메뉴 건너뛰기




Volumn 74, Issue , 2016, Pages 98-120

On cloud security attacks: A taxonomy and intrusion detection and prevention as a service

Author keywords

Cloud computing; Intrusion detection; Security attacks; Taxonomy

Indexed keywords

CLOUD COMPUTING; INFRASTRUCTURE AS A SERVICE (IAAS); INTRUSION DETECTION; MERCURY (METAL); PLATFORM AS A SERVICE (PAAS); SOFTWARE AS A SERVICE (SAAS); TAXONOMIES;

EID: 84983503423     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2016.08.016     Document Type: Review
Times cited : (185)

References (141)
  • 1
    • 84916918767 scopus 로고    scopus 로고
    • A survey of information security incident handling in the cloud
    • Ab Rahman, N.H., Choo, K.-K.R., A survey of information security incident handling in the cloud. Comput. Secur. 49 (2015), 45–69.
    • (2015) Comput. Secur. , vol.49 , pp. 45-69
    • Ab Rahman, N.H.1    Choo, K.-K.R.2
  • 2
    • 84979201363 scopus 로고    scopus 로고
    • Authentication in mobile cloud computing: a survey
    • Alizadeh, M., et al. Authentication in mobile cloud computing: a survey. J. Netw. Comput. Appl., 2015.
    • (2015) J. Netw. Comput. Appl.
    • Alizadeh, M.1
  • 3
    • 84888390301 scopus 로고    scopus 로고
    • A survey of phishing email filtering techniques
    • Almomani, A., et al. A survey of phishing email filtering techniques. Commun. Surv. Tutor. IEEE 15:4 (2013), 2070–2090.
    • (2013) Commun. Surv. Tutor. IEEE , vol.15 , Issue.4 , pp. 2070-2090
    • Almomani, A.1
  • 4
    • 84902652343 scopus 로고    scopus 로고
    • An intelligent intrusion detection system for cloud computing (SIDSCC)
    • In: Proceedings of the 2014 International Conference on Computational Science and Computational Intelligence (CSCI), IEEE.
    • Alqahtani, S.M., Balushi, M.A. and John, R., 2014. An intelligent intrusion detection system for cloud computing (SIDSCC). In: Proceedings of the 2014 International Conference on Computational Science and Computational Intelligence (CSCI), IEEE.
    • (2014)
    • Alqahtani, S.M.1    Balushi, M.A.2    John, R.3
  • 5
    • 84902682778 scopus 로고    scopus 로고
    • An intelligent intrusion prevention system for cloud computing (SIPSCC). In: Proceedings of the 2014 International Conference on Computational Science and Computational Intelligence (CSCI), IEEE.
    • Alqahtani, S.M., Balushi, M.A. John, R., 2014. An intelligent intrusion prevention system for cloud computing (SIPSCC). In: Proceedings of the 2014 International Conference on Computational Science and Computational Intelligence (CSCI), IEEE.
    • (2014)
    • Alqahtani, S.M.1    Balushi, M.A.2    John, R.3
  • 6
    • 84856080479 scopus 로고    scopus 로고
    • MCDB: Using Multi-clouds to Ensure Security in Cloud Computing
    • In: Proceedings of the 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), IEEE.
    • AlZain, M.A., Soh, B., Pardede, E., 2011. MCDB: Using Multi-clouds to Ensure Security in Cloud Computing. In: Proceedings of the 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC), IEEE.
    • (2011)
    • AlZain, M.A.1    Soh, B.2    Pardede, E.3
  • 7
    • 84879853167 scopus 로고    scopus 로고
    • A packet marking approach to protect cloud environment against DDoS attacks
    • In: Proceedings of the 2013 International Conference on Information Communication and Embedded Systems (ICICES), IEEE.
    • Anitha, E., Malliga, S., 2013. A packet marking approach to protect cloud environment against DDoS attacks. In: Proceedings of the 2013 International Conference on Information Communication and Embedded Systems (ICICES), IEEE.
    • (2013)
    • Anitha, E.1    Malliga, S.2
  • 8
    • 84983530202 scopus 로고    scopus 로고
    • Virtualization in intrusion detection systems: a study on different approaches for cloud computing environments
    • Araújo, J.D., Abdelouahab, Z., Virtualization in intrusion detection systems: a study on different approaches for cloud computing environments. IJCSNS, 12(11), 2012, 10.
    • (2012) IJCSNS , vol.12 , Issue.11 , pp. 10
    • Araújo, J.D.1    Abdelouahab, Z.2
  • 9
    • 77950347409 scopus 로고    scopus 로고
    • A view of cloud computing
    • Armbrust, M., et al. A view of cloud computing. Commun. ACM 53:4 (2010), 50–58.
    • (2010) Commun. ACM , vol.53 , Issue.4 , pp. 50-58
    • Armbrust, M.1
  • 10
    • 84870672469 scopus 로고    scopus 로고
    • An abstract model for integrated intrusion detection and severity analysis for clouds
    • Arshad, J., Townend, P., Xu, J., An abstract model for integrated intrusion detection and severity analysis for clouds. Int. J. Cloud Appl. Comput. (IJCAC) 1:1 (2011), 1–16.
    • (2011) Int. J. Cloud Appl. Comput. (IJCAC) , vol.1 , Issue.1 , pp. 1-16
    • Arshad, J.1    Townend, P.2    Xu, J.3
  • 11
    • 84892543507 scopus 로고    scopus 로고
    • Cloud based emails boundaries and vulnerabilities
    • In: Proceedings of the Science and Information Conference (SAI), 2013. IEEE.
    • Ayodele, T. and Adeegbe, D., 2013. Cloud based emails boundaries and vulnerabilities. In: Proceedings of the Science and Information Conference (SAI), 2013. IEEE.
    • (2013)
    • Ayodele, T.1    Adeegbe, D.2
  • 12
    • 77957936209 scopus 로고    scopus 로고
    • Multi-tenant SOA middleware for cloud computing. In: Proceedings of the Cloud Computing (Cloud), 2010 IEEE 3rd International Conference on, 2010. IEEE.
    • Azeez, A., et al., 2010 Multi-tenant SOA middleware for cloud computing. In: Proceedings of the Cloud Computing (Cloud), 2010 IEEE 3rd International Conference on, 2010. IEEE.
    • (2010)
    • Azeez, A.1
  • 13
    • 77952344255 scopus 로고    scopus 로고
    • Securing cloud from ddos attacks using intrusion detection system in virtual machine
    • In: Proceedings of the Communication Software and Networks, 2010. ICCSN'10. Second International Conference on, 2010. IEEE.
    • Bakshi, A., Yogesh, B., 2010. Securing cloud from ddos attacks using intrusion detection system in virtual machine. In: Proceedings of the Communication Software and Networks, 2010. ICCSN'10. Second International Conference on, 2010. IEEE.
    • (2010)
    • Bakshi, A.1    Yogesh, B.2
  • 14
    • 84983525976 scopus 로고    scopus 로고
    • Cloud computing security case studies and research. In: Proceedings of the World Congress on Engineering. 2013.
    • Barron, C., H., Yu, Zhan, J., 2012. Cloud computing security case studies and research. In: Proceedings of the World Congress on Engineering. 2013.
    • (2012)
    • Barron, C.1    Yu, H.2    Zhan, J.3
  • 15
    • 84983566837 scopus 로고    scopus 로고
    • A survey on security issues in cloud computing. arXiv preprint arXiv:1109.5388, 2011
    • Bhadauria, R., et al., 2011. A survey on security issues in cloud computing. arXiv preprint arXiv:1109.5388, 2011.
    • (2011)
    • Bhadauria, R.1
  • 16
    • 84923230964 scopus 로고    scopus 로고
    • Survey on security issues in cloud computing and associated mitigation techniques
    • arXiv preprint arXiv:1204.0764, 2012.
    • Bhadauria, R., Sanyal, S., 2012. Survey on security issues in cloud computing and associated mitigation techniques. arXiv preprint arXiv:1204.0764, 2012.
