Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
I-MPaFS: enhancing EDoS attack detection in cloud computing through a data-driven approach
Journal of Cloud Computing: Advances, Systems and Applications (JOCCASA), Volume 13, Issue 1https://doi.org/10.1186/s13677-024-00699-5AbstractCloud computing offers cost-effective IT solutions but is susceptible to security threats, particularly the Economic Denial of Sustainability (EDoS) attack. EDoS exploits cloud elasticity and the pay-per-use billing model, forcing users to incur ...
- research-articleOctober 2024
Enhancing cloud security with intelligent load balancing and malicious request classification
AbstractThe cloud computing landscape presents a critical intersection of security and performance. To address this, an intelligent load-balancing system is proposed coupled with a malicious request classification approach. This research tackles the ...
- research-articleOctober 2024
Enhancing healthcare in the digital era: A secure e-health system for heart disease prediction and cloud security
Expert Systems with Applications: An International Journal (EXWA), Volume 255, Issue PAhttps://doi.org/10.1016/j.eswa.2024.124479AbstractIn the modern world, due to changing lifestyles, more people are infected by deadly diseases, especially heart disorders. An early prognosis is the only possible way of increasing survival rate. One of the key elements of this context is the ...
- research-articleOctober 2024
An efficient position-sensitive fuzzy keyword search scheme for encrypted data on hybrid cloud
AbstractWith the growing demand for effective and privacy-preserving data retrieval, searchable encryption has emerged as a promising solution for searching encrypted data stored on remote servers. Compared with exact keyword search, fuzzy keyword search ...
- research-articleOctober 2024
Morpheus: An efficient timing-based attestation framework for safeguarding hypervisor integrity with dynamic trust
AbstractHypervisor, the core software in cloud computing, is susceptible to malicious intrusions, potentially jeopardizing overall platform security. Physical hosts within the cloud computing environment constantly face persistent attacks, and not all ...
-
- research-articleSeptember 2024
Quick service during DDoS attacks in the container-based cloud environment
Journal of Network and Computer Applications (JNCA), Volume 229, Issue Chttps://doi.org/10.1016/j.jnca.2024.103946AbstractDistributed Denial of Service (DDoS) attacks are one of the biggest internet security risks. As DDoS attacks directly target the availability of the victim’s services, defending against them is one of the most challenging tasks for the victim ...
Graphical abstractDisplay Omitted
Highlights- Mitigates DDoS using bandwidth limits, request separation, and containerization.
- Reduces average response time for benign users during DDoS attacks.
- Reduces failed requests for benign users during massive DDoS attacks.
- ...
- research-articleJuly 2024
Privacy-preserving Boolean range query with verifiability and forward security over spatio-textual data
Information Sciences: an International Journal (ISCI), Volume 677, Issue Chttps://doi.org/10.1016/j.ins.2024.120929AbstractBoolean range query, as one typical spatial keyword query, has received more and more attention and been widely deployed in many applications. To release the storage and computation burden of client, the spatio-textual data is usually outsourced ...
- research-articleJune 2024
An Intelligent Lightweight Signing Signature and Secured Jellyfish Data Aggregation (LS3JDA) Based Privacy Preserving Model in Cloud
New Generation Computing (NEWG), Volume 42, Issue 5Pages 911–946https://doi.org/10.1007/s00354-024-00263-4AbstractDeveloping a secured and accurate disease diagnosis framework in the healthcare cloud systems are still remains one of the crucial problems in recent times. Due to the rapid growth of information and technology, it is highly essential to protect ...
- research-articleJune 2024
Thriving in the era of hybrid work: Raising cybersecurity awareness using serious games in industry trainings
Journal of Systems and Software (JSSO), Volume 210, Issue Chttps://doi.org/10.1016/j.jss.2023.111946AbstractThe important missions of modern software engineering education are to prepare software engineers to work in a hybrid mode and to address the need to enable them to write secure code and deliver secure products and services to the customer. ...
Highlights- The case study found practitioners in the industry miss cyber-security awareness.
- One way of raising cyber-security awareness is through training.
- We designed two serious games to be used in trainings in hybrid work environment.
- research-articleMarch 2024
Dynamic authentication for intelligent sensor clouds in the Internet of Things
- Hussain Al-Aqrabi,
- Ahmed M. Manasrah,
- Richard Hill,
- Mohammed Q. Shatnawi,
- Mohammad Sh Daoud,
- Hoda Alkhzaimi
International Journal of Information Security (IJOIS), Volume 23, Issue 3Pages 2003–2021https://doi.org/10.1007/s10207-024-00829-9AbstractSensor clouds are formed by IP-enabled wireless sensors and Internet of Things devices that are used for sensing and actuation in commercial and industrial applications. Data collected by the sensors are consolidated by distributed cloud data ...
