083498 scopus 로고
    • The meaning and use of the area under a receiver operating characteristic (ROC) curve
    • A. James, and J. Barbara The meaning and use of the area under a receiver operating characteristic (ROC) curve Radiology 143 1982 29 36
    • (1982) Radiology , vol.143 , pp. 29-36
    • James, A.1    Barbara, J.2
  • 79
    • 0020524559 scopus 로고
    • A method of comparing the areas under receiver operating characteristic curves derived from the same cases
    • J.A. Hanley, and B.J. McNeil A method of comparing the areas under receiver operating characteristic curves derived from the same cases Radiology 148 1983 839 843 (Pubitemid 13033817)
    • (1983) Radiology , vol.148 , Issue.3 , pp. 839-843
    • Hanley, J.A.1    McNeil, B.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.