Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment

BB Gupta, OP Badve - Neural Computing and Applications, 2017 - Springer
As Cloud computing is reforming the infrastructure of IT industries, it has become one of the
critical security concerns of the defensive mechanisms applied to secure Cloud …

[PDF][PDF] Cloud computing: security issues and research challenges

RP Padhy, MR Patra, SC Satapathy - International Journal of …, 2011 - academia.edu
Cloud computing is an architecture for providing computing service via the internet on
demand and pay per use access to a pool of shared resources namely networks, storage …

[PDF][PDF] 云计算安全: 架构, 机制与模型评价

林闯, 苏文博, 孟坤, 刘渠, 刘卫东 - 2013 - cjc.ict.ac.cn
摘要随着云计算服务的广泛使用, 租户对云计算的安全性提出了越来越高的要求,
云计算环境的动态性, 随机性, 复杂性和开放性使得原有安全方案难以适用, 这也阻碍了云计算的 …

Fog computing for the internet of things: Security and privacy issues

A Alrawais, A Alhothaily, C Hu… - IEEE Internet …, 2017 - ieeexplore.ieee.org
The inherent characteristics of Internet of Things (IoT) devices, such as limited storage and
computational power, require a new platform to efficiently process data. The concept of fog …

APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT

Z Guan, Y Zhang, L Wu, J Wu, J Li, Y Ma… - Journal of Network and …, 2019 - Elsevier
Fog computing is a modern computing platform that connects the cloud with the edge smart
devices located at the edge of the network. The fog computing platform has several …

[图书][B] Distributed and cloud computing: from parallel processing to the internet of things

K Hwang, J Dongarra, GC Fox - 2013 - books.google.com
Distributed and Cloud Computing: From Parallel Processing to the Internet of Things offers
complete coverage of modern distributed computing technology including clusters, the grid …

Trust mechanisms for cloud computing

J Huang, DM Nicol - Journal of Cloud Computing: Advances, Systems and …, 2013 - Springer
Trust is a critical factor in cloud computing; in present practice it depends largely on
perception of reputation, and self assessment by providers of cloud services. We begin this …

Trusted cloud computing with secure resources and data coloring

K Hwang, D Li - IEEE Internet Computing, 2010 - ieeexplore.ieee.org
Trust and security have prevented businesses from fully accepting cloud platforms. To
protect clouds, providers must first secure virtualized data center resources, uphold user …

System and method for determining and using local reputations of users and hosts to protect information in a network environment

GH Cooper, DF Diehl, MW Green, R Ma - US Patent 8,931,043, 2015 - Google Patents
5.255. 642 A 8, 1993 Wobber et al. 2002/0051575 A1 5/2002 Myers et al. 5,239.466 A
8/1993 Morgan et al. 2002fOO59454 A1 5, 2002 Barrett et al. 5,247,661 A 9/1993 Hager et …

COMITMENT: A fog computing trust management approach

M Al-Khafajiy, T Baker, M Asim, Z Guo, R Ranjan… - Journal of Parallel and …, 2020 - Elsevier
As an extension of cloud computing, fog computing is considered to be relatively more
secure than cloud computing due to data being transiently maintained and analyzed on …