scholarly journals Comparative Analysis: Intrusion Detection in Multi-Cloud Environment to Identify Way Forward

Cloud computing is the emerging platform that is covering individual and corporate needs swiftly. The spread of this global platform is ranging from infrastructure to various middleware, front-end and back- end services. At corporate level, another effective configuration of this phenomenon is multi-cloud environment, which is depicting the ultimate control of the end-user on engaging services from various cloud service providers depending on the service ranking, cost and availability. It is therefore, now very much desirable to have infrastructure services from one service provider while data services are performed on another cloud or having infrastructure services in a distributed environment on multiple clouds. Multi-cloud environment is closely linked with smartly configured security mechanism to ensure the security at rest and in transit. Intrusion detection at various levels and services of cloud platform is not an easy task and when it is spread over multiple clouds then the challenge becomes more complex and tedious. On the other side, managing and integrating a multi-cloud computing environment is also highly complex. From technical point of view, it requires experience and hi-tech skills to formulate sustainable integration between multiple clouds and a coherence among various services to provide an encapsulated platform for the end-user. As in a multicolor environment, the integration can be focused on Infrastructure-as-a-Service (IaaS), Software-as-a-Service (SaaS) and Platform-as-a-Service (PaaS) from various cloud service providers therefore an API-consistent cloud environment is required which leads to the security and more specifically intrusion detection. The problem arises when most of the existing network based intrusion detection systems are designed to deal with the known threats and attacks. These systems are dependent on a rule base that is sufficient to work in certain environment but in case of multi-cloud integration, such fixed rule bases and known-resilience becomes a point of concern. It is therefore, required to look at the intrusion detection system, which may adapt the environmental changes as well as can at least indicate the unknown / anomaly attacks or detection. Honeypot is a vibrant mechanism to divert attention of the unknown attackers and able to capture data to analyze the anomaly. Honeypots may not be so useful independently but along with an intrusion detection system; this mechanism works efficiently and provides tangible results. This research paper is focused on analyzing the multi-cloud environment, intrusion detection systems and the use of honeypots in the existing solutions to understand the possible configurations for effective results in making a sustainable, secure and scalable multi-cloud environment.

2021 ◽  
Author(s):  
Hamza Ali Imran ◽  
Usama Latif ◽  
Ataul Aziz Ikram ◽  
Maryam Ehsan ◽  
Ahmed Jamal Ikram ◽  
...  

<div>In the span of a decade, innovations in cloud computing have led to a new understanding of computing to be used as a utility. Majority of cloud service providers are making the service better and competitive for end-user. Aside from the number of services introduced by these providers, users are feeling uneasy and are unaware of consequences while switching from one service to another. Internal architecture of the cloud makes it difficult for end-users to understand. To overcome this issue a new concept of multi-cloud has been introduced. In multi-cloud technology, we can use multiple clouds from different vendors without platform complexity. Hence summarized, Multi-cloud is the usage of autonomous cloud platforms with one interface which may clue to different administrative and implementation domains. This paper reviews the literature of recently presented solutions and architectures for multi-cloud platforms.</div>


2021 ◽  
Author(s):  
Hamza Ali Imran ◽  
Usama Latif ◽  
Ataul Aziz Ikram ◽  
Maryam Ehsan ◽  
Ahmed Jamal Ikram ◽  
...  

<div>In the span of a decade, innovations in cloud computing have led to a new understanding of computing to be used as a utility. Majority of cloud service providers are making the service better and competitive for end-user. Aside from the number of services introduced by these providers, users are feeling uneasy and are unaware of consequences while switching from one service to another. Internal architecture of the cloud makes it difficult for end-users to understand. To overcome this issue a new concept of multi-cloud has been introduced. In multi-cloud technology, we can use multiple clouds from different vendors without platform complexity. Hence summarized, Multi-cloud is the usage of autonomous cloud platforms with one interface which may clue to different administrative and implementation domains. This paper reviews the literature of recently presented solutions and architectures for multi-cloud platforms.</div>


2021 ◽  
Vol 11 (1) ◽  
pp. 365-379
Author(s):  
Wisam Elmasry ◽  
Akhan Akbulut ◽  
Abdul Halim Zaim

Abstract Although cloud computing is considered the most widespread technology nowadays, it still suffers from many challenges, especially related to its security. Due to the open and distributed nature of the cloud environment, this makes the cloud itself vulnerable to various attacks. In this paper, the design of a novel integrated Cloud-based Intrusion Detection System (CIDS) is proposed to immunise the cloud against any possible attacks. The proposed CIDS consists of five main modules to do the following actions: monitoring the network, capturing the traffic flows, extracting features, analyzing the flows, detecting intrusions, taking a reaction, and logging all activities. Furthermore an enhanced bagging ensemble system of three deep learning models is utilized to predict intrusions effectively. Moreover, a third-party Cloud-based Intrusion Detection System Service (CIDSS) is also exploited to control the proposed CIDS and provide the reporting service. Finally, it has been shown that the proposed approach overcomes all problems associated with attacks on the cloud raised in the literature.


