A study on cloud security issues

[1]  G. Madhupriya,et al.  Defense against DoS attack: PSO approach in virtualization , 2014, 2014 Sixth International Conference on Advanced Computing (ICoAC).

[2]  Sakir Sezer,et al.  Software as a service: Understanding security issues , 2015, 2015 Science and Information Conference (SAI).

[3]  Muthu Ramachandran,et al.  Cloud Computing Adoption Framework – a security framework for business clouds , 2015 .

[4]  Kai Hwang,et al.  Cloud Security with Virtualized Defense and Reputation-Based Trust Mangement , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.

[5]  Elaine Shi,et al.  ObliviStore: High Performance Oblivious Cloud Storage , 2013, 2013 IEEE Symposium on Security and Privacy.

[6]  Wei Xie,et al.  Security and Privacy in Cloud Computing: A Survey , 2010, 2010 Sixth International Conference on Semantics, Knowledge and Grids.

[7]  Mohammad Zulkernine,et al.  Preventing Cache-Based Side-Channel Attacks in a Cloud Environment , 2014, IEEE Transactions on Cloud Computing.

[8]  Shrikanth S. Narayanan,et al.  Improving Security of Parallel Algorithm Using Key Encryption Technique , 2013 .

[9]  Anees Shaikh,et al.  Are clouds ready for large distributed applications? , 2010, OPSR.

[10]  Benny Pinkas,et al.  Side Channels in Cloud Services: Deduplication in Cloud Storage , 2010, IEEE Security & Privacy.

[11]  Xiang-Yang Li,et al.  Privacy preserving cloud data access with multi-authorities , 2012, 2013 Proceedings IEEE INFOCOM.

[12]  Marc Dacier,et al.  Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.

[13]  Ahmed Serhrouchni,et al.  A Novel Traceback Approach for Direct and Reflected ICMP Attacks , 2011, 2011 Conference on Network and Information Systems Security.

[14]  S. Kumar,et al.  Smurf-based Distributed Denial of Service (DDoS) Attack Amplification in Internet , 2007, Second International Conference on Internet Monitoring and Protection (ICIMP 2007).

[15]  Nidal Nasser,et al.  An identification and prevention of theft-of-service attack on cloud computing , 2016, 2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT).

[16]  Eduardo B. Fernández,et al.  An analysis of security issues for cloud computing , 2013, Journal of Internet Services and Applications.

[17]  Salim Hariri,et al.  DNS-IDS: Securing DNS in the Cloud Era , 2015, 2015 International Conference on Cloud and Autonomic Computing.

[18]  Nesrine Kaaniche,et al.  A Secure Client Side Deduplication Scheme in Cloud Storage Environments , 2014, 2014 6th International Conference on New Technologies, Mobility and Security (NTMS).

[19]  Jin Wang,et al.  Thwarting audio steganography attacks in cloud storage systems , 2011, 2011 International Conference on Cloud and Service Computing.

[20]  Tommaso Cucinotta,et al.  Challenges in real-time virtualization and predictable cloud computing , 2014, J. Syst. Archit..

[21]  Kanika Lakhani,et al.  Implementing digital signature with RSA encryption algorithm to enhance the Data Security of cloud in Cloud Computing , 2010, 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010).

[22]  Dimosthenis Kyriazis,et al.  Challenges Emerging from Future Cloud Application Scenarios , 2015, Cloud Forward.

[23]  Gilles Grimaud,et al.  Large-Scale Coordinated attacks: Impact on the Cloud Security , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[24]  Jianfeng Ma,et al.  From high-availability to collapse: quantitative analysis of “Cloud-Droplet-Freezing” attack threats to virtual machine migration in cloud computing , 2014, Cluster Computing.

[25]  Chia-Mei Chen,et al.  State-based attack detection for cloud , 2013, 2013 International Symposium on Next-Generation Electronics.

[26]  Bin Li,et al.  Tracking Anomalous Behaviors of Name Servers by Mining DNS Traffic , 2006, ISPA Workshops.

[27]  Minhaj Ahmad Khan,et al.  A survey of security issues for cloud computing , 2016, J. Netw. Comput. Appl..

[28]  S. Malliga,et al.  Intrusion detection system- An efficient way to thwart against Dos/DDos attack in the cloud environment , 2014, 2014 International Conference on Recent Trends in Information Technology.

[29]  Ganesh Kumar,et al.  Anomaly Detection System in Cloud Environment Using Fuzzy Clustering Based ANN , 2015, Mobile Networks and Applications.

[30]  Hovav Shacham,et al.  Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.

[31]  Santosh Kumar Majhi,et al.  Threat Modelling of Virtual Machine Migration Auction , 2016 .

