A systematic literature review on cloud computing security: threats and mitigation strategies
Cloud computing has become a widely exploited research area in academia and industry.
Cloud computing benefits both cloud services providers (CSPs) and consumers. The …
Cloud computing benefits both cloud services providers (CSPs) and consumers. The …
A survey on emerging SDN and NFV security mechanisms for IoT systems
I Farris, T Taleb, Y Khettab… - … Communications Surveys & …, 2018 - ieeexplore.ieee.org
The explosive rise of Internet of Things (IoT) systems have notably increased the potential
attack surfaces for cybercriminals. Accounting for the features and constraints of IoT devices …
attack surfaces for cybercriminals. Accounting for the features and constraints of IoT devices …
A machine learning security framework for iot systems
Internet of Things security is attracting a growing attention from both academic and industry
communities. Indeed, IoT devices are prone to various security attacks varying from Denial …
communities. Indeed, IoT devices are prone to various security attacks varying from Denial …
Everything as a service (XaaS) on the cloud: origins, current and future trends
For several years now, scientists have been proposing numerous models for defining
anything" as a service (aaS)", including discussions of products, processes, data & …
anything" as a service (aaS)", including discussions of products, processes, data & …
Towards achieving data security with the cloud computing adoption framework
V Chang, M Ramachandran - IEEE Transactions on services …, 2015 - ieeexplore.ieee.org
Offering real-time data security for petabytes of data is important for cloud computing. A
recent survey on cloud security states that the security of users' data has the highest priority …
recent survey on cloud security states that the security of users' data has the highest priority …
Intrusion detection techniques in cloud environment: A survey
Security is of paramount importance in this new era of on-demand Cloud Computing.
Researchers have provided a survey on several intrusion detection techniques for detecting …
Researchers have provided a survey on several intrusion detection techniques for detecting …
Search: A collaborative and intelligent nids architecture for sdn-based cloud iot networks
The explosive rise of intelligent devices with ubiquitous connectivity have dramatically
increased Internet of Things (IoT) traffic in the cloud environment and created potential …
increased Internet of Things (IoT) traffic in the cloud environment and created potential …
Distributed intrusion detection system for cloud environments based on data mining techniques
M Idhammad, K Afdel, M Belouch - Procedia Computer Science, 2018 - Elsevier
Nearly two decades after its emergence, the Cloud Computing remains gaining traction
among organizations and individual users. Many security issues arise with the transition to …
among organizations and individual users. Many security issues arise with the transition to …
Attribute-based keyword search over hierarchical data in cloud computing
Searchable encryption (SE) has been a promising technology which allows users to perform
search queries over encrypted data. However, the most of existing SE schemes cannot deal …
search queries over encrypted data. However, the most of existing SE schemes cannot deal …
Security management architecture for NFV/SDN-aware IoT systems
The Internet of Things (IoT) brings a multidisciplinary revolution in several application areas.
However, security and privacy concerns are undermining a reliable and resilient broad …
However, security and privacy concerns are undermining a reliable and resilient broad …