    • (2012)
    • Bhadauria, R.1    Sanyal, S.2
  • 17
    • 80051513757 scopus 로고    scopus 로고
    • Collabra: a xen hypervisor based collaborative intrusion detection system. In: Proceedings of the Information Technology: New Generations (ITNG), 2011 Eighth International Conference on, 2011. IEEE.
    • Bharadwaja, S., et al., 2011. Collabra: a xen hypervisor based collaborative intrusion detection system. In: Proceedings of the Information Technology: New Generations (ITNG), 2011 Eighth International Conference on, 2011. IEEE.
    • (2011)
    • Bharadwaja, S.1
  • 18
    • 84872558353 scopus 로고    scopus 로고
    • Cloud computing: security challenges. In: Proceedings of the Information Science and Technology (CIST), 2012 Colloquium in. 2012. IEEE.
    • Bouayad, A., et al., 2012. Cloud computing: security challenges. In: Proceedings of the Information Science and Technology (CIST), 2012 Colloquium in. 2012. IEEE.
    • (2012)
    • Bouayad, A.1
  • 19
    • 84872351013 scopus 로고    scopus 로고
    • Enforcing trust-based intrusion detection in cloud computing using algebraic methods. In: Proceedings of the Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2012 International Conference on. IEEE.
    • Bradai, A., Afifi, H., Enforcing trust-based intrusion detection in cloud computing using algebraic methods. In: Proceedings of the Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2012 International Conference on. 2012. IEEE.
    • (2012)
    • Bradai, A.1    Afifi, H.2
  • 20
    • 78650609369 scopus 로고    scopus 로고
    • Security guidance for critical areas of focus in cloud computing v2.1
    • Brunette, G., Mogull, R., Security guidance for critical areas of focus in cloud computing v2.1. Cloud Secur. Alliance, 2009, 1–76.
    • (2009) Cloud Secur. Alliance , pp. 1-76
    • Brunette, G.1    Mogull, R.2
  • 21
    • 84983554092 scopus 로고    scopus 로고
    • Virtualization System Security
    • IBM
    • Bryan Williams, T.C., Virtualization System Security. 2010, IBM.
    • (2010)
    • Bryan Williams, T.C.1
  • 22
    • 84876261368 scopus 로고    scopus 로고
    • Cloud computing-based forensic analysis for collaborative network security management system
    • Chen, Z., et al. Cloud computing-based forensic analysis for collaborative network security management system. Tsinghua Sci. Technol. 18:1 (2013), 40–50.
    • (2013) Tsinghua Sci. Technol. , vol.18 , Issue.1 , pp. 40-50
    • Chen, Z.1
  • 23
    • 84856113439 scopus 로고    scopus 로고
    • CBF: A packet filtering method for DDoS attack defense in cloud environment. In: Proceedings of the Dependable, Autonomic and Secure Computing (DASC), 2011 IEEE Ninth International Conference on, 2011. IEEE.
    • Chen, Q., et al., 2011. CBF: A packet filtering method for DDoS attack defense in cloud environment. In: Proceedings of the Dependable, Autonomic and Secure Computing (DASC), 2011 IEEE Ninth International Conference on, 2011. IEEE.
    • (2011)
    • Chen, Q.1
  • 24
    • 84870803934 scopus 로고    scopus 로고
    • Detecting and mitigating HX-DoS attacks against cloud web services
    • In: Proceedings of the Network-Based Information Systems (NBiS), 2012 15th International Conference on, 2012. IEEE.
    • Chonka, A., Abawajy, J., 2012. Detecting and mitigating HX-DoS attacks against cloud web services. In: Proceedings of the Network-Based Information Systems (NBiS), 2012 15th International Conference on, 2012. IEEE.
    • (2012)
    • Chonka, A.1    Abawajy, J.2
  • 25
    • 84897585209 scopus 로고    scopus 로고
    • NICE: Network intrusion detection and countermeasure selection in virtual network systems
    • Chung, C.-J., et al. NICE: Network intrusion detection and countermeasure selection in virtual network systems. IEEE Trans. Dependable Secur. Comput., 2013, 1.
    • (2013) IEEE Trans. Dependable Secur. Comput. , pp. 1
    • Chung, C.-J.1
  • 26
    • 84929118270 scopus 로고    scopus 로고
    • SaaS Security and privacy
    • Corporation, P.S., 2008. SaaS Security and privacy.
    • (2008)
    • Corporation, P.S.1
  • 27
    • 84983488001 scopus 로고    scopus 로고
    • Council, S.-a.-a.-S.E., Software-as-a-Service; A Comprehensive Look at the Total Cost of Ownership of Software Applications.
    • Council, S.-a.-a.-S.E., 2006. Software-as-a-Service; A Comprehensive Look at the Total Cost of Ownership of Software Applications.
    • (2006)
  • 28
    • 77949590054 scopus 로고    scopus 로고
    • Distributed intrusion detection in clouds using mobile agents
    • In: Proceedings of the Advanced Engineering Computing and Applications in Sciences, 2009. ADVCOMP'09. Third International Conference on, 2009. IEEE.
    • Dastjerdi, A.V., Bakar, K.A., Tabatabaei, S.G.H., 2009. Distributed intrusion detection in clouds using mobile agents. In: Proceedings of the Advanced Engineering Computing and Applications in Sciences, 2009. ADVCOMP'09. Third International Conference on, 2009. IEEE.
    • (2009)
    • Dastjerdi, A.V.1    Bakar, K.A.2    Tabatabaei, S.G.H.3
  • 29
    • 77953172125 scopus 로고    scopus 로고
    • Infrastructure as a service security: Challenges and, solutions. In: Proceedings of the Informatics and Systems (INFOS), 2010 The 7th International Conference on. 2010. IEEE.
    • Dawoud, W., TakounaI., I., Meinel, C., 2010. Infrastructure as a service security: Challenges and, solutions. In: Proceedings of the Informatics and Systems (INFOS), 2010 The 7th International Conference on. 2010. IEEE.
    • (2010)
    • Dawoud, W.1    TakounaI, I.2    Meinel, C.3
  • 30
    • 84860629853 scopus 로고    scopus 로고
    • Multi-level authentication technique for accessing cloud services
    • In: Proceedings of the Computing, Communication and Applications (ICCCA), 2012 International Conference on, 2012. IEEE.
    • Dinesha, H., Agrawal, V., 2012. Multi-level authentication technique for accessing cloud services. In: Proceedings of the Computing, Communication and Applications (ICCCA), 2012 International Conference on, 2012. IEEE.
    • (2012)
    • Dinesha, H.1    Agrawal, V.2
  • 31
    • 84869391331 scopus 로고    scopus 로고
    • Return-oriented programming attack on the Xen hypervisor. In: Proceedings of the Availability, Reliability and Security (ARES), 2012 Seventh International Conference on, 2012. IEEE.
    • Ding, B., et al., 2012. Return-oriented programming attack on the Xen hypervisor. In: Proceedings of the Availability, Reliability and Security (ARES), 2012 Seventh International Conference on, 2012. IEEE.
    • (2012)
    • Ding, B.1
  • 32
    • 84893512235 scopus 로고    scopus 로고
    • Cloud Computing: Insider Attacks on Virtual Machines during Migration. In: Proceedings of the Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, 2013. IEEE.
    • Duncan, A., et al., 2013. Cloud Computing: Insider Attacks on Virtual Machines during Migration. In: Proceedings of the Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, 2013. IEEE.
    • (2013)
    • Duncan, A.1
  • 33
    • 84868152765 scopus 로고    scopus 로고
    • Insider attacks in cloud computing
    • In: Proceedings of the Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. 2012. IEEE.
    • Duncan, A.J., Creese, S., Goldsmith, M., 2012. Insider attacks in cloud computing. In: Proceedings of the Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. 2012. IEEE.
    • (2012)
    • Duncan, A.J.1    Creese, S.2    Goldsmith, M.3
  • 34
    • 84867268908 scopus 로고    scopus 로고
    • Cloud based content fetching: Using cloud infrastructure to obfuscate phishing scam analysis
    • In: Proceedings of the Services (SERVICES), 2012 IEEE Eighth World Congress on. 2012. IEEE.
