The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security is a major challenge in Cloud Computing. Attacks exploiting resource virtualization vulnerabilities such as cross-VM side-channel, VM escape, and VM hopping constitute significant threats. Hosted VMs may act as a potential attack-source against neighboring VMs or cloud infrastructure. Inspired by the sea-chameleons camouflaging process to evade predators, in this paper we propose an Online...
Organizations are exposed to various cyber-attacks. When a component is exploited, the overall computed damage is impacted by the number of components the network includes. This work is focuses on estimating the Target Distribution characteristic of an attacked network. According existing security assessment models, Target Distribution is assessed by using ordinal values based on users' intuitive...
Cloud Security is a major concern for storing and protecting of data, applications and services, accessed as per the user requirements [3]. There is a need to provide guaranteed access control mechanism, so that only approved and permitted users will be able to use the data as on demand basis in the cloud [1]. Provenance is a major entity in cloud security. It includes information that is used to...
Over the last decade, a globalization of the software industry took place, which facilitated the sharing and reuse of code across existing project boundaries. At the same time, such global reuse also introduces new challenges to the software engineering community, with not only components but also their problems and vulnerabilities being now shared. For example, vulnerabilities found in APIs no longer...
Cloud computing is a model that offers on-demand computational resources to clients as services. In this concept, users are charged based on a pay-per-use business model. Therefore, it dramatically reduces operating costs associated with the maintenance of the local data center. Recently, database is provided as a service to fulfill clients' demand. Following this, companies can rely on a remote database...
Cloud computing is an emerging trend that provides on-demand computational resources to the end users as services. Hence, consumers are charged based on their usage and consumption of services delivered through the Internet. This paradigm aims at outsourcing and delegating computations to an external third-party and reducing operating costs. As a result, public sector and private enterprises are interested...
Attack graphs show possible paths that an attacker can use to intrude into a target network and gain privileges through series of vulnerability exploits. The computation of attack graphs suffers from the state explosion problem occurring most notably when the number of vulnerabilities in the target network grows large. Parallel computation of attack graphs can be utilized to attenuate this problem...
This article makes full use of the features of worm virus and Trojans, and constructs intelligent cognitive virus model based on Agent. The process of viral population genetics and evolution is presented in detail. The virus cloud is described with SaaS architecture approach. The ideas in this paper provides a guideline for using the virus for better attacks in cyberspace confrontation areas.
The objective of this work is to make farmers and agriculturalist to achieve best price for their products that they produce or sell. The salient feature of this system is the bidding by which each owner/farmer attains their maximum price for their product with respect to their urgency. This also provides facilities for the clients to quote their price for bigger requirement by means of the tendering...
In this paper, we aim to solve the problem of neural network in computer network security assessment, which is very important for computer network's popularization. Our proposed computer network security assessment system contains client and server. The client module includes: 1) scanning configuration model, 2) assessment model, 3) scanning result database model and 4) output model. Furthermore,...
This paper presents an approach for securing software application chains in cloud environments. We use the concept of workflow management systems to explain the model. Our prototype is based on the Kepler scientific workflow system enhanced with security analytics package.
Most security related research for cloud computing focuses on attacks generated outside the cloud system. However, insider attackers are more challenging and can cause severe impacts on the cloud system stability and quality of service. In this paper, we propose an insider threat model using a knowledgebase approach. Knowledgebase models were used earlier in preventing insider threats in both the...
The integrity and confidentiality of the multilevel security communication are guaranteed by using the key obtained from key negotiation process. To ensure the safety of this process is very important. The quantum key distribution process is unconditionally secure. This paper uses this process to distribute the authentication keys and the session keys, which are used in IPSec process. Thus, the method...
Provenance of Big Data is a hot-topic in the database and data mining research communities. Basically, provenance is the process of detecting the lineage and the derivation of data and data objects, and it plays a major role in database management systems as well as in workflow management systems and distributed systems. Despite this, provenance of big data research is still in its embryonic phase,...
This paper presents a trust management model based on multi-agent and trust evaluation. It adopts the centralized distribution management mode and sets up multiple third-party agents in the cloud, furthermore, it can manage the users and cloud services by the collaboration of the agents effectively. By using multiple third-party agents, it can reduce the single-agent's pressure of computation, storage...
Mobile Money Transfer (MMT) services provided by mobile network operators enable funds transfers made on mobile devices of end-users, using digital equivalent of cash (electronic money) without any bank accounts involved. MMT simplifies banking relationships and facilitates financial inclusion, and, therefore, is rapidly expanding all around the world, especially in developing countries. MMT systems...
As Cloud Computing becomes the trend of information technology computational model, the Cloud security is becoming a major issue in adopting the Cloud where security is considered one of the most critical concerns for the large customers of Cloud (i.e. governments and enterprises). Such valid concern is mainly driven by the Multi-Tenancy situation which refers to resource sharing in Cloud Computing...
Multilevel secure database systems are the systems in which security classifications are assigned from the relations to data elements. Due to security requirements of databases, the concurrency control mechanisms for such databases are different than the concurrency control mechanisms in traditional databases. In this paper, we present a new algorithm for concurrency control that is shown to be starvation-...
Cloud computing offers flexible IT solutions that suites the growingly dynamic organizational demands. Different types of cloud deployment models offer distinctive solutions based on the security requirements of the organization. Hybrid clouds are considered the prominent deployment model that offers the extended flexibility of public cloud resources and the security of private clouds. This paper...
The paper considers an approach to computer attack modeling and security evaluation which is suggested to realize in advanced Security Information and Event Management (SIEM) systems. It is based on modeling of malefactors' behavior, building a common attack graph, processing current alerts for real-time adjusting of particular attack graphs, calculating different security metrics and providing security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.