Cloudstrike: Chaos engineering for security and resiliency in cloud infrastructure

KA Torkura, MIH Sukmana, F Cheng, C Meinel - IEEE Access, 2020 - ieeexplore.ieee.org
Most cyber-attacks and data breaches in cloud infrastructure are due to human errors and
misconfiguration vulnerabilities. Cloud customer-centric tools are imperative for mitigating …

Continuous auditing and threat detection in multi-cloud infrastructure

KA Torkura, MIH Sukmana, F Cheng, C Meinel - Computers & Security, 2021 - Elsevier
Efficient change control and configuration management is imperative for addressing the
emerging security threats in cloud infrastructure. These threats majorly exploit …

SOLVING CLOUD VULNERABILITIES: ARCHITECTING AIPOWERED CYBERSECURITY SOLUTIONS FOR ENHANCED PROTECTION

SDP Rao - 2024 - philpapers.org
The rapid adoption of cloud computing has revolutionized the way organizations operate,
offering unparalleled flexibility, scalability, and efficiency. However, it also introduces a new …

Fault injection analytics: A novel approach to discover failure modes in cloud-computing systems

D Cotroneo, L De Simone, P Liguori… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
Cloud computing systems fail in complex and unexpected ways due to unexpected
combinations of events and interactions between hardware and software components. Fault …

Cloud computing security: A survey

IM Khalil, A Khreishah, M Azeem - Computers, 2014 - mdpi.com
Cloud computing is an emerging technology paradigm that migrates current technological
and computing concepts into utility-like solutions similar to electricity and water systems …

Fault-tolerance in the scope of cloud computing

AU Rehman, RL Aguiar, JP Barraca - IEEE Access, 2022 - ieeexplore.ieee.org
Fault-tolerance methods are required to ensure high availability and high reliability in cloud
computing environments. In this survey, we address fault-tolerance in the scope of cloud …

Offering security diagnosis as a service for cloud SaaS applications

M Elsayed, M Zulkernine - Journal of information security and applications, 2019 - Elsevier
With the maturity of service-oriented architecture (SOA), microservices architecture, and Web
technologies, web services have become critical components of Software as a Service …

Cloud attack and risk assessment taxonomy

NV Juliadotter, KKR Choo - IEEE Cloud Computing, 2015 - ieeexplore.ieee.org
As businesses' dependence on cloud services increases, these services are vulnerable to
security incidents, data breaches, and other malicious activities. To mitigate risks to the …

[图书][B] Chaos engineering: system resiliency in practice

C Rosenthal, N Jones - 2020 - books.google.com
As more companies move toward microservices and other distributed technologies, the
complexity of these systems increases. You can't remove the complexity, but through Chaos …

AI-Driven Cloud Security: The Future of Safeguarding Sensitive Data in the Digital Age

H Rehan - Journal of Artificial Intelligence General science …, 2024 - ojs.boulibrary.com
As organizations increasingly rely on cloud computing for storage, processing, and
deployment of sensitive data, ensuring robust security measures becomes paramount. This …