    • Ferguson, E., Weber, J., Hasan, R., 2012. Cloud based content fetching: Using cloud infrastructure to obfuscate phishing scam analysis. In: Proceedings of the Services (SERVICES), 2012 IEEE Eighth World Congress on. 2012. IEEE.
    • (2012)
    • Ferguson, E.1    Weber, J.2    Hasan, R.3
  • 35
    • 84983474163 scopus 로고    scopus 로고
    • FireHost
    • Cross-Site Scripting Attacks Up 160% in Final Quarter of 2012; Available from:.
    • FireHost, 2012. Cross-Site Scripting Attacks Up 160% in Final Quarter of 2012; Available from: 〈http://www.firehost.com/company/newsroom/web-application-attack-report-fourth-quarter-2012〉.
    • (2012)
  • 36
    • 84901446600 scopus 로고    scopus 로고
    • A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing
    • Gani, A., et al. A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing. J. Netw. Comput. Appl. 43 (2014), 84–102.
    • (2014) J. Netw. Comput. Appl. , vol.43 , pp. 84-102
    • Gani, A.1
  • 37
    • 78650882184 scopus 로고    scopus 로고
    • Terra: A Virtual Machine-based Platform For Trusted Computing
    • ACM
    • Garfinkel, T., et al. Terra: A Virtual Machine-based Platform For Trusted Computing. ACM SIGOPS Operating Systems Review, 2003, ACM,.
    • (2003) ACM SIGOPS Operating Systems Review
    • Garfinkel, T.1
  • 38
    • 49049106371 scopus 로고    scopus 로고
    • Anti-DDoS Virtualized Operating System
    • In: Proceedings of the Availability, Reliability and Security, 2008. ARES 08. Third International Conference on, 2008. IEEE.
    • Garg, S., Saran, H., 2008. Anti-DDoS Virtualized Operating System. In: Proceedings of the Availability, Reliability and Security, 2008. ARES 08. Third International Conference on, 2008. IEEE.
    • (2008)
    • Garg, S.1    Saran, H.2
  • 39
    • 84897712723 scopus 로고    scopus 로고
    • A Server-Side Solution to Cache-Based Side-Channel Attacks in the Cloud
    • In: Proceedings of the Cloud Computing (CLOUD), 2013 IEEE Sixth International Conference on, 2013. IEEE.
    • Godfrey, M. and Zulkernine, M., 2013. A Server-Side Solution to Cache-Based Side-Channel Attacks in the Cloud. In: Proceedings of the Cloud Computing (CLOUD), 2013 IEEE Sixth International Conference on, 2013. IEEE.
    • (2013)
    • Godfrey, M.1    Zulkernine, M.2
  • 40
    • 84983555194 scopus 로고    scopus 로고
    • Cloud security challenges: Investigating policies, standards, and guidelines in a fortune 500 organization
    • arXiv preprint arXiv:1306.2477, 2013.
    • Grispos, G., Glisson, W.B., Storer T., 2013. Cloud security challenges: Investigating policies, standards, and guidelines in a fortune 500 organization. arXiv preprint arXiv:1306.2477, 2013.
    • (2013)
    • Grispos, G.1    Glisson, W.B.2    Storer, T.3
  • 41
    • 78149324322 scopus 로고    scopus 로고
    • A CP intrusion detection strategy on cloud computing
    • In: Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA’09). 2009.
    • Guan, Y. and Bao, J., 2009. A CP intrusion detection strategy on cloud computing. In: Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA’09). 2009.
    • (2009)
    • Guan, Y.1    Bao, J.2
  • 42
    • 84983548173 scopus 로고    scopus 로고
    • A fingerprinting system calls approach for intrusion detection in a cloud environment. In: CASoN.
    • Gupta, S., et al., 2012. A fingerprinting system calls approach for intrusion detection in a cloud environment. In: CASoN.
    • (2012)
    • Gupta, S.1
  • 43
    • 84870697197 scopus 로고    scopus 로고
    • Managing intrusion detection as a service in cloud networks
    • Hamad, H., Al-Hoby, M., Managing intrusion detection as a service in cloud networks. Int. J. Comput. Appl. 41:1 (2012), 35–40.
    • (2012) Int. J. Comput. Appl. , vol.41 , Issue.1 , pp. 35-40
    • Hamad, H.1    Al-Hoby, M.2
  • 44
    • 84866927237 scopus 로고    scopus 로고
    • Security of cloud computing, storage, and networking
    • In: Proceedings of the Collaboration Technologies and Systems (CTS), 2012 International Conference on, 2012. IEEE.
    • Hamdi, M., 2012. Security of cloud computing, storage, and networking. In: Proceedings of the Collaboration Technologies and Systems (CTS), 2012 International Conference on, 2012. IEEE.
    • (2012)
    • Hamdi, M.1
  • 45
    • 78650053109 scopus 로고    scopus 로고
    • Side channels in cloud services: deduplication in cloud storage
    • Harnik, D., Pinkas, B., Shulman-Peleg, A., Side channels in cloud services: deduplication in cloud storage. Secur. Priv. IEEE 8:6 (2010), 40–47.
    • (2010) Secur. Priv. IEEE , vol.8 , Issue.6 , pp. 40-47
    • Harnik, D.1    Pinkas, B.2    Shulman-Peleg, A.3
  • 46
    • 80052184968 scopus 로고    scopus 로고
    • A cloud-based intrusion detection and response system for mobile phones
    • In: Proceedings of the Dependable Systems and Networks Workshops (DSN-W), 2011 IEEE/IFIP 41st International Conference on, 2011. IEEE.
    • Houmansadr, A., Zonouz, S.A., Berthier, R., 2011. A cloud-based intrusion detection and response system for mobile phones. In: Proceedings of the Dependable Systems and Networks Workshops (DSN-W), 2011 IEEE/IFIP 41st International Conference on, 2011. IEEE.
    • (2011)
    • Houmansadr, A.1    Zonouz, S.A.2    Berthier, R.3
  • 47
    • 81055155507 scopus 로고    scopus 로고
    • Cloudsec: a security monitoring appliance for virtual machines in the iaas cloud model. In: Proceedings of the Network and System Security (NSS), 2011 5th International Conference on. 2011. IEEE.
    • Ibrahim, A.S., et al., 2011. Cloudsec: a security monitoring appliance for virtual machines in the iaas cloud model. In: Proceedings of the Network and System Security (NSS), 2011 5th International Conference on. 2011. IEEE.
    • (2011)
    • Ibrahim, A.S.1
  • 48
    • 74349113474 scopus 로고    scopus 로고
    • On technical security issues in cloud computing. In: Proceedings of the Cloud Computing, 2009. CLOUD'09. IEEE International Conference on, 2009. IEEE.
    • Jensen, M., et al., 2009. On technical security issues in cloud computing. In: Proceedings of the Cloud Computing, 2009. CLOUD'09. IEEE International Conference on, 2009. IEEE.
    • (2009)
    • Jensen, M.1
  • 49
    • 79955703103 scopus 로고    scopus 로고
    • The research and design of intelligent IPS model based on dynamic cloud firewall linkage
    • Jia, T., Wang, X., The research and design of intelligent IPS model based on dynamic cloud firewall linkage. Int. J. Digit. Content Technol. Appl. 5:3 (2011), 304–309.
    • (2011) Int. J. Digit. Content Technol. Appl. , vol.5 , Issue.3 , pp. 304-309
    • Jia, T.1    Wang, X.2
  • 50
    • 85043571633 scopus 로고    scopus 로고
    • Chapter 3 - CATRA: Conceptual cloud attack taxonomy and risk assessment framework, in The Cloud Security Ecosystem. Syngress: Boston. pp. 37–81.
    • Juliadotter, N.V., Choo, K.-K.R., Chapter 3 - CATRA: Conceptual cloud attack taxonomy and risk assessment framework, in The Cloud Security Ecosystem. 2015, Syngress: Boston. pp. 37–81.
    • (2015)
    • Juliadotter, N.V.1    Choo, K.-K.R.2
  • 51
    • 78751480363 scopus 로고    scopus 로고
    • Identity-based authentication in cloud storage sharing
    • In: Proceedings of the Multimedia Information Networking and Security (MINES), 2010 International Conference on, 2010. IEEE.
