Anomaly Detection in Cloud Computing and Internet of Things Environments

Author(s):  
Rachid Cherkaoui ◽  
Mostapha Zbakh ◽  
An Braeken ◽  
Abdellah Touhafi

This chapter contains the state of the art of the latest security issues of cloud computing as well as security issues of internet of things (IoT) applications. It discusses the integration of IoT platforms with cloud computing services, security of the hosted data, intrusion and anomaly detection techniques used to detect attacks in virtualized networks. The chapter also discusses some of the lightweight anomaly detection techniques to use in integrated constrained devices' ecosystems with cloud computing environments. This chapter focuses on efficient integration of cloud hosting with IoT applications as well as integration of lightweight intrusion detection systems in the latter environments.

Author(s):  
Rachid Cherkaoui ◽  
Mostapha Zbakh ◽  
An Braeken ◽  
Abdellah Touhafi

This chapter contains the state of the art of the latest security issues of cloud computing as well as security issues of internet of things (IoT) applications. It discusses the integration of IoT platforms with cloud computing services, security of the hosted data, intrusion and anomaly detection techniques used to detect attacks in virtualized networks. The chapter also discusses some of the lightweight anomaly detection techniques to use in integrated constrained devices' ecosystems with cloud computing environments. This chapter focuses on efficient integration of cloud hosting with IoT applications as well as integration of lightweight intrusion detection systems in the latter environments.


2016 ◽  
pp. 1162-1190
Author(s):  
Peter Sasvari ◽  
Zoltán Nagymate

Innovation capability has increasingly been searched by the ICT sector in cloud computing applications recently. This chapter describes the economic potentials of cloud computing and explores the characteristics of its usage among Hungarian enterprises. Although enterprises are aware of the basic concept of cloud computing, they have concerns about its application mainly due to data security issues and the lack of education. The chance of using cloud computing services is mainly facilitated by the creation of easier application and consultation would positively affect their usage. According to microenterprises and corporations, faster information flow and remote access are the key benefits of cloud usage. In the case of small-sized enterprises, the two main advantages are easier system recoverability and a higher level of mobility in case of a system breakdown. For the medium-sized enterprises, remote access and greater data security were the key benefits of using cloud computing services in 2014.


Author(s):  
Peter Sasvari ◽  
Zoltán Nagymate

Innovation capability has increasingly been searched by the ICT sector in cloud computing applications recently. This chapter describes the economic potentials of cloud computing and explores the characteristics of its usage among Hungarian enterprises. Although enterprises are aware of the basic concept of cloud computing, they have concerns about its application mainly due to data security issues and the lack of education. The chance of using cloud computing services is mainly facilitated by the creation of easier application and consultation would positively affect their usage. According to microenterprises and corporations, faster information flow and remote access are the key benefits of cloud usage. In the case of small-sized enterprises, the two main advantages are easier system recoverability and a higher level of mobility in case of a system breakdown. For the medium-sized enterprises, remote access and greater data security were the key benefits of using cloud computing services in 2014.


2014 ◽  
Vol 519-520 ◽  
pp. 193-196
Author(s):  
Jing Wu ◽  
Feng Zhi Zhao ◽  
Yu Dan Dong

As a new cloud computing services and computing model itself does not break away from traditional concepts of information security coverage, still faces a variety of traditional security threats, including physical physical security, network security, host security. Because of their characteristics of cloud computing will lead to generate some new security issues, such as internal virtual machine to attack each other, the super administrator rights and other issues. In this paper, cloud computing security problems faced by specific solutions.


2017 ◽  
Vol 17 (4) ◽  
pp. 3-31 ◽  
Author(s):  
P. Ravi Kumar ◽  
P. Herbert Raj ◽  
P. Jelciana

AbstractCloud computing is emerging as one of the powerful computing technologies in the field of Information Technology due to its flexibility and cost reduction. This paper provides a detailed survey on security issues of the services provided by cloud computing and solutions to mitigate them. The main objective of this paper is to empower a new researcher to figure out the concepts of cloud computing, the services provided by them, and the security issues in the services. It also provides solutions to avoid or mitigate the different security issues which occur in the services provided by cloud computing. Additionally, it provides insight into the cloud computing model proposed by the National Institute of Standards and Technology (NIST), data stages and data security basics in a multi-tenant environment. This paper explores the different security methods proposed by different researchers and analyzes them.


Author(s):  
Vaikunth Pai T. ◽  
P.S. Aithal

Cloud computing services enabled through information communication technology delivered to a customer as services over the Internet on a leased basis have the capability to extend up or down their service requirements or needs. In this model, the infrastructure is owned by a third party vendor and the cloud computing services are delivered to the requested customers. Cloud computing model has many advantages including scalability, flexibility, elasticity, efficiency, and supports outsourcing noncore activities of an organization. Cloud computing offers an innovative business concept for organizations to adopt IT enabled services without advance investment. This model enables convenient, on-request network accessibility to a shared pool of IT computing resources like networks, servers, storage, applications, and services. Cloud computing can be quickly provisioned and released with negligible management exertion or service provider interaction. Even though organizations get many benefits of cloud computing services, many organizations are slow in accepting cloud computing service model because of security concerns and challenges associated with management of this technology. Security, being the major issues which hinder the growth of cloud computing service model due to the provision of handling confidential data by the third party is risky such that the consumers need to be more attentive in understanding the risks of data breaches in this new environment. In this paper, we have discussed the security issues, the challenges and the opportunities in the adoption and management of cloud computing services model in an organization.


Author(s):  
Pradeep Kumar Tiwari ◽  
Sandeep Joshi

Cloud computing is a BUZZ word of modern computing scenario. Cloud computing services are flexible and cost effective with resource utilization. Cloud computing have three service models SaaS (Software as a Service) PaaS (Plateform as a Service) and Iaas (Infrastructure as a Service). SaaS provide on demand application services such as email, ERP and CRM etc. Multi user can access applications and they can interact to each other at same time. All users data can be reside at same place. This flexibility of SaaS service also gives the security breaches. Loop holes of SaaS harder to find and maintain. The authors discuss here security vulnerabilities of SaaS with possible solutions. This study would be helpful to elaborate to understand data security issues and privacy solutions over SaaS.


Author(s):  
Sulistyo Heripracoyo

Cloud computing is a phenomenon that is currently a lot of attention from practitioners of information technology. Cloud computing can be composed of several types of services that are known to Saas, PaaS and IaaS, public and private cloud computing. Companies that do not invest themselves in the information technology infrastructure to use cloud computing services as a solution. By adopting and implementing a cloud computing services company can shift the cost of information technology infrastructure investments become operational costs by purchasing cloud computing services. Nevertheless, cloud computing, especially for the type of private cloud is still a bit of adopting it, whether it is caused by the absence of reference to the implementation or caused by something else. The purpose of this study was to analyze the adoption of cloud computing that suitable and beneficial for the company in its operational activities. The study was conducted by analysis of some of the literature related to cloud computing, benefits and barriers. According to the analysis of the literature can be explained some of the benefits associated with the adoption of cloud computing. Based on several studies that have been done, the benefits of implementing cloud computing is primarily financial savings and benefits of resource management that is the flexibility and scalability of the company's operations. However, some considerations still need to be done for a company that will implement cloud computing and those things are data security issues,  legal issues and the implications for the company.


Sign in / Sign up

Export Citation Format

Share Document