Cloud storage security assessment through equilibrium analysis

Y Wu, Y Lyu, Y Shi - Tsinghua Science and Technology, 2019 - ieeexplore.ieee.org
With ever greater amounts of data stored in cloud servers, data security and privacy issues
have become increasingly important. Public cloud storage providers are semi-trustworthy …

A hidden markov model combined with markov games for intrusion detection in cloud

P Narwal, D Kumar, SN Singh - Journal of Cases on Information …, 2019 - igi-global.com
Cloud computing has evolved as a new paradigm for management of an infrastructure and
gained ample consideration in both industrial and academic area of research. A hidden …

Game-theory based detection and prevention of DoS attacks on networking node in open stack private cloud

P Narwal, SN Singh, D Kumar - 2017 International Conference …, 2017 - ieeexplore.ieee.org
Security at virtualization level has always been a major issue in cloud computing
environment. A large number of virtual machines that are hosted on a single server by …

Stochastic intrusion detection game-based arrangement using controlled markov chain for prevention of dos and ddos attacks in cloud

P Narwal, D Kumar, SN Singh… - Journal of Information …, 2021 - igi-global.com
DoS (denial of service) assault is the most prevalent assault these days. It imposes a major
risk to cybersecurity. At the point when this assault is propelled by numerous conveyed …

Predicting strategic behavior using game theory for secure virtual machine allocation in cloud

P Narwal, SN Singh, D Kumar - Networking Communication and Data …, 2018 - Springer
In cloud computing, security is a very crucial issue to be taken care of. So, game theory can
be used as a strategic tool in decision making among users to protect their virtual machines …

[PDF][PDF] A LOAD BALANCING ALGORITHM USING PARTICLE SWARM OPTIMIZATION FOR THE APPLICATIONS OF CLOUD COMPUTING

M Nijanthan, A Praveenkumar - ijprems.com
ABSTRACT Virtual Machines (VMs) in Cloud systems are scheduled to hosts based on their
instant resource consumption (eg, hosts with the greatest accessible RAM), rather than their …

Distributed Trust Evaluation protocol with Privacy Protection for Inter-cloud

M Rajkumar, R Aransha, M Deepa… - Journal of Physics …, 2021 - iopscience.iop.org
Inter-cloud attempts to energize resource splitting between fogs. To help cloud, a trust
appraisal structure in the middle of fogs and customers mandatory. For trust growth …

[PDF][PDF] A HYBRID APPROACH FOR REDUCING CARBON EMISSION IN INTERCLOUD ENVIRONMENT

KV Iyer, S Sivaraja, A Subramaniyan, RK Devi - ijetcse.com
In Cloud systems, Virtual Machines (VMs) are scheduled to hosts according to their instant
resource usage (eg to hosts with most available RAM) without considering their overall and …

A survey of game theoretic solutions for cloud computing security issues

BO Sane, CSM Babou, D Fall, I Niang - Innovations and Interdisciplinary …, 2019 - Springer
Cloud computing has become quintessential to information technology as it represents the
foundation of all the emerging paradigms. Cloud computing uses virtualization to maximize …