    • Kang, L., Zhang, X., 2010. Identity-based authentication in cloud storage sharing. In: Proceedings of the Multimedia Information Networking and Security (MINES), 2010 International Conference on, 2010. IEEE.
    • (2010)
    • Kang, L.1    Zhang, X.2
  • 52
    • 84868283421 scopus 로고    scopus 로고
    • A Filter tree approach to protect cloud computing against XML DDoS and HTTP DDoS attack
    • Springer
    • Karnwal, T., Thandapanii, S., Gnanasekaran, A., A Filter tree approach to protect cloud computing against XML DDoS and HTTP DDoS attack. Intelligent Informatics, 2013, Springer, 459–469.
    • (2013) Intelligent Informatics , pp. 459-469
    • Karnwal, T.1    Thandapanii, S.2    Gnanasekaran, A.3
  • 54
    • 84904646449 scopus 로고    scopus 로고
    • A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing
    • 2014
    • Khan, S., et al. A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing. Sci. World J., 2014 2014.
    • (2014) Sci. World J.
    • Khan, S.1
  • 55
    • 84978319091 scopus 로고    scopus 로고
    • Network forensics: review, taxonomy, and open challenges
    • Khan, S., et al. Network forensics: review, taxonomy, and open challenges. J. Netw. Comput. Appl. 66 (2016), 214–235.
    • (2016) J. Netw. Comput. Appl. , vol.66 , pp. 214-235
    • Khan, S.1
  • 56
    • 84971268778 scopus 로고    scopus 로고
    • Cloud log forensics: foundations, state of the art, and future directions
    • Khan, S., et al. Cloud log forensics: foundations, state of the art, and future directions. ACM Comput. Surv. (CSUR), 49(1), 2016, 7.
    • (2016) ACM Comput. Surv. (CSUR) , vol.49 , Issue.1 , pp. 7
    • Khan, S.1
  • 57
    • 84925944148 scopus 로고    scopus 로고
    • Forensic challenges in mobile cloud computing. In: Proceedings of the Computer, Communications, and Control Technology (I4CT), 2014 International Conference on. 2014. IEEE.
    • Khan, S., et al. Forensic challenges in mobile cloud computing. In: Proceedings of the Computer, Communications, and Control Technology (I4CT), 2014 International Conference on. 2014. IEEE.
    • Khan, S.1
  • 58
    • 84959484133 scopus 로고    scopus 로고
    • SIDNFF: Source identification network forensics framework for cloud computing. In: Proceedings of the Consumer Electronics-Taiwan (ICCE-TW), 2015 IEEE International Conference on, 2015. IEEE.
    • Khan, S., et al., 2015. SIDNFF: Source identification network forensics framework for cloud computing. In: Proceedings of the Consumer Electronics-Taiwan (ICCE-TW), 2015 IEEE International Conference on, 2015. IEEE.
    • (2015)
    • Khan, S.1
  • 59
    • 84888328281 scopus 로고    scopus 로고
    • Phishing detection: a literature survey
    • Khonji, M., Iraqi, Y., Jones, A., Phishing detection: a literature survey. Commun. Surv. Tutor. IEEE 15:4 (2013), 2091–2121.
    • (2013) Commun. Surv. Tutor. IEEE , vol.15 , Issue.4 , pp. 2091-2121
    • Khonji, M.1    Iraqi, Y.2    Jones, A.3
  • 60
    • 84856142134 scopus 로고    scopus 로고
    • Monitoring insiders activities in cloud computing using rule based learning. In: Proceedings of the Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. 2011. IEEE.
    • Khorshed, M.T., Ali, A.S. Wasimi, S.A., 2011. Monitoring insiders activities in cloud computing using rule based learning. In: Proceedings of the Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. 2011. IEEE.
    • (2011)
    • Khorshed, M.T.1    Ali, A.S.W.2
  • 61
    • 84874470449 scopus 로고    scopus 로고
    • A cloud-based intrusion detection system for Android smartphones
    • In: Proceedings of the International conference on radar, communication and computing, India. 2012.
    • Khune, R., Thangakumar, J., 2012. A cloud-based intrusion detection system for Android smartphones. In: Proceedings of the International conference on radar, communication and computing, India. 2012.
    • (2012)
    • Khune, R.1    Thangakumar, J.2
  • 62
    • 84869744639 scopus 로고    scopus 로고
    • A self-protection mechanism against stepping-stone attacks, for IaaS clouds
    • In: Proceedings of the Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2012 9th International Conference on. 2012. IEEE.
    • Kourai, K., Azumi, T., Chiba, S., 2012. A self-protection mechanism against stepping-stone attacks, for IaaS clouds. In: Proceedings of the Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2012 9th International Conference on. 2012. IEEE.
    • (2012)
    • Kourai, K.1    Azumi, T.2    Chiba, S.3
  • 63
    • 84872111291 scopus 로고    scopus 로고
    • Self-similarity based lightweight intrusion detection method for cloud computing
    • Springer
    • Kwon, H., et al. Self-similarity based lightweight intrusion detection method for cloud computing. Intelligent Information and Database Systems, 2011, Springer, 353–362.
    • (2011) Intelligent Information and Database Systems , pp. 353-362
    • Kwon, H.1
  • 64
    • 79955677448 scopus 로고    scopus 로고
    • Multi-level intrusion detection system and log management in cloud computing. In: Proceedings of the Advanced Communication Technology (ICACT), 2011 13th International Conference on, 2011. IEEE.
    • Lee, J.-H., et al., 2011. Multi-level intrusion detection system and log management in cloud computing. In: Proceedings of the Advanced Communication Technology (ICACT), 2011 13th International Conference on, 2011. IEEE.
    • (2011)
    • Lee, J.-H.1
  • 65
    • 80053019503 scopus 로고    scopus 로고
    • LARX: Large-scale anti-phishing by retrospective data-exploring based on a cloud computing platform. In: Proceedings of the Computer Communications and Networks (ICCCN), 2011 Proceedings of 20th International Conference on, 2011. IEEE.
    • Li, T., et al., 2011. LARX: Large-scale anti-phishing by retrospective data-exploring based on a cloud computing platform. In: Proceedings of the Computer Communications and Networks (ICCCN), 2011 Proceedings of 20th International Conference on, 2011. IEEE.
    • (2011)
    • Li, T.1
  • 66
    • 84983509611 scopus 로고    scopus 로고
    • A detection scheme for flooding attack on application layer based on semantic concept. In: Proceedings of the Computer Symposium (ICS), 2010 International. 2010. IEEE.
    • Lin, C.-H., et al., 2010. A detection scheme for flooding attack on application layer based on semantic concept. In: Proceedings of the Computer Symposium (ICS), 2010 International. 2010. IEEE.
    • (2010)
    • Lin, C.-H.1
  • 67
    • 84866403148 scopus 로고    scopus 로고
    • Traceback Attacks in Cloud–Pebbletrace Botnet
    • In: Proceedings of the Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on. 2012. IEEE.
    • Lin, W. and Lee, D., 2012. Traceback Attacks in Cloud–Pebbletrace Botnet. In: Proceedings of the Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on. 2012. IEEE.
    • (2012)
    • Lin, W.1    Lee, D.2
  • 68
    • 84918562009 scopus 로고    scopus 로고
    • Application partitioning algorithms in mobile cloud computing: taxonomy, review and future directions
    • Liu, J., et al. Application partitioning algorithms in mobile cloud computing: taxonomy, review and future directions. J. Netw. Comput. Appl. 48 (2015), 99–117.
    • (2015) J. Netw. Comput. Appl. , vol.48 , pp. 99-117
    • Liu, J.1
  • 69
    • 64549154025 scopus 로고    scopus 로고
    • The design and application of Xen-based host system firewall and its extension. In: Proceedings of the Electronic Computer Technology, 2009 International Conference on. 2009. IEEE.
    • Liu, F., et al., 2009. The design and application of Xen-based host system firewall and its extension. In: Proceedings of the Electronic Computer Technology, 2009 International Conference on. 2009. IEEE.
