Trust Issues that Create Threats for Cyber Attacks in Cloud Computing
The research contribution in this paper is twofold. First, an investigative survey on cloud computing is conducted with the main focus on gaps that is slowing down cloud adoption as well as reviewing the threat remediation challenges. Next, some thoughts are constructed on novel approaches to addres...
Saved in:
Published in | 2011 IEEE 17th International Conference on Parallel and Distributed Systems pp. 900 - 905 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.12.2011
|
Subjects | |
Online Access | Get full text |
ISBN | 1457718758 9781457718755 |
ISSN | 1521-9097 |
DOI | 10.1109/ICPADS.2011.156 |
Cover
Abstract | The research contribution in this paper is twofold. First, an investigative survey on cloud computing is conducted with the main focus on gaps that is slowing down cloud adoption as well as reviewing the threat remediation challenges. Next, some thoughts are constructed on novel approaches to address some of the widely discussed attack types using machine learning techniques. Such thoughts captured through a series of experiments are expected to give researchers, cloud providers and their customers' additional insight and tools to proactively protect themselves from known or perhaps even unknown security issues that follow the same patterns. |
---|---|
AbstractList | The research contribution in this paper is twofold. First, an investigative survey on cloud computing is conducted with the main focus on gaps that is slowing down cloud adoption as well as reviewing the threat remediation challenges. Next, some thoughts are constructed on novel approaches to address some of the widely discussed attack types using machine learning techniques. Such thoughts captured through a series of experiments are expected to give researchers, cloud providers and their customers' additional insight and tools to proactively protect themselves from known or perhaps even unknown security issues that follow the same patterns. |
Author | Ali, A. B. M. S. Khorshed, M. T. Wasimi, S. A. |
Author_xml | – sequence: 1 givenname: M. T. surname: Khorshed fullname: Khorshed, M. T. email: t.khorshed@cqu.edu.au organization: Sch. of Inf. & Commun. Technol., Central Queensland Univ., Rockhampton, QLD, Australia – sequence: 2 givenname: A. B. M. S. surname: Ali fullname: Ali, A. B. M. S. email: s.ali@cqu.edu.au organization: Sch. of Inf. & Commun. Technol., Central Queensland Univ., Rockhampton, QLD, Australia – sequence: 3 givenname: S. A. surname: Wasimi fullname: Wasimi, S. A. email: s.wasimi@cqu.edu.au organization: Sch. of Inf. & Commun. Technol., Central Queensland Univ., Rockhampton, QLD, Australia |
BookMark | eNotjk9LwzAchiNOcJ07e_CSL9CaX_7nOOKmhYGC9TzSLnHVrR1Neti3t6KX93nhhYc3Q7Ou7zxC90AKAGIeS_u2enovKAEoQMgrtDRKEyWN4GLKa5TBVBRoJfQMzUFQyA0x6hZlMX4RQgkTZI7W1TDGhMsYRx9xOriE7eBd8rg6_DLi0A_YXmo_4FVKrvmOuO2wPfbjHtv-dB5T233eoZvgjtEv_7lAH5t1ZV_y7etzaVfbvAUlUi6CMHVodA1ES244g4YbBRSCkZJMd8OeOVl7SoNzutEKgIPnIUjFpq1mC_Tw522997vz0J7ccNnJycCUYj8hhU4P |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICPADS.2011.156 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 9780769545769 0769545769 |
EndPage | 905 |
ExternalDocumentID | 6121377 |
Genre | orig-research |