Symmetry ◽  
2021 ◽  
Vol 13 (2) ◽  
pp. 317
Author(s):  
Chithambaramani Ramalingam ◽  
Prakash Mohan

The increasing demand for cloud computing has shifted business toward a huge demand for cloud services, which offer platform, software, and infrastructure for the day-to-day use of cloud consumers. Numerous new cloud service providers have been introduced to the market with unique features that assist service developers collaborate and migrate services among multiple cloud service providers to address the varying requirements of cloud consumers. Many interfaces and proprietary application programming interfaces (API) are available for migration and collaboration services among cloud providers, but lack standardization efforts. The target of the research work was to summarize the issues involved in semantic cloud portability and interoperability in the multi-cloud environment and define the standardization effort imminently needed for migrating and collaborating services in the multi-cloud environment.


2019 ◽  
pp. 54-83
Author(s):  
Chiba Zouhair ◽  
Noreddine Abghour ◽  
Khalid Moussaid ◽  
Amina El Omri ◽  
Mohamed Rida

Security is a major challenge faced by cloud computing (CC) due to its open and distributed architecture. Hence, it is vulnerable and prone to intrusions that affect confidentiality, availability, and integrity of cloud resources and offered services. Intrusion detection system (IDS) has become the most commonly used component of computer system security and compliance practices that defends cloud environment from various kinds of threats and attacks. This chapter presents the cloud architecture, an overview of different intrusions in the cloud, the challenges and essential characteristics of cloud-based IDS (CIDS), and detection techniques used by CIDS and their types. Then, the authors analyze 24 pertinent CIDS with respect to their various types, positioning, detection time, and data source. The analysis also gives the strength of each system and limitations in order to evaluate whether they carry out the security requirements of CC environment or not.


2020 ◽  
Vol 8 (5) ◽  
pp. 1627-1631

Confidentiality, Privacy and Protection of data (CPPD) are the major challenges in the cloud environment for cloud users such as industrials and organizations. Hence major companies are loath to migrate to cloud and also still using the private cloud because of lock in CPPD of cloud. Cloud Service Providers (CSP) are unable to elucidate strength of the storage and services due to lack of data security. To solve the above issue, we trust, algorithms are not the only solution for data security. In this regards, we suggest to change the architecture and develop a new mechanisms. In this paper, we are proposed two thinks. First is move to single cloud architecture to multiple cloud architecture and second is develop an innovative algorithm. And one more think also considered and proposed an inimitable mechanism to use an innovative algorithm in the multi cloud architecture for improving CPPD.


Author(s):  
Chiba Zouhair ◽  
Noreddine Abghour ◽  
Khalid Moussaid ◽  
Amina El Omri ◽  
Mohamed Rida

Security is a major challenge faced by cloud computing (CC) due to its open and distributed architecture. Hence, it is vulnerable and prone to intrusions that affect confidentiality, availability, and integrity of cloud resources and offered services. Intrusion detection system (IDS) has become the most commonly used component of computer system security and compliance practices that defends cloud environment from various kinds of threats and attacks. This chapter presents the cloud architecture, an overview of different intrusions in the cloud, the challenges and essential characteristics of cloud-based IDS (CIDS), and detection techniques used by CIDS and their types. Then, the authors analyze 24 pertinent CIDS with respect to their various types, positioning, detection time, and data source. The analysis also gives the strength of each system and limitations in order to evaluate whether they carry out the security requirements of CC environment or not.


Author(s):  
Abhishek Majumder ◽  
Samir Nath ◽  
Arpita Bhattacharjee ◽  
Ranjita Choudhury

Trust relationships among multiple Cloud Service Providers is a concept in which multiple cloud service providers from multiple distributed Identity Provider can access resources of each other, only if they are trusted with their Identity Provider. In this chapter a scheme has been proposed to enhance the security of data in a multi-cloud environment by improving trust relationships among multiple clouds. The scheme is also designed to overcome interoperability problem between different clouds. In the proposed scheme concept of proxy is used. Client organization tries to communicate with multiple cloud service providers through proxy. Client organization send resource request to cloud service providers. On receiving the resource request the cloud service provider collect the authentication confirmation from proxy. Then it sends the reply and data to requested client organization. Numerical analysis and comparative study of the proposed scheme with some of the existing scheme has been carried out.


2019 ◽  
pp. 1548-1576
Author(s):  
Abhishek Majumder ◽  
Samir Nath ◽  
Arpita Bhattacharjee ◽  
Ranjita Choudhury

Trust relationships among multiple Cloud Service Providers is a concept in which multiple cloud service providers from multiple distributed Identity Provider can access resources of each other, only if they are trusted with their Identity Provider. In this chapter a scheme has been proposed to enhance the security of data in a multi-cloud environment by improving trust relationships among multiple clouds. The scheme is also designed to overcome interoperability problem between different clouds. In the proposed scheme concept of proxy is used. Client organization tries to communicate with multiple cloud service providers through proxy. Client organization send resource request to cloud service providers. On receiving the resource request the cloud service provider collect the authentication confirmation from proxy. Then it sends the reply and data to requested client organization. Numerical analysis and comparative study of the proposed scheme with some of the existing scheme has been carried out.


Sign in / Sign up

Export Citation Format

Share Document