Trust Issues that Create Threats for Cyber Attacks in Cloud Computing

The research contribution in this paper is twofold. First, an investigative survey on cloud computing is conducted with the main focus on gaps that is slowing down cloud adoption as well as reviewing the threat remediation challenges. Next, some thoughts are constructed on novel approaches to addres...

Full description

Saved in:
Bibliographic Details
Published in2011 IEEE 17th International Conference on Parallel and Distributed Systems pp. 900 - 905
Main Authors Khorshed, M. T., Ali, A. B. M. S., Wasimi, S. A.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.12.2011
Subjects
Online AccessGet full text
ISBN1457718758
9781457718755
ISSN1521-9097
DOI10.1109/ICPADS.2011.156

Cover

Abstract The research contribution in this paper is twofold. First, an investigative survey on cloud computing is conducted with the main focus on gaps that is slowing down cloud adoption as well as reviewing the threat remediation challenges. Next, some thoughts are constructed on novel approaches to address some of the widely discussed attack types using machine learning techniques. Such thoughts captured through a series of experiments are expected to give researchers, cloud providers and their customers' additional insight and tools to proactively protect themselves from known or perhaps even unknown security issues that follow the same patterns.
AbstractList The research contribution in this paper is twofold. First, an investigative survey on cloud computing is conducted with the main focus on gaps that is slowing down cloud adoption as well as reviewing the threat remediation challenges. Next, some thoughts are constructed on novel approaches to address some of the widely discussed attack types using machine learning techniques. Such thoughts captured through a series of experiments are expected to give researchers, cloud providers and their customers' additional insight and tools to proactively protect themselves from known or perhaps even unknown security issues that follow the same patterns.
Author Ali, A. B. M. S.
Khorshed, M. T.
Wasimi, S. A.
Author_xml – sequence: 1
  givenname: M. T.
  surname: Khorshed
  fullname: Khorshed, M. T.
  email: t.khorshed@cqu.edu.au
  organization: Sch. of Inf. & Commun. Technol., Central Queensland Univ., Rockhampton, QLD, Australia
– sequence: 2
  givenname: A. B. M. S.
  surname: Ali
  fullname: Ali, A. B. M. S.
  email: s.ali@cqu.edu.au
  organization: Sch. of Inf. & Commun. Technol., Central Queensland Univ., Rockhampton, QLD, Australia
– sequence: 3
  givenname: S. A.
  surname: Wasimi
  fullname: Wasimi, S. A.
  email: s.wasimi@cqu.edu.au
  organization: Sch. of Inf. & Commun. Technol., Central Queensland Univ., Rockhampton, QLD, Australia
BookMark eNotjk9LwzAchiNOcJ07e_CSL9CaX_7nOOKmhYGC9TzSLnHVrR1Neti3t6KX93nhhYc3Q7Ou7zxC90AKAGIeS_u2enovKAEoQMgrtDRKEyWN4GLKa5TBVBRoJfQMzUFQyA0x6hZlMX4RQgkTZI7W1TDGhMsYRx9xOriE7eBd8rg6_DLi0A_YXmo_4FVKrvmOuO2wPfbjHtv-dB5T233eoZvgjtEv_7lAH5t1ZV_y7etzaVfbvAUlUi6CMHVodA1ES244g4YbBRSCkZJMd8OeOVl7SoNzutEKgIPnIUjFpq1mC_Tw522997vz0J7ccNnJycCUYj8hhU4P
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICPADS.2011.156
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9780769545769
0769545769
