Comparison of Intrusion Detection Techniques in Cloud Computing
Keywords:
Cloud Computing, Firewall, Intrusion Detection System.Abstract
This paper has focused on specifying different Intrusion detection techniques in cloud computing. There are different types of attacks that are affecting the cloud are also discussed in this paper. The role of firewall and different intrusion detection techniques in cloud computing for preventing various attacks has also been discussed.
References
- Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Hiren Patel, A Survey of intrusion detection technques in Cloud, Journal of Network and Computer Applications, Elsevier, 2013, pp. 42-57
- Mohamed, A., Grundy, J., Ibrahim, A. S.: Adaptable, model-driven security engineering for SaaS cloud-based applications. Automated Software Engineering, vol. 21, pp. 187--224. Springer (2013)
- Ye Du, Li, R. Z. M.: Research on a Security Mechanism for Cloud Computing based on Virtualization. Telecommunication Systems, vol. 53, pp. 19—24, Springer (2013)
- Edurado, F. B., Monge. R., Hashizume K.: Building a Security Reference Architecture for Cloud Systems., Requirements Engineering, pp. 1—25. Springer (2015)
- Jin, H., Dong, M., Ota, K., Fan, M., Wang, G.: NetSecCC : A Scalable and Fault Tolerant Architecture for Cloud Computing Security. Peer-to-peer Networking and Applications, pp. 1—15, Springer (2014)
- P, Hu., Sung C. W., Ho, S., Chan, T. H.: Optimal Coding and Allocation for Perfect Secrecy in Multiple Clouds, Information Forensics and Security, vol. 11, pp. 388-399, IEEE (2014)
- Junwon, L., Cho, J., Seo, J., Shon, T., Won, D.: A Novel Approach to Analyzing for Detecting Malicious Network Activity Using a Cloud Computing Testbed, Mobile Networks and Applications, vol. 18, pp. 122-128, Springer (2012)
- Jin, L., Li, Y. K., Chen, X., Lee, P. P. C., Lou, W.: A Hybrid Cloud Approach for Secure Authorized Deduplication, Parallel and Distributed Systems, vol. 26, pp.1206--1216, IEEE Transactions (2014)
- Rahat, M.,Shibli, M. A., Niazi, M. A.: Cloud Identity Management Security Issues and Solutions : A Taxonomy, Complex Adaptive Systems Modeling, vol. 2, pp. 1 – 37, Springer (2014)
- Seungmin, R., Chang, H., Kim, S., Lee, Y. S.: An Efficient Peer-to-peer Distributed Scheduling for Cloud and Grid Computing, Peer-to-peer Networking and Applications, vol. 8, pp. 863 – 871, Springer (2014)
- Li, Q., Han, Q., Sun, L.: Collaborative Recognition of Queuing Behavior on Mobile Phones, Mobile Computing, vol. 15, pp. 60 – 73, IEEE (2014)
- Tak, G. K., Badge N., Manwatkar, P., Rangnathan, A., Tapaswi, S.: Asynchronous Anti Phishing Image Captcha Approach towards Phishing, International Conference on Future Computer and Communication, vol. 3, pp. 694 – 698, IEEE (2010)
- Malhotra, K., Gardner, S., Patz, R.: Implementation of elliptic-curve cryptography on mobile healthcare devices, IEEE (2007)
Downloads
Published
2017-09-30
Issue
Section
Research Articles
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
[1]
Aditya Bakshi, Sunanda, "
Comparison of Intrusion Detection Techniques in Cloud Computing" International Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307,
Volume 2, Issue 7, pp.121-126, September-2017.