Integrating Grid with Intrusion Detection
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 1
SubVirt: Implementing malware with virtual machines
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Ciphertext-Policy Attribute-Based Encryption
SP '07 Proceedings of the 2007 IEEE Symposium on Security and Privacy
A System for Search, Access Restriction, and Agents in the Clouds
SAINT '09 Proceedings of the 2009 Ninth Annual International Symposium on Applications and the Internet
A client-based privacy manager for cloud computing
Proceedings of the Fourth International ICST Conference on COMmunication System softWAre and middlewaRE
DSP RE-Encryption: A Flexible Mechanism for Access Control Enforcement Management in DaaS
CLOUD '09 Proceedings of the 2009 IEEE International Conference on Cloud Computing
On Technical Security Issues in Cloud Computing
CLOUD '09 Proceedings of the 2009 IEEE International Conference on Cloud Computing
SCC '09 Proceedings of the 2009 IEEE International Conference on Services Computing
Secure and efficient access to outsourced data
Proceedings of the 2009 ACM workshop on Cloud computing security
Managing security of virtual machine images in a cloud environment
Proceedings of the 2009 ACM workshop on Cloud computing security
Towards secure dataflow processing in open distributed systems
Proceedings of the 2009 ACM workshop on Scalable trusted computing
A Taxonomy and Survey of Cloud Computing Systems
NCM '09 Proceedings of the 2009 Fifth International Joint Conference on INC, IMS and IDC
Towards an Approach of Semantic Access Control for Cloud Computing
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Crossroads - Plugging Into the Cloud
Why cloud computing will never be free
Communications of the ACM
Are clouds ready for large distributed applications?
ACM SIGOPS Operating Systems Review
Transparent security for cloud
Proceedings of the 2010 ACM Symposium on Applied Computing
Securing Cloud from DDOS Attacks Using Intrusion Detection System in Virtual Machine
ICCSN '10 Proceedings of the 2010 Second International Conference on Communication Software and Networks
Data protection models for service provisioning in the cloud
Proceedings of the 15th ACM symposium on Access control models and technologies
Security and Cloud Computing: InterCloud Identity Management Infrastructure
WETICE '10 Proceedings of the 2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises
Review: A survey on security issues in service delivery models of cloud computing
Journal of Network and Computer Applications
A Cooperative Intrusion Detection System Framework for Cloud Computing Networks
ICPPW '10 Proceedings of the 2010 39th International Conference on Parallel Processing Workshops
Permission Management System: Permission as a Service in Cloud Computing
COMPSACW '10 Proceedings of the 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops
Protection of Identity Information in Cloud Computing without Trusted Third Party
SRDS '10 Proceedings of the 2010 29th IEEE Symposium on Reliable Distributed Systems
DKSM: Subverting Virtual Machine Introspection for Fun and Profit
SRDS '10 Proceedings of the 2010 29th IEEE Symposium on Reliable Distributed Systems
All your clouds are belong to us: security analysis of cloud management interfaces
Proceedings of the 3rd ACM workshop on Cloud computing security workshop
Proceedings of the 18th ACM conference on Computer and communications security
Enabling Data Hiding for Resource Sharing in Cloud Computing Environments Based on DNA Sequences
SERVICES '11 Proceedings of the 2011 IEEE World Congress on Services
Monitoring Insiders Activities in Cloud Computing Using Rule Based Learning
TRUSTCOM '11 Proceedings of the 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
SP 800-145. The NIST Definition of Cloud Computing
SP 800-145. The NIST Definition of Cloud Computing
Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud
CLOUD '12 Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing
CloudProtect: Managing Data Privacy in Cloud Applications
CLOUD '12 Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing
Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud
SPW '12 Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops
Review: A survey of intrusion detection techniques in Cloud
Journal of Network and Computer Applications
Robust and flexible tunnel management for secure private cloud
ACM SIGAPP Applied Computing Review
Contract RBAC in cloud computing
The Journal of Supercomputing
Hi-index | 0.00 |
Cloud computing offers scalable on-demand services to consumers with greater flexibility and lesser infrastructure investment. Since Cloud services are delivered using classical network protocols and formats over the Internet, implicit vulnerabilities existing in these protocols as well as threats introduced by newer architectures raise many security and privacy concerns. In this paper, we survey the factors affecting Cloud computing adoption, vulnerabilities and attacks, and identify relevant solution directives to strengthen security and privacy in the Cloud environment.