Skip to main content

A Proposed Approach to Reduce the Vulnerability in a Cloud System

  • Conference paper
  • First Online:
  • 1134 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 872))

Abstract

Today, cloud computing is becoming more and more popular as a Pay-as-You-Go model for providing on-demand services over the Internet. In this paper, we will propose new detection and prevention mechanisms for cloud systems to protect against different types of attacks and vulnerabilities by improving a new architecture that provides a security mechanism including a virtual firewall and IDS/IPS (Intrusion Detection and Prevention System) which aims to secure the virtual environment.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Cloud Security Alliance: Cloud Computing Top Threats in 2013, February 2013, unpublished

    Google Scholar 

  2. Mazhar, A., Khan, U., Vasilakos, V.: Security in cloud computing: Opportunities and challenges. Inf. Sci. 305, 357–383 (2015)

    Article  MathSciNet  Google Scholar 

  3. Memari, N.: Scalable Honeynet based on artificial intelligence utilizing cloud computing. Int. J. Res. Comput. Sci. 4, 27–34 (2014)

    Article  Google Scholar 

  4. Raghavendra, S., Lakshmi, S., Venkateswarlu, S.: Security issues and trends in cloud computing. Int. J. Comput. Sci. Inf. Technol. 6(2), 1156–1159 (2015)

    Google Scholar 

  5. Varadharajan, V.: Security as a service model for cloud environment. IEEE Trans. Netw. Serv. Manag. 11(1), 60–