Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/DASC.2009.149guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement

Published: 12 December 2009 Publication History

Abstract

Internet clouds work as service factories built around web-scale datacenters. The elastic cloud resources and huge datasets processed are subject to security breaches, privacy abuses, and copyright violations. Provisioned cloud resources on-demand are especially vulnerable to cyber attacks. The cloud platforms built by Google, IBM, and Amazon all reveal this weaknesses. We propose a new approach to integrating virtual clusters, security-reinforced datacenters, and trusted data accesses guided by reputation systems.A hierarchy of P2P reputation systems is suggested to protect clouds and datacenters at the site level and to safeguardthe data objects at the file-access level. Different security countermeasures are suggested to protect cloud service models: IaaS, PaaS, and SaaS, currently implemented by Amazon, IBM, and Google, respectively.

Cited By

View all
  • (2024)A comprehensive review of vulnerabilities and AI-enabled defense against DDoS attacks for securing cloud servicesComputer Science Review10.1016/j.cosrev.2024.10066153:COnline publication date: 1-Aug-2024
  • (2021)Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog ModelACM Transactions on Internet Technology10.1145/338277021:3(1-23)Online publication date: 16-Jun-2021
  • (2019)Building consumer trust in the cloudJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-019-0129-88:1(1-17)Online publication date: 1-Dec-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
DASC '09: Proceedings of the 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing
December 2009
816 pages
ISBN:9780769539294

Publisher

IEEE Computer Society

United States

Publication History

Published: 12 December 2009

Author Tags

  1. Internet clouds
  2. and cloud computing services
  3. data centers
  4. network security
  5. reputation system
  6. virtualization

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A comprehensive review of vulnerabilities and AI-enabled defense against DDoS attacks for securing cloud servicesComputer Science Review10.1016/j.cosrev.2024.10066153:COnline publication date: 1-Aug-2024
  • (2021)Intelligent Control and Security of Fog Resources in Healthcare Systems via a Cognitive Fog ModelACM Transactions on Internet Technology10.1145/338277021:3(1-23)Online publication date: 16-Jun-2021
  • (2019)Building consumer trust in the cloudJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-019-0129-88:1(1-17)Online publication date: 1-Dec-2019
  • (2019)Trust Evaluation in Cross-Cloud FederationACM Computing Surveys10.1145/329249952:1(1-37)Online publication date: 13-Feb-2019
  • (2018)An anomaly-based approach for DDoS attack detection in cloud environmentInternational Journal of Computer Applications in Technology10.1504/IJCAT.2018.1001472957:4(312-324)Online publication date: 1-Jan-2018
  • (2017)Fog Computing for the Internet of ThingsIEEE Internet Computing10.1109/MIC.2017.3721:2(34-42)Online publication date: 1-Mar-2017
  • (2017)Improved TOPSIS Method Based Trust Evaluation Framework for Determining Trustworthiness of Cloud Service ProvidersJournal of Grid Computing10.1007/s10723-016-9363-115:1(81-105)Online publication date: 1-Mar-2017
  • (2017)An insider threat aware access control for cloud relational databasesCluster Computing10.1007/s10586-017-0810-y20:3(2669-2685)Online publication date: 1-Sep-2017
  • (2017)Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a Cloud computing environmentNeural Computing and Applications10.1007/s00521-016-2317-528:12(3655-3682)Online publication date: 1-Dec-2017
  • (2016)A Proposed Framework for Cloud Computing adoptionInternational Journal of Organizational and Collective Intelligence10.4018/IJOCI.20160701056:3(75-98)Online publication date: 1-Jul-2016
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media