EndPage 905
ExternalDocumentID 6121377
Genre orig-research
GroupedDBID 23M
29O
6IE
6IF
6IH
6IK
6IL
6IM
6IN
AAJGR
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
OCL
RIE
RIL
RNS
ID FETCH-LOGICAL-i175t-5f59bfc8b108649431c497121f9660457fd3a6be22faa8c871141e4ff6737fdb3
IEDL.DBID RIE
ISBN 1457718758
9781457718755
ISSN 1521-9097
IngestDate Wed Aug 27 03:46:16 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-5f59bfc8b108649431c497121f9660457fd3a6be22faa8c871141e4ff6737fdb3
PageCount 6
ParticipantIDs ieee_primary_6121377
PublicationCentury 2000
PublicationDate 2011-Dec.
PublicationDateYYYYMMDD 2011-12-01
PublicationDate_xml – month: 12
  year: 2011
  text: 2011-Dec.
PublicationDecade 2010
PublicationTitle 2011 IEEE 17th International Conference on Parallel and Distributed Systems
PublicationTitleAbbrev icpads
PublicationYear 2011
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0020350
ssib026767514
ssj0000669466
Score 1.9276092
Snippet The research contribution in this paper is twofold. First, an investigative survey on cloud computing is conducted with the main focus on gaps that is slowing...
SourceID ieee
SourceType Publisher
StartPage 900
SubjectTerms Accuracy
Cloud computing
Kernel
Machine learning
Polynomials
Security
Support vector machines
threats
trust
Title Trust Issues that Create Threats for Cyber Attacks in Cloud Computing
URI https://ieeexplore.ieee.org/document/6121377
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3LT8IwHG6AEydUML7Tg0cHdGvX9kgmRE0wJELCjayvQDRgtDvoX2_bbWiMB097JGvaX7r26-_xfQBcp0OuEqWHEcPGu25YGgmFVERjyWKOkTSBiWn6mN4t8MOSLBvgZl8Lo7UOyWe6729DLF_tZOFdZQPPdpVQ2gRNSnlZq1XPnTgQj1URwXIVTj11-v7w5SNogTs1pCR4OsA2woS6pdkh5pr7qXomFQcQGvLBfTYb3T6VXJ_Iy1z_EGEJe9CkA6Z178vUk-d-YUVffv4idvzv8A5A77vaD872-9ghaOjtEejUcg-w-vu7YDz39Rmw1OuDdp1bmHnIqeF87a_v0AFgmH0I99HIWl-8DzdbmL3sCgXL5lz7PbCYjOfZXVSpMEQbBy1sRAzhwkgmvCYT5g5wSMyp66rxxJ7OZEYleSp0HJs8Z9IdwBBGGhvjFXCMEskxaG13W30CYI4SKXGSkNyBzpwpLqlG1CEWxglh2pyCrrfK6rUk2lhVBjn7-_U5aAcHb8gtuQAt-1boS4cQrLgKU-MLPqqwYQ
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3LT8IwHG4QD3JCBePbHjw6oFu7dUcyIaBASBwJN7L1EYhmGO0O-tfbdhsa48HTHsma9peu_fp7fB8At34v5B4XPYdiaVw31HdSjrgTuIy6IUZMWiam6cwfLfDDkixr4G5XCyOEsMlnomNubSyfb1luXGVdw3blBcEe2Cf6VBEU1VrV7HEt9VgZEyzWYd-Qp--OXyaGZtlTbVKCIQRsIEwCvThrzFyxP5XPpGQBQr2wO47m_fungu0TGaHrHzIsdhcaNsG06n-RfPLcyVXaYZ-_qB3_O8BD0P6u94Pz3U52BGoiOwbNSvABlv9_CwxiU6EBC8U-qNaJgpEBnQLGa3N9hxoCw-gj1R_1lTLl-3CTwehlm3NYNKfbb4PFcBBHI6fUYXA2Glwoh0gSppLR1Kgy4VBDDobDQHdVGmpPbTLJvcRPhevKJKFMH8EQRgJLaTRwJE-9E1DPtpk4BTBBHmPY80iiYWdCecgCgQKNWWhICBXyDLSMVVavBdXGqjTI-d-vb8DBKJ5OVpPx7PECNKy712aaXIK6esvFlcYLKr220-QLvjCzsg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2011+IEEE+17th+International+Conference+on+Parallel+and+Distributed+Systems&rft.atitle=Trust+Issues+that+Create+Threats+for+Cyber+Attacks+in+Cloud+Computing&rft.au=Khorshed%2C+M.+T.&rft.au=Ali%2C+A.+B.+M.+S.&rft.au=Wasimi%2C+S.+A.&rft.date=2011-12-01&rft.pub=IEEE&rft.isbn=9781457718755&rft.issn=1521-9097&rft.spage=900&rft.epage=905&rft_id=info:doi/10.1109%2FICPADS.2011.156&rft.externalDocID=6121377
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1521-9097&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1521-9097&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1521-9097&client=summon