Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment
BB Gupta, OP Badve - Neural Computing and Applications, 2017 - Springer
As Cloud computing is reforming the infrastructure of IT industries, it has become one of the
critical security concerns of the defensive mechanisms applied to secure Cloud …
critical security concerns of the defensive mechanisms applied to secure Cloud …
[PDF][PDF] Cloud computing: security issues and research challenges
RP Padhy, MR Patra, SC Satapathy - International Journal of …, 2011 - academia.edu
Cloud computing is an architecture for providing computing service via the internet on
demand and pay per use access to a pool of shared resources namely networks, storage …
demand and pay per use access to a pool of shared resources namely networks, storage …
[PDF][PDF] 云计算安全: 架构, 机制与模型评价
林闯, 苏文博, 孟坤, 刘渠, 刘卫东 - 2013 - cjc.ict.ac.cn
摘要随着云计算服务的广泛使用, 租户对云计算的安全性提出了越来越高的要求,
云计算环境的动态性, 随机性, 复杂性和开放性使得原有安全方案难以适用, 这也阻碍了云计算的 …
云计算环境的动态性, 随机性, 复杂性和开放性使得原有安全方案难以适用, 这也阻碍了云计算的 …
Fog computing for the internet of things: Security and privacy issues
The inherent characteristics of Internet of Things (IoT) devices, such as limited storage and
computational power, require a new platform to efficiently process data. The concept of fog …
computational power, require a new platform to efficiently process data. The concept of fog …
APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT
Fog computing is a modern computing platform that connects the cloud with the edge smart
devices located at the edge of the network. The fog computing platform has several …
devices located at the edge of the network. The fog computing platform has several …
[图书][B] Distributed and cloud computing: from parallel processing to the internet of things
Distributed and Cloud Computing: From Parallel Processing to the Internet of Things offers
complete coverage of modern distributed computing technology including clusters, the grid …
complete coverage of modern distributed computing technology including clusters, the grid …
Trust mechanisms for cloud computing
Trust is a critical factor in cloud computing; in present practice it depends largely on
perception of reputation, and self assessment by providers of cloud services. We begin this …
perception of reputation, and self assessment by providers of cloud services. We begin this …
Trusted cloud computing with secure resources and data coloring
K Hwang, D Li - IEEE Internet Computing, 2010 - ieeexplore.ieee.org
Trust and security have prevented businesses from fully accepting cloud platforms. To
protect clouds, providers must first secure virtualized data center resources, uphold user …
protect clouds, providers must first secure virtualized data center resources, uphold user …
System and method for determining and using local reputations of users and hosts to protect information in a network environment
GH Cooper, DF Diehl, MW Green, R Ma - US Patent 8,931,043, 2015 - Google Patents
5.255. 642 A 8, 1993 Wobber et al. 2002/0051575 A1 5/2002 Myers et al. 5,239.466 A
8/1993 Morgan et al. 2002fOO59454 A1 5, 2002 Barrett et al. 5,247,661 A 9/1993 Hager et …
8/1993 Morgan et al. 2002fOO59454 A1 5, 2002 Barrett et al. 5,247,661 A 9/1993 Hager et …
COMITMENT: A fog computing trust management approach
As an extension of cloud computing, fog computing is considered to be relatively more
secure than cloud computing due to data being transiently maintained and analyzed on …
secure than cloud computing due to data being transiently maintained and analyzed on …