[32]  Sadie Creese,et al.  Insider Attacks in Cloud Computing , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[33]  Zonghua Gu,et al.  A State-of-the-Art Survey on Real-Time Issues in Embedded Systems Virtualization , 2012 .

[34]  Seung Ryoul Maeng,et al.  H-SVM: Hardware-Assisted Secure Virtual Machines under a Vulnerable Hypervisor , 2015, IEEE Transactions on Computers.

[35]  Lorenzo Martignoni,et al.  A Framework for Behavior-Based Malware Analysis in the Cloud , 2009, ICISS.

[36]  Kakali Chatterjee,et al.  Cloud security issues and challenges: A survey , 2017, J. Netw. Comput. Appl..

[37]  Vern Paxson,et al.  Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.

[38]  Ayman I. Kayssi,et al.  Security analysis and solution for thwarting cache poisoning attacks in the Domain Name System , 2012, 2012 19th International Conference on Telecommunications (ICT).

[39]  Sheetal Kalra,et al.  ECC-based anti-phishing protocol for cloud computing services , 2013, Int. J. Secur. Networks.

[40]  Yubin Xia,et al.  Defending against VM rollback attack , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012).

[41]  Mehmet Tahir Sandikkaya,et al.  Security Problems of Platform-as-a-Service (PaaS) Clouds and Practical Solutions to the Problems , 2012, 2012 IEEE 31st Symposium on Reliable Distributed Systems.

[42]  Aman Bakshi,et al.  Securing Cloud from DDOS Attacks Using Intrusion Detection System in Virtual Machine , 2010, 2010 Second International Conference on Communication Software and Networks.

[43]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[44]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[45]  Susana Sargento,et al.  Optimal virtual network migration: A step closer for seamless resource mobility , 2016, J. Netw. Comput. Appl..

[46]  Haibo Chen,et al.  Limiting cache-based side-channel in multi-tenant cloud using dynamic page coloring , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).

[47]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[48]  Zhuolin Yang,et al.  Virtualization security for cloud computing service , 2011, 2011 International Conference on Cloud and Service Computing.

[49]  Wojciech Mazurczyk,et al.  Is Cloud Computing Steganography-proof? , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.

[50]  Louay Karadsheh,et al.  Applying security policies and service level agreement to IaaS service model to enhance security and transition , 2012, Comput. Secur..

[51]  Mário M. Freire,et al.  Security issues in cloud environments: a survey , 2014, International Journal of Information Security.

[52]  Yves Deswarte,et al.  Survey of Security Problems in Cloud Computing Virtual Machines , 2012 .

[53]  Nils Gruschka,et al.  Vulnerable Cloud: SOAP Message Security Validation Revisited , 2009, 2009 IEEE International Conference on Web Services.

[54]  B. Prabadevi,et al.  Distributed Denial of service attacks and its effects on Cloud environment- a survey , 2014, The 2014 International Symposium on Networks, Computers and Communications.

[55]  Chun-Ying Huang,et al.  Using one-time passwords to prevent password phishing attacks , 2011, J. Netw. Comput. Appl..

[56]  Xin Yuan,et al.  Controlling IP Spoofing through Interdomain Packet Filters , 2008, IEEE Transactions on Dependable and Secure Computing.

[57]  Ajith Abraham,et al.  Distributed port-scan attack in cloud environment , 2013, 2013 Fifth International Conference on Computational Aspects of Social Networks.

[58]  Hui Li,et al.  Secure multi-server-aided data deduplication in cloud computing , 2015, Pervasive Mob. Comput..

[59]  Jun Li,et al.  On the state of IP spoofing defense , 2009, TOIT.

[60]  Amjad Rehman,et al.  Virtual machine security challenges: case studies , 2014, Int. J. Mach. Learn. Cybern..

[61]  Refik Molva,et al.  ClouDedup: Secure Deduplication with Encrypted Data for Cloud Storage , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[62]  Ai-Chun Pang,et al.  Migrant Attack: A Multi-resource DoS Attack on Cloud Virtual Machine Migration Schemes , 2016, 2016 11th Asia Joint Conference on Information Security (AsiaJCIS).

[63]  Jan Reineke,et al.  CacheAudit: A Tool for the Static Analysis of Cache Side Channels , 2013, TSEC.

[64]  Luis Miguel Vaquero Gonzalez,et al.  Building safe PaaS clouds: A survey on security in multitenant software platforms , 2012, Comput. Secur..

[65]  Ulf Lindqvist,et al.  eXpert-BSM: a host-based intrusion detection solution for Sun Solaris , 2001, Seventeenth Annual Computer Security Applications Conference.