    • (2009)
    • Liu, F.1
  • 70
    • 78649815408 scopus 로고    scopus 로고
    • A cooperative intrusion detection system framework for cloud computing networks. In: Proceedings of the Parallel Processing Workshops (ICPPW), 2010 39th International Conference on. IEEE.
    • Lo, C.-C., Huang, C.-C., Ku., J. A cooperative intrusion detection system framework for cloud computing networks. In: Proceedings of the Parallel Processing Workshops (ICPPW), 2010 39th International Conference on. 2010. IEEE.
    • (2010)
    • Lo, C.-C.1    Huang, C.-C.2    Ku, J.3
  • 71
    • 84888058980 scopus 로고    scopus 로고
    • SaaS Authentication Middleware for Mobile Consumers of IaaS Cloud
    • in Services (SERVICES), 203 IEEE Ninth World Congress on, 2013. IEEE.
    • Lomotey, R.K., Deters, R., 2013. SaaS Authentication Middleware for Mobile Consumers of IaaS Cloud. in Services (SERVICES), 203 IEEE Ninth World Congress on, 2013. IEEE.
    • (2013)
    • Lomotey, R.K.1    Deters, R.2
  • 72
    • 84899069262 scopus 로고    scopus 로고
    • Resource management for Infrastructure as a Service (IaaS) in cloud computing: a survey
    • Manvi, S.S., Shyam, G.K., Resource management for Infrastructure as a Service (IaaS) in cloud computing: a survey. J. Netw. Comput. Appl. 41 (2014), 424–440.
    • (2014) J. Netw. Comput. Appl. , vol.41 , pp. 424-440
    • Manvi, S.S.1    Shyam, G.K.2
  • 73
    • 78349296456 scopus 로고    scopus 로고
    • Integrating a network ids into an open source cloud computing environment
    • In: Proceedings of the Information Assurance and Security (IAS), 2010 Sixth International Conference on. 2010. IEEE.
    • Mazzariello, C., Bifulco, R., Canonico, R., 2010. Integrating a network ids into an open source cloud computing environment. In: Proceedings of the Information Assurance and Security (IAS), 2010 Sixth International Conference on. 2010. IEEE.
    • (2010)
    • Mazzariello, C.1    Bifulco, R.2    Canonico, R.3
  • 74
    • 84903952214 scopus 로고    scopus 로고
    • Design of cloud-based parallel exclusive signature matching model in intrusion detection
    • In: Proceedings of the High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th International Conference on. 2013. IEEE.
    • Meng, Y., Li, W., Kwok, L.-F., 2013. Design of cloud-based parallel exclusive signature matching model in intrusion detection. In: Proceedings of the High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th International Conference on. 2013. IEEE.
    • (2013)
    • Meng, Y.1    Li, W.2    Kwok, L.-F.3
  • 75
    • 84886723209 scopus 로고    scopus 로고
    • A survey on security issues and solutions at different layers of cloud computing
    • Modi, C., et al. A survey on security issues and solutions at different layers of cloud computing. J. Supercomput. 63:2 (2013), 561–592.
    • (2013) J. Supercomput. , vol.63 , Issue.2 , pp. 561-592
    • Modi, C.1
  • 76
    • 84983500615 scopus 로고    scopus 로고
    • A collaborative intrusion detection and prevention system in cloud computing. In: Proceedings of the AFRICON, 2013. 2013. IEEE.
    • Mohamed, H., et al., 2013. A collaborative intrusion detection and prevention system in cloud computing. In: Proceedings of the AFRICON, 2013. 2013. IEEE.
    • (2013)
    • Mohamed, H.1
  • 78
    • 84874642710 scopus 로고    scopus 로고
    • UNWRAP: An approach on wrapping-attack tolerant SOAP messages
    • In: Proceedings of the Cloud and Green Computing (CGC), 2012 Second International Conference on. 2012. IEEE.
    • Nasridinov, A., Byun, J.-Y., Park, Y.-H., 2012. UNWRAP: An approach on wrapping-attack tolerant SOAP messages. In: Proceedings of the Cloud and Green Computing (CGC), 2012 Second International Conference on. 2012. IEEE.
    • (2012)
    • Nasridinov, A.1    Byun, J.-Y.2    Park, Y.-H.3
  • 79
    • 84970003207 scopus 로고    scopus 로고
    • Trustworthy processing of healthcare big data in hybrid clouds
    • Nepal, S., Ranjan, R., Choo, K.-K.R., Trustworthy processing of healthcare big data in hybrid clouds. Cloud Comput. IEEE 2:2 (2015), 78–84.
    • (2015) Cloud Comput. IEEE , vol.2 , Issue.2 , pp. 78-84
    • Nepal, S.1    Ranjan, R.2    Choo, K.-K.R.3
  • 80
    • 84899531027 scopus 로고    scopus 로고
    • Hypervisor-based cloud intrusion detection system
    • In: Proceedings of the Computing, Networking and Communications (ICNC), 2014 International Conference on. 2014. IEEE.
    • Nikolai, J., Wang, Y., 2014. Hypervisor-based cloud intrusion detection system. In: Proceedings of the Computing, Networking and Communications (ICNC), 2014 International Conference on. 2014. IEEE.
    • (2014)
    • Nikolai, J.1    Wang, Y.2
  • 81
    • 84896479235 scopus 로고    scopus 로고
    • Detecting a malicious insider in the cloud environment using sequential rule mining
    • In: Proceedings of the Adaptive Science and Technology (ICAST), 2013 International Conference on. 2013. IEEE.
    • Nkosi, L., Tarwireyi, P., Adigun, M.O., 2013. Detecting a malicious insider in the cloud environment using sequential rule mining. In: Proceedings of the Adaptive Science and Technology (ICAST), 2013 International Conference on. 2013. IEEE.
    • (2013)
    • Nkosi, L.1    Tarwireyi, P.2    Adigun, M.O.3
  • 82
    • 84890819793 scopus 로고    scopus 로고
    • Insider threat detection model for the cloud
    • In: Proceedings of the Information Security for South Africa, 2013. IEEE.
    • Nkosi, L., Tarwireyi, P., Adigun, M.O., 2013. Insider threat detection model for the cloud. In: Proceedings of the Information Security for South Africa, 2013. IEEE.
    • (2013)
    • Nkosi, L.1    Tarwireyi, P.2    Adigun, M.O.3
  • 83
    • 84893811224 scopus 로고    scopus 로고
    • A circular chain intrusion detection for cloud computing based on improved AdjointVM approach
    • In: Proceedings of the Computational Intelligence and Informatics (CINTI), 2013 IEEE 14th International Symposium on. 2013. IEEE.
    • Oktay, U., Aydin, M.A., Sahingoz, O.K., 2013. A circular chain intrusion detection for cloud computing based on improved AdjointVM approach. In: Proceedings of the Computational Intelligence and Informatics (CINTI), 2013 IEEE 14th International Symposium on. 2013. IEEE.
    • (2013)
    • Oktay, U.1    Aydin, M.A.2    Sahingoz, O.K.3
  • 84
    • 84882276491 scopus 로고    scopus 로고
    • Proxy Network Intrusion Detection System for cloud computing
    • In: Proceedings of the Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), 2013 International Conference on. 2013. IEEE.
    • Oktay, U., Sahingoz, O., 2013. Proxy Network Intrusion Detection System for cloud computing. In: Proceedings of the Technological Advances in Electrical, Electronics and Computer Engineering (TAEECE), 2013 International Conference on. 2013. IEEE.
    • (2013)
    • Oktay, U.1    Sahingoz, O.2
  • 85
    • 51849133701 scopus 로고    scopus 로고
    • Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks. In: Proceedings of the Network Operations and Management Symposium, 2008. NOMS 2008. IEEE. 2008. IEEE.
    • Oliveira, D., et al., 2008. Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks. In: Proceedings of the Network Operations and Management Symposium, 2008. NOMS 2008. IEEE. 2008. IEEE.
    • (2008)
    • Oliveira, D.1
  • 86
    • 84956680241 scopus 로고    scopus 로고
    • Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud ddos mitigation framework
    • Osanaiye, O., Choo, K.-K.R., Dlodlo, M., Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud ddos mitigation framework. J. Netw. Comput. Appl., 2016.