- research-articleFebruary 2024
Machine learning-based intelligent security framework for secure cloud key management
Cluster Computing (KLU-CLUS), Volume 27, Issue 5Pages 5953–5979https://doi.org/10.1007/s10586-024-04288-8AbstractEnsuring the confidentiality, integrity, and availability of sensitive data in cloud environments relies heavily on the robust management of cryptographic keys. With the expansion of cloud usage and the increase in data volumes, ensuring the ...
- research-articleApril 2024
Analyzing transparency and malicious insiders prevention for cloud computing environment
AbstractThe emerging cloud technology and its integration with cloud services from an enterprise standpoint have provided a gateway for Cloud Service Providers (CSPs) to garner consumers and their data. Due to the growing increase of Cloud Service Users (...
- research-articleApril 2024
Automated machine learning for deep learning based malware detection
AbstractDeep learning (DL) has proven to be effective in detecting sophisticated malware that is constantly evolving. Even though deep learning has alleviated the feature engineering problem, finding the most optimal DL model's architecture and set of ...
- research-articleJanuary 2024
CloudSec: A Lightweight and Agile Approach to Secure Medical Image Transmission in the Cloud Computing Environment
AbstractIn this paper, we have proposed a novel method CloudSec. It is a lightweight and agile image encryption method that combines a hashing function, multi-wing chaotic mapping system, and genetics algorithm. The proposed method offers significant ...
- research-articleJanuary 2024
Cloud data access governance and data security using distributed infrastructure with hybrid machine learning architectures
Wireless Networks (WIRE), Volume 30, Issue 4Pages 2099–2114https://doi.org/10.1007/s11276-024-03658-9AbstractTo address the concerns about security and privacy in cloud-based data storage, this study proposes a unique approach to secure cloud-based data governance using hybrid machine learning architectures. With the increasing reliance on cloud ...
- research-articleJanuary 2024
C3S-TTP: A Trusted Third Party for Configuration Security in TOSCA-Based Cloud Services
Journal of Network and Systems Management (JNSM), Volume 32, Issue 1https://doi.org/10.1007/s10922-023-09792-7AbstractThe large-scale deployment of cloud composite services distributed over heterogeneous environments poses new challenges in terms of security management. In particular, the migration of their resources is facilitated by recent advances in the area ...
- research-articleMarch 2024
Secure transmission of medical images in multi-cloud e-healthcare applications using data hiding scheme
- K. Jyothsna Devi,
- Priyanka Singh,
- Jatindra Kumar Dash,
- Hiren Kumar Thakkar,
- Sudeep Tanwar,
- Abdulatif Alabdulatif
Journal of Information Security and Applications (JISA), Volume 79, Issue Chttps://doi.org/10.1016/j.jisa.2023.103655AbstractIn recent years, medical image transmission using a multi-cloud system has played a significant role in e-Healthcare infrastructure. It allows medical practitioners to easily store, retrieve, and share patients’ medical information across ...
- research-articleJanuary 2024
An Effective Data Security Mechanism for Secured Data Communications Using Hybrid Cryptographic Technique and Quantum Key Distribution
Wireless Personal Communications: An International Journal (WPCO), Volume 133, Issue 3Pages 1373–1396https://doi.org/10.1007/s11277-023-10813-6AbstractOne of the most flamboyant technological novelties of today's world is cloud computing, which has been fuelled by the increase in the number of smart devices across the internet. With the continuous advancement in the technical field, cloud ...
- research-articleNovember 2023
A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis
Cluster Computing (KLU-CLUS), Volume 27, Issue 3Pages 3753–3769https://doi.org/10.1007/s10586-023-04162-zAbstractCloud Computing offers on-demand infrastructure, platform and software services over the Internet on a pay-as-you-use model. Many e-commerce businesses and social networking sites are moving towards the cloud. Security breaches have also started ...
- research-articleOctober 2023
Intrusion Detection and Prevention in OpenStack: A Case Study on Enhancing Security and Threat Detection
AbstractInternet usage has experienced exponential growth over the past two decades. Nowadays, numerous human activities heavily rely on the Internet and information technology. The Internet is utilized for various purposes, including communication, ...