[66]  Shufen Xiao,et al.  Research on Quantum Authentication Methods for the Secure Access Control Among Three Elements of Cloud Computing , 2016 .

[67]  Priya Chandran,et al.  Extended-HyperWall: Hardware support for rollback secure virtualization , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[68]  Yi-Ming Chen,et al.  Retrospective detection of malware attacks by cloud computing , 2010, 2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.

[69]  Mohamed Cheriet,et al.  Taxonomy of Distributed Denial of Service mitigation approaches for cloud computing , 2015, J. Netw. Comput. Appl..

[70]  Muttukrishnan Rajarajan,et al.  A survey on security issues and solutions at different layers of Cloud computing , 2012, The Journal of Supercomputing.

[71]  Song Guo,et al.  Can We Beat DDoS Attacks in Clouds? , 2014, IEEE Transactions on Parallel and Distributed Systems.

[72]  A. B. M. Shawkat Ali,et al.  A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing , 2012, Future Gener. Comput. Syst..

[73]  Yang Yang,et al.  SDN-Based ARP Attack Detection for Cloud Centers , 2015, 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom).

[74]  J. Doug Tygar,et al.  The battle against phishing: Dynamic Security Skins , 2005, SOUPS '05.

[75]  Samuel T. King,et al.  ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.

[76]  Haibo Chen,et al.  CloudVisor: retrofitting protection of virtual machines in multi-tenant cloud with nested virtualization , 2011, SOSP.

[77]  N. Jeyanthi,et al.  Detection of distributed denial of service attacks in cloud computing by identifying spoofed IP , 2013, Int. J. Commun. Networks Distributed Syst..

[78]  Bin Zhao,et al.  Understanding the effects of hypervisor I/O scheduling for virtual machine performance interference , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.

[79]  Peter Desnoyers,et al.  Scheduler vulnerabilities and coordinated attacks in cloud computing , 2013, J. Comput. Secur..

[80]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[81]  Anja Feldmann,et al.  Live wide-area migration of virtual machines including local persistent state , 2007, VEE '07.

[82]  Cheng Jin,et al.  Defense Against Spoofed IP Traffic Using Hop-Count Filtering , 2007, IEEE/ACM Transactions on Networking.

[83]  Miren Karamta,et al.  Comparison of Virtual Machine Scheduling Algorithms in Cloud Computing , 2013 .

[84]  V. N. Venkatakrishnan,et al.  CANDID: Dynamic candidate evaluations for automatic prevention of SQL injection attacks , 2010, TSEC.

[85]  Farrukh Shahzad,et al.  State-of-the-art Survey on Cloud Computing Security Challenges, Approaches and Solutions , 2014, EUSPN/ICTH.

[86]  Ming Xu,et al.  Towards security-aware virtual network embedding , 2015, Comput. Networks.

[87]  Tang Hongwei,et al.  VirtAV: An agentless antivirus system based on in-memory signature scanning for virtual machine , 2016 .

[88]  Jianfeng Ma,et al.  A Secure Document Self-Destruction Scheme with Identity Based Encryption , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.

[89]  David Hutchison,et al.  Malware Detection in Cloud Computing Infrastructures , 2016, IEEE Transactions on Dependable and Secure Computing.

[90]  JongWon Kim,et al.  Suspicious traffic sampling for intrusion detection in software-defined networks , 2016, Comput. Networks.

[91]  Kailas Devadkar,et al.  Understanding DDoS Attack & its Effect in Cloud Environment , 2015 .

[92]  Wei Wang,et al.  A cache-splitting scheme for DNS recursive server , 2012, 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems.

[93]  Koen De Bosschere,et al.  Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[94]  Balachandra Reddy Kandukuri,et al.  Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.

[95]  F. Richard Yu,et al.  Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges , 2016, IEEE Communications Surveys & Tutorials.

[96]  Fenlin Liu,et al.  SDN-Based Double Hopping Communication against Sniffer Attack , 2016 .

[97]  William R. Claycomb,et al.  Insider Threats to Cloud Computing: Directions for New Research Challenges , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference.

[98]  Chunwen Li,et al.  Research and implementation of a role-based trustworthiness mechanism for IaaS , 2012, 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems.

[99]  John Grundy,et al.  Improving Tenants' Trust in SaaS Applications Using Dynamic Security Monitors , 2015, 2015 20th International Conference on Engineering of Complex Computer Systems (ICECCS).

[100]  Shuai Liu,et al.  A Countermeasure to SQL Injection Attack for Cloud Environment , 2016, Wireless Personal Communications.