    • (2016) J. Netw. Comput. Appl.
    • Osanaiye, O.1    Choo, K.-K.R.2    Dlodlo, M.3
  • 87
    • 80054987410 scopus 로고    scopus 로고
    • A hypervisor for injecting scenario-based attack effects
    • In: Proceedings of the Computer Software and Applications Conference (COMPSAC), 2011 IEEE 35th Annual. 2011. IEEE.
    • Oyama, Y., Hoshi, Y., 2011. A hypervisor for injecting scenario-based attack effects. In: Proceedings of the Computer Software and Applications Conference (COMPSAC), 2011 IEEE 35th Annual. 2011. IEEE.
    • (2011)
    • Oyama, Y.1    Hoshi, Y.2
  • 88
    • 84870667876 scopus 로고    scopus 로고
    • An intrusion detection and prevention system in cloud computing: a systematic review
    • Patel, A., et al. An intrusion detection and prevention system in cloud computing: a systematic review. J. Netw. Comput. Appl. 36:1 (2013), 25–41.
    • (2013) J. Netw. Comput. Appl. , vol.36 , Issue.1 , pp. 25-41
    • Patel, A.1
  • 89
    • 34247563970 scopus 로고    scopus 로고
    • Aiding side-channel attacks on cryptographic software with satisfiability-based analysis. Very Large Scale Integr (VLSI) Syst, IEEE Transactions on 15, 4, pp. 465–470.
    • Potlapally, N.R., et al., 2007. Aiding side-channel attacks on cryptographic software with satisfiability-based analysis. Very Large Scale Integr (VLSI) Syst, IEEE Transactions on 15, 4, pp. 465–470.
    • (2007)
    • Potlapally, N.R.1
  • 91
    • 84887901202 scopus 로고    scopus 로고
    • Cloud computing: network/security threats and countermeasures
    • Qaisar, S., Khawaja, K.F., Cloud computing: network/security threats and countermeasures. Interdiscip. J. Contemp. Res. Bus. 3:9 (2012), 1323–1329.
    • (2012) Interdiscip. J. Contemp. Res. Bus. , vol.3 , Issue.9 , pp. 1323-1329
    • Qaisar, S.1    Khawaja, K.F.2
  • 92
    • 84927804589 scopus 로고    scopus 로고
    • Sierpinski triangle based data center architecture in cloud computing
    • Qi, H., et al. Sierpinski triangle based data center architecture in cloud computing. J. Supercomput. 69:2 (2014), 887–907.
    • (2014) J. Supercomput. , vol.69 , Issue.2 , pp. 887-907
    • Qi, H.1
  • 93
    • 78249258944 scopus 로고    scopus 로고
    • A Survey on Virtual Machine Security
    • Helsinki University of Technology
    • Reuben, J.S., A Survey on Virtual Machine Security. 2007, Helsinki University of Technology,.
    • (2007)
    • Reuben, J.S.1
  • 94
    • 84857811225 scopus 로고    scopus 로고
    • Securing user authentication using single sign-on in Cloud Computing
    • In: Proceedings of the Engineering (NUiCONE), 2011 Nirma University International Conference on. 2011. IEEE.
    • Revar, A.G., Bhavsar, M.D., 2011. Securing user authentication using single sign-on in Cloud Computing. In: Proceedings of the Engineering (NUiCONE), 2011 Nirma University International Conference on. 2011. IEEE.
    • (2011)
    • Revar, A.G.1    Bhavsar, M.D.2
  • 95
    • 74049152260 scopus 로고    scopus 로고
    • Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the Proceedings of the 16th ACM conference on Computer and communications security. 2009. ACM.
    • Ristenpart, T., et al., 2009. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the Proceedings of the 16th ACM conference on Computer and communications security. 2009. ACM.
    • (2009)
    • Ristenpart, T.1
  • 96
    • 84881186992 scopus 로고    scopus 로고
    • Defense-in-depth against malicious insiders in the cloud. In: Proceedings of the Cloud Engineering (IC2E), 2013 IEEE International Conference on. 2013. IEEE.
    • Rocha, F., Gross, T., van Moorsel, A., 2013. Defense-in-depth against malicious insiders in the cloud. In: Proceedings of the Cloud Engineering (IC2E), 2013 IEEE International Conference on. 2013. IEEE.
    • (2013)
    • Rocha, F.1    Gross, T.2    van Moorsel, A.3
  • 97
    • 84855993467 scopus 로고    scopus 로고
    • Building safe PaaS clouds: a survey on security in multitenant software platforms
    • Rodero-Merino, L., et al. Building safe PaaS clouds: a survey on security in multitenant software platforms. Comput. Secur. 31:1 (2012), 96–108.
    • (2012) Comput. Secur. , vol.31 , Issue.1 , pp. 96-108
    • Rodero-Merino, L.1
  • 98
    • 74049138988 scopus 로고    scopus 로고
    • An extensible and virtualization-compatible IDS management architecture
    • In: Proceedings of the Information Assurance and Security, 2009. IAS'09. Fifth International Conference on. 2009. IEEE.
    • Roschke, S., Cheng, F., Meinel, C., 2009. An extensible and virtualization-compatible IDS management architecture. In: Proceedings of the Information Assurance and Security, 2009. IAS'09. Fifth International Conference on. 2009. IEEE.
    • (2009)
    • Roschke, S.1    Cheng, F.2    Meinel, C.3
  • 99
    • 84884477675 scopus 로고    scopus 로고
    • Detecting VM Live Migration using a Hybrid External Approach. In: CLOSER. 2013.
    • S., Fiebig, et al., 2013. Detecting VM Live Migration using a Hybrid External Approach. In: CLOSER. 2013.
    • (2013)
    • Fiebig, S.1
  • 100
    • 80053143242 scopus 로고    scopus 로고
    • Virtualization-level security in cloud computing
    • In: Proceedings of the Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on. 2011. IEEE.
    • Sabahi, F., 2011. Virtualization-level security in cloud computing. In: Proceedings of the Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference on. 2011. IEEE.
    • (2011)
    • Sabahi, F.1
  • 101
    • 84891058753 scopus 로고    scopus 로고
    • Designing a new E-Commerce authentication framework for a cloud-based environment
    • In: Proceedings of the Control and System Graduate Research Colloquium (ICSGRC), 2013 IEEE 4th. IEEE.
    • Sawesi, K.G.A., Saudi, M.M., Jali, M.Z., 2013. Designing a new E-Commerce authentication framework for a cloud-based environment. In: Proceedings of the Control and System Graduate Research Colloquium (ICSGRC), 2013 IEEE 4th. IEEE.
    • (2013)
    • Sawesi, K.G.A.1    Saudi, M.M.2    Jali, M.Z.3
  • 102
    • 84891937891 scopus 로고    scopus 로고
    • Detecting SOQL-injection vulnerabilities in sales force applications. In: Proceedings of the Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on. 2013. IEEE.
    • Saxena, A., et al., 2013. Detecting SOQL-injection vulnerabilities in sales force applications. In: Proceedings of the Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on. 2013. IEEE.
    • (2013)
    • Saxena, A.1
  • 103
    • 84870734121 scopus 로고    scopus 로고
    • Guide to Security For Full Virtualization Technologies
    • DIANE Publishing
    • Scarfone, K., Guide to Security For Full Virtualization Technologies. 2011, DIANE Publishing.
    • (2011)
    • Scarfone, K.1
  • 104
    • 84938597589 scopus 로고    scopus 로고
    • Trust model for measuring security strength of cloud computing service
    • Shaikh, R., Sasikumar, M., Trust model for measuring security strength of cloud computing service. Procedia Comput. Sci. 45 (2015), 380–389.
    • (2015) Procedia Comput. Sci. , vol.45 , pp. 380-389
    • Shaikh, R.1    Sasikumar, M.2
  • 105
    • 84949992494 scopus 로고    scopus 로고
    • Taxonomy of distributed denial of service mitigation approaches for cloud computing
    • Shameli-Sendi, A., et al. Taxonomy of distributed denial of service mitigation approaches for cloud computing. J. Netw. Comput. Appl. 58 (2015), 165–179.