GroupedDBID | 23M 29O 6IE 6IF 6IH 6IK 6IL 6IM 6IN AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI OCL RIE RIL RNS |
ID | FETCH-LOGICAL-i175t-5f59bfc8b108649431c497121f9660457fd3a6be22faa8c871141e4ff6737fdb3 |
IEDL.DBID | RIE |
ISBN | 1457718758 9781457718755 |
ISSN | 1521-9097 |
IngestDate | Wed Aug 27 03:46:16 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i175t-5f59bfc8b108649431c497121f9660457fd3a6be22faa8c871141e4ff6737fdb3 |
PageCount | 6 |
ParticipantIDs | ieee_primary_6121377 |
PublicationCentury | 2000 |
PublicationDate | 2011-Dec. |
PublicationDateYYYYMMDD | 2011-12-01 |
PublicationDate_xml | – month: 12 year: 2011 text: 2011-Dec. |
PublicationDecade | 2010 |
PublicationTitle | 2011 IEEE 17th International Conference on Parallel and Distributed Systems |
PublicationTitleAbbrev | icpads |
PublicationYear | 2011 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0020350 ssib026767514 ssj0000669466 |
Score | 1.9276092 |
Snippet | The research contribution in this paper is twofold. First, an investigative survey on cloud computing is conducted with the main focus on gaps that is slowing... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 900 |
SubjectTerms | Accuracy Cloud computing Kernel Machine learning Polynomials Security Support vector machines threats trust |
Title | Trust Issues that Create Threats for Cyber Attacks in Cloud Computing |
URI | https://ieeexplore.ieee.org/document/6121377 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3LT8IwHG6AEydUML7Tg0cHdGvX9kgmRE0wJELCjayvQDRgtDvoX2_bbWiMB097JGvaX7r26-_xfQBcp0OuEqWHEcPGu25YGgmFVERjyWKOkTSBiWn6mN4t8MOSLBvgZl8Lo7UOyWe6729DLF_tZOFdZQPPdpVQ2gRNSnlZq1XPnTgQj1URwXIVTj11-v7w5SNogTs1pCR4OsA2woS6pdkh5pr7qXomFQcQGvLBfTYb3T6VXJ_Iy1z_EGEJe9CkA6Z178vUk-d-YUVffv4idvzv8A5A77vaD872-9ghaOjtEejUcg-w-vu7YDz39Rmw1OuDdp1bmHnIqeF87a_v0AFgmH0I99HIWl-8DzdbmL3sCgXL5lz7PbCYjOfZXVSpMEQbBy1sRAzhwkgmvCYT5g5wSMyp66rxxJ7OZEYleSp0HJs8Z9IdwBBGGhvjFXCMEskxaG13W30CYI4SKXGSkNyBzpwpLqlG1CEWxglh2pyCrrfK6rUk2lhVBjn7-_U5aAcHb8gtuQAt-1boS4cQrLgKU-MLPqqwYQ |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3LT8IwHG4QD3JCBePbHjw6oFu7dUcyIaBASBwJN7L1EYhmGO0O-tfbdhsa48HTHsma9peu_fp7fB8At34v5B4XPYdiaVw31HdSjrgTuIy6IUZMWiam6cwfLfDDkixr4G5XCyOEsMlnomNubSyfb1luXGVdw3blBcEe2Cf6VBEU1VrV7HEt9VgZEyzWYd-Qp--OXyaGZtlTbVKCIQRsIEwCvThrzFyxP5XPpGQBQr2wO47m_fungu0TGaHrHzIsdhcaNsG06n-RfPLcyVXaYZ-_qB3_O8BD0P6u94Pz3U52BGoiOwbNSvABlv9_CwxiU6EBC8U-qNaJgpEBnQLGa3N9hxoCw-gj1R_1lTLl-3CTwehlm3NYNKfbb4PFcBBHI6fUYXA2Glwoh0gSppLR1Kgy4VBDDobDQHdVGmpPbTLJvcRPhevKJKFMH8EQRgJLaTRwJE-9E1DPtpk4BTBBHmPY80iiYWdCecgCgQKNWWhICBXyDLSMVVavBdXGqjTI-d-vb8DBKJ5OVpPx7PECNKy712aaXIK6esvFlcYLKr220-QLvjCzsg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2011+IEEE+17th+International+Conference+on+Parallel+and+Distributed+Systems&rft.atitle=Trust+Issues+that+Create+Threats+for+Cyber+Attacks+in+Cloud+Computing&rft.au=Khorshed%2C+M.+T.&rft.au=Ali%2C+A.+B.+M.+S.&rft.au=Wasimi%2C+S.+A.&rft.date=2011-12-01&rft.pub=IEEE&rft.isbn=9781457718755&rft.issn=1521-9097&rft.spage=900&rft.epage=905&rft_id=info:doi/10.1109%2FICPADS.2011.156&rft.externalDocID=6121377 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1521-9097&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1521-9097&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1521-9097&client=summon |