Leveraging a cloud-native architecture to enable semantic interconnectedness of data for cyber threat intelligence

M Ammi, O Adedugbe, FM Alharby, E Benkhelifa - Cluster Computing, 2022 - Springer
Cloud technologies have several merits including the elimination of cost incurred when
traditional technologies are adopted. Despite the benefits, the cloud is still facing security …

[PDF][PDF] The Impact of Cloud Computing on Cybersecurity Threat Hunting and Threat Intelligence Sharing: Data Security, Data Sharing, and Collaboration

N Mohammad - International Journal of Computer Applications …, 2022 - researchgate.net
Cloud computing has revolutionized the landscape of cybersecurity threat hunting and threat
intelligence sharing, fostering a paradigm shift in data security practices. This article …

Analytics‐as‐a‐service in a multi‐cloud environment through semantically‐enabled hierarchical data processing

PP Jayaraman, C Perera… - Software: Practice …, 2017 - Wiley Online Library
A large number of cloud middleware platforms and tools are deployed to support a variety of
internet‐of‐things (IoT) data analytics tasks. It is a common practice that such cloud …

Paasword: A holistic data privacy and security by design framework for cloud services

Y Verginadis, A Michalas, P Gouvas, G Schiefer… - Journal of Grid …, 2017 - Springer
Enterprises increasingly recognize the compelling economic and operational benefits from
virtualizing and pooling IT resources in the cloud. Nevertheless, the significant and valuable …

Security intelligence for cloud management infrastructures

S Berger, S Garion, Y Moatti, D Naor… - IBM Journal of …, 2016 - ieeexplore.ieee.org
In this paper, we address the problem of protecting cloud infrastructures and customer
workloads via smart auditing and logging, satisfying regulatory and compliance …

Research on Intelligent Cybersecurity Protection System in Cloud Computing Environment

Y Wang - Innovation in Science and Technology, 2024 - paradigmpress.org
In the digital era, cloud computing has transformed data processing, storage, and analysis
with its scalability and flexibility. However, it also introduces new security challenges, such …

Towards law-aware semantic cloud policies with exceptions for data integration and protection

YJ Hu, WN Wu, DR Cheng - … of the 2nd International Conference on Web …, 2012 - dl.acm.org
The main issues related to cloud computing implementation are security, privacy, and law-
awareness. We consider data protection with law-awareness as the major concern for cloud …

Enhancing cloud security—proactive threat monitoring and detection using a siem-based approach

E Tuyishime, TC Balan, PA Cotfas, DT Cotfas… - Applied Sciences, 2023 - mdpi.com
With the escalating frequency of cybersecurity threats in public cloud computing
environments, there is a pressing need for robust security measures to safeguard sensitive …

Déjàvu: bringing black-box security analytics to cloud

S Nadgowda, C Isci, M Bal - Proceedings of the 19th International …, 2018 - dl.acm.org
Emerging security solutions for cloud commonly operate in two phases, data collection and
analytics. Data collection phase provides visibility into cloud resources (images, containers …

AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES

TC Kanth - 2024 - philpapers.org
Cloud computing has become an essential component of enterprises and organizations
globally in the current era of digital technology. The cloud has a multitude of advantages …