A systematic literature review on cloud computing security: threats and mitigation strategies

B Alouffi, M Hasnain, A Alharbi, W Alosaimi… - Ieee …, 2021 - ieeexplore.ieee.org
Cloud computing has become a widely exploited research area in academia and industry.
Cloud computing benefits both cloud services providers (CSPs) and consumers. The …

A survey on emerging SDN and NFV security mechanisms for IoT systems

I Farris, T Taleb, Y Khettab… - … Communications Surveys & …, 2018 - ieeexplore.ieee.org
The explosive rise of Internet of Things (IoT) systems have notably increased the potential
attack surfaces for cybercriminals. Accounting for the features and constraints of IoT devices …

A machine learning security framework for iot systems

M Bagaa, T Taleb, JB Bernabe, A Skarmeta - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things security is attracting a growing attention from both academic and industry
communities. Indeed, IoT devices are prone to various security attacks varying from Denial …

Everything as a service (XaaS) on the cloud: origins, current and future trends

Y Duan, G Fu, N Zhou, X Sun… - 2015 IEEE 8th …, 2015 - ieeexplore.ieee.org
For several years now, scientists have been proposing numerous models for defining
anything" as a service (aaS)", including discussions of products, processes, data & …

Towards achieving data security with the cloud computing adoption framework

V Chang, M Ramachandran - IEEE Transactions on services …, 2015 - ieeexplore.ieee.org
Offering real-time data security for petabytes of data is important for cloud computing. A
recent survey on cloud security states that the security of users' data has the highest priority …

Intrusion detection techniques in cloud environment: A survey

P Mishra, ES Pilli, V Varadharajan… - Journal of Network and …, 2017 - Elsevier
Security is of paramount importance in this new era of on-demand Cloud Computing.
Researchers have provided a survey on several intrusion detection techniques for detecting …

Search: A collaborative and intelligent nids architecture for sdn-based cloud iot networks

TG Nguyen, TV Phan, BT Nguyen, C So-In… - IEEE …, 2019 - ieeexplore.ieee.org
The explosive rise of intelligent devices with ubiquitous connectivity have dramatically
increased Internet of Things (IoT) traffic in the cloud environment and created potential …

Distributed intrusion detection system for cloud environments based on data mining techniques

M Idhammad, K Afdel, M Belouch - Procedia Computer Science, 2018 - Elsevier
Nearly two decades after its emergence, the Cloud Computing remains gaining traction
among organizations and individual users. Many security issues arise with the transition to …

Attribute-based keyword search over hierarchical data in cloud computing

Y Miao, J Ma, X Liu, X Li, Q Jiang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Searchable encryption (SE) has been a promising technology which allows users to perform
search queries over encrypted data. However, the most of existing SE schemes cannot deal …

Security management architecture for NFV/SDN-aware IoT systems

AM Zarca, JB Bernabe, R Trapero… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) brings a multidisciplinary revolution in several application areas.
However, security and privacy concerns are undermining a reliable and resilient broad …