    • (2015) J. Netw. Comput. Appl. , vol.58 , pp. 165-179
    • Shameli-Sendi, A.1
  • 106
    • 84866635199 scopus 로고    scopus 로고
    • Understanding the impact of denial of service attacks on virtual machines
    • In: Proceedings of the 2012 IEEE 20th International Workshop on Quality of Service 2012 IEEE Press.
    • Shea, R., Liu, J., 2012. Understanding the impact of denial of service attacks on virtual machines. In: Proceedings of the 2012 IEEE 20th International Workshop on Quality of Service 2012 IEEE Press.
    • (2012)
    • Shea, R.1    Liu, J.2
  • 107
    • 80052143494 scopus 로고    scopus 로고
    • Limiting cache-based side-channel in multi-tenant cloud using dynamic page coloring. In: Proceedings of the Dependable Systems and Networks Workshops (DSN-W), 2011 IEEE/IFIP 41st International Conference on. 2011. IEEE.
    • Shi, J., et al., 2011. Limiting cache-based side-channel in multi-tenant cloud using dynamic page coloring. In: Proceedings of the Dependable Systems and Networks Workshops (DSN-W), 2011 IEEE/IFIP 41st International Conference on. 2011. IEEE.
    • (2011)
    • Shi, J.1
  • 108
    • 84908200731 scopus 로고    scopus 로고
    • A study on the critical analysis of computational offloading frameworks for mobile cloud computing
    • Shiraz, M., et al. A study on the critical analysis of computational offloading frameworks for mobile cloud computing. J. Netw. Comput. Appl. 47 (2015), 47–60.
    • (2015) J. Netw. Comput. Appl. , vol.47 , pp. 47-60
    • Shiraz, M.1
  • 109
    • 84971301504 scopus 로고    scopus 로고
    • Cloud forensics: identifying the major issues and challenges
    • Springer
    • Simou, S., et al. Cloud forensics: identifying the major issues and challenges. Advanced Information Systems Engineering, 2014, Springer.
    • (2014) Advanced Information Systems Engineering
    • Simou, S.1
  • 110
    • 84881250193 scopus 로고    scopus 로고
    • Oblivistore: high performance oblivious cloud storage
    • In: Proceedings of the Security and Privacy (SP), 2013 IEEE Symposium on. 2013. IEEE.
    • Stefanov, E., Shi, E., 2013. Oblivistore: high performance oblivious cloud storage. In: Proceedings of the Security and Privacy (SP), 2013 IEEE Symposium on. 2013. IEEE.
    • (2013)
    • Stefanov, E.1    Shi, E.2
  • 111
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • Subashini, S., Kavitha, V., A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34:1 (2011), 1–11.
    • (2011) J. Netw. Comput. Appl. , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 112
    • 84055200868 scopus 로고    scopus 로고
    • Surveying and analyzing security, privacy and trust issues in cloud computing environments
    • Sun, D., et al. Surveying and analyzing security, privacy and trust issues in cloud computing environments. Procedia Eng. 15 (2011), 2852–2856.
    • (2011) Procedia Eng. , vol.15 , pp. 2852-2856
    • Sun, D.1
  • 113
    • 84873855071 scopus 로고    scopus 로고
    • Model checking for the defense against cross-site scripting attacks. In: Proceedings of the Computer Science & Service System (CSSS), 2012 International Conference on. 2012. IEEE.
    • Sun, Y., He., D., 2012. Model checking for the defense against cross-site scripting attacks. In: Proceedings of the Computer Science & Service System (CSSS), 2012 International Conference on. 2012. IEEE.
    • (2012)
    • Sun, Y.1    He, D.2
  • 114
    • 84983493497 scopus 로고    scopus 로고
    • Security on cloud storage and IaaS, in Taiwan-Japan Workshop 2012/Nov/272012
    • Suzaki, K., 2012. Security on cloud storage and IaaS, in Taiwan-Japan Workshop 2012/Nov/272012.
    • (2012)
    • Suzaki, K.1
  • 115
    • 80755169480 scopus 로고    scopus 로고
    • Eliminating the hypervisor attack surface for a more secure cloud. In: Proceedings of the Proceedings of the 18th ACM conference on Computer and communications security. ACM.
    • Szefer, J., et al. Eliminating the hypervisor attack surface for a more secure cloud. In: Proceedings of the Proceedings of the 18th ACM conference on Computer and communications security. 2011. ACM.
    • (2011)
    • Szefer, J.1
  • 116
    • 78650065157 scopus 로고    scopus 로고
    • Security and privacy challenges in cloud computing environments
    • Takabi, H., Joshi, J.B., Ahn, G.-J., Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 6 (2010), 24–31.
    • (2010) IEEE Secur. Priv. , vol.6 , pp. 24-31
    • Takabi, H.1    Joshi, J.B.2    Ahn, G.-J.3
  • 117
    • 84983520009 scopus 로고    scopus 로고
    • Facebook users targeted by hackers in successful phishing attack, Available from:
    • Telegraph, T., 2009. Facebook users targeted by hackers in successful phishing attack, Available from: 〈http://www.telegraph.co.uk/technology/facebook/5326971/Facebook-users-targeted-by-hackers-in-successful-phishing-attack.html〉.
    • (2009)
    • Telegraph, T.1
  • 118
    • 84905817532 scopus 로고    scopus 로고
    • Interconnected cloud computing environments: Challenges, taxonomy, and survey
    • Toosi, A.N., Calheiros, R.N., Buyya, R., Interconnected cloud computing environments: Challenges, taxonomy, and survey. ACM Comput. Surv. (CSUR), 47(1), 2014, 7.
    • (2014) ACM Comput. Surv. (CSUR) , vol.47 , Issue.1 , pp. 7
    • Toosi, A.N.1    Calheiros, R.N.2    Buyya, R.3
  • 119
    • 84856085485 scopus 로고    scopus 로고
    • Intrusion detection techniques for infrastructure as a service cloud. In: Proceedings of the Dependable, Autonomic and Secure Computing (DASC), 2011 IEEE Ninth International Conference on. 2011. IEEE.
    • Tupakula, U., Varadharajan, V., AkkuN., 2011. Intrusion detection techniques for infrastructure as a service cloud. In: Proceedings of the Dependable, Autonomic and Secure Computing (DASC), 2011 IEEE Ninth International Conference on. 2011. IEEE.
    • (2011)
    • Tupakula, U.1    Varadharajan, V.2    Akku, N.3
  • 120
    • 84983483477 scopus 로고    scopus 로고
    • Breakpoints: an analysis of potential hypervisor attack vectors
    • In: Proceedings of the Southeastcon, IEEE. 2013. IEEE.
    • Turnbull, L., Shropshire, J., 2013. Breakpoints: an analysis of potential hypervisor attack vectors. In: Proceedings of the Southeastcon, IEEE. 2013. IEEE.
    • (2013)
    • Turnbull, L.1    Shropshire, J.2
  • 121
    • 77954931494 scopus 로고    scopus 로고
    • Intrusion detection for grid and cloud computing
    • Vieira, K., et al. Intrusion detection for grid and cloud computing. IT Prof. 12:4 (2010), 38–43.
    • (2010) IT Prof. , vol.12 , Issue.4 , pp. 38-43
    • Vieira, K.1
  • 122
    • 84870354202 scopus 로고    scopus 로고
    • Economic denial of sustainability (edos) in cloud services using http and xml based ddos attacks
    • VivinSandar, S., Shenai, S., Economic denial of sustainability (edos) in cloud services using http and xml based ddos attacks. Int. J. Comput. Appl. 41:20 (2012), 11–16.
    • (2012) Int. J. Comput. Appl. , vol.41 , Issue.20 , pp. 11-16
    • VivinSandar, S.1    Shenai, S.2
  • 123
    • 84987861715 scopus 로고    scopus 로고
    • Secure virtualization in cloud computing
    • Volokyta, A., Kokhanevych, I., Ivanov, D., 2012. Secure virtualization in cloud computing.
    • (2012)
    • Volokyta, A.1    Kokhanevych, I.2    Ivanov, D.3
  • 124
    • 77955212682 scopus 로고    scopus 로고
    • Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity
    • In: Proceedings of the Security and Privacy (SP), 2010 IEEE Symposium on. 2010. IEEE.
    • Wang, Z., Jiang, X., 2010. Hypersafe: A lightweight approach to provide lifetime hypervisor control-flow integrity. In: Proceedings of the Security and Privacy (SP), 2010 IEEE Symposium on. 2010. IEEE.
    • (2010)
    • Wang, Z.1    Jiang, X.2
  • 125
    • 84896317870 scopus 로고    scopus 로고
    • A survey on vehicular cloud computing
    • Whaiduzzaman, M., et al. A survey on vehicular cloud computing. J. Netw. Comput. Appl. 40 (2014), 325–344.
    • (2014) J. Netw. Comput. Appl. , vol.40 , pp. 325-344
    • Whaiduzzaman, M.1
  • 126
    • 84880879632 scopus 로고    scopus 로고
    • Defending against VM rollback attack. In: Proceedings of the Dependable Systems and Networks Workshops (DSN-W), 2012 IEEE/IFIP 42nd International Conference on. 2012. IEEE.
    • Xia, Y., et al., 2012. Defending against VM rollback attack. In: Proceedings of the Dependable Systems and Networks Workshops (DSN-W), 2012 IEEE/IFIP 42nd International Conference on. 2012. IEEE.
    • (2012)
    • Xia, Y.1
  • 127
    • 84877272118 scopus 로고    scopus 로고
    • Security and privacy in cloud computing
    • Xiao, Z., Xiao, Y., Security and privacy in cloud computing. Commun. Surv. Tutor. IEEE 15:2 (2013), 843–859.
    • (2013) Commun. Surv. Tutor. IEEE , vol.15 , Issue.2 , pp. 843-859
    • Xiao, Z.1    Xiao, Y.2
  • 128
    • 84881348074 scopus 로고    scopus 로고
    • Cloud-based RFID authentication. In: Proceedings of the RFID (RFID), 2013 IEEE International Conference on. 2013. IEEE.
    • Xie, W., et al., 2013. Cloud-based RFID authentication. In: Proceedings of the RFID (RFID), 2013 IEEE International Conference on. 2013. IEEE.
    • (2013)
    • Xie, W.1
  • 129
    • 84983521122 scopus 로고    scopus 로고
    • CDN-on-Demand: An Affordable DDoS Defense via Untrusted Clouds.
    • Y., Gilad, et al., CDN-on-Demand: An Affordable DDoS Defense via Untrusted Clouds.
    • Gilad, Y.1
  • 130
    • 84867090258 scopus 로고    scopus 로고
    • Defense of DDoS attack for cloud computing. In: Proceedings of the Computer Science and Automation Engineering (CSAE), 2012 IEEE International Conference on. 2012. IEEE.
    • Yang, L., et al., 2012. Defense of DDoS attack for cloud computing. In: Proceedings of the Computer Science and Automation Engineering (CSAE), 2012 IEEE International Conference on. 2012. IEEE.
    • (2012)
    • Yang, L.1
  • 131
    • 78649280543 scopus 로고    scopus 로고
    • Malicious modification attacks by insiders in relational databases: prediction and prevention
    • In: Proceedings of the Social Computing (SocialCom), 2010 IEEE Second International Conference on. 2010. IEEE.
    • Yaseen, Q., Panda, B., 2010. Malicious modification attacks by insiders in relational databases: prediction and prevention. In: Proceedings of the Social Computing (SocialCom), 2010 IEEE Second International Conference on. 2010. IEEE.
    • (2010)
    • Yaseen, Q.1    Panda, B.2
  • 132
    • 84874587590 scopus 로고    scopus 로고
    • Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing. In: Proceedings of the Cloud and Green Computing (CGC), 2012 s International Conference on. 2012. IEEE.
    • Yassin, A.A., et al., 2012. Anonymous password authentication scheme by using digital signature and fingerprint in cloud computing. In: Proceedings of the Cloud and Green Computing (CGC), 2012 s International Conference on. 2012. IEEE.
    • (2012)
    • Yassin, A.A.1
  • 133
    • 84866674011 scopus 로고    scopus 로고
    • A cloud-based intrusion detection service framework. In: Proceedings of the Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on. 2012. IEEE.
    • Yassin, W., et al., 2012. A cloud-based intrusion detection service framework. In: Proceedings of the Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on. 2012. IEEE.
    • (2012)
    • Yassin, W.1
  • 134
    • 84866348681 scopus 로고    scopus 로고
    • Security issues and solutions in cloud computing. In: Proceedings of the Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on. 2012. IEEE.
    • You, P., et al., 2012. Security issues and solutions in cloud computing. In: Proceedings of the Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on. 2012. IEEE.
    • (2012)
    • You, P.1
  • 135
    • 84876748582 scopus 로고    scopus 로고
    • An approach with two-stage mode to detect cache-based side channel attacks
    • In: Proceedings of the Information Networking (ICOIN), 2013 International Conference on. 2013. IEEE.
    • Yu, S., Gui, X., Lin, J., 2013. An approach with two-stage mode to detect cache-based side channel attacks. In: Proceedings of the Information Networking (ICOIN), 2013 International Conference on. 2013. IEEE.
    • (2013)
    • Yu, S.1    Gui, X.2    Lin, J.3
  • 136
    • 79951609863 scopus 로고    scopus 로고
    • A view about cloud data security from data life cycle
    • In: Proceedings of the Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on. 2010. IEEE.
    • Yu, X., Wen, Q., 2010. A view about cloud data security from data life cycle. In: Proceedings of the Computational Intelligence and Software Engineering (CiSE), 2010 International Conference on. 2010. IEEE.
    • (2010)
    • Yu, X.1    Wen, Q.2
  • 137
    • 58049137106 scopus 로고    scopus 로고
    • PALM: security preserving VM live migration for systems with VMM-enforced protection. In: Proceedings of the Trusted Infrastructure Technologies Conference, 2008. APTC'08. Third Asia-Pacific. 2008. IEEE.
    • Zhang, F., et al., 2008. PALM: security preserving VM live migration for systems with VMM-enforced protection. In: Proceedings of the Trusted Infrastructure Technologies Conference, 2008. APTC'08. Third Asia-Pacific. 2008. IEEE.
    • (2008)
    • Zhang, F.1
  • 138
    • 38349008410 scopus 로고    scopus 로고
    • Virtual-machine-based intrusion detection on file-aware block level storage. In: Proceedings of the Computer Architecture and High Performance Computing, 2006. SBAC-PAD'06. 18th International Symposium on. 2006. IEEE.
    • Zhang, Y., et al., 2006. Virtual-machine-based intrusion detection on file-aware block level storage. In: Proceedings of the Computer Architecture and High Performance Computing, 2006. SBAC-PAD'06. 18th International Symposium on. 2006. IEEE.
    • (2006)
    • Zhang, Y.1
  • 139
    • 85177679463 scopus 로고    scopus 로고
    • Homealone: Co-residency detection in the cloud via side-channel analysis. In: Proceedings of the security and Privacy (SP), 2011 IEEE Symposium on. 2011. IEEE.
    • Zhang, Y., et al., 2011. Homealone: Co-residency detection in the cloud via side-channel analysis. In: Proceedings of the security and Privacy (SP), 2011 IEEE Symposium on. 2011. IEEE.
    • (2011)
    • Zhang, Y.1
  • 140
    • 84869859962 scopus 로고    scopus 로고
    • Cross-VM side channels and their use to extract private keys. In: Proceedings of the 2012 ACM conference on Computer and communications security. 2012. ACM.
    • Zhang, Y., et al., 2012. Cross-VM side channels and their use to extract private keys. In: Proceedings of the 2012 ACM conference on Computer and communications security. 2012. ACM.
    • (2012)
    • Zhang, Y.1
  • 141
    • 79959557055 scopus 로고    scopus 로고
    • Addressing cloud computing security issues
    • Zissis, D., Lekkas, D., Addressing cloud computing security issues. Futur. Gener. Comput. Syst. 28:3 (2012), 583–592.
    • (2012) Futur. Gener. Comput. Syst. , vol.28 , Issue.3 , pp. 583-592
    • Zissis, D.1    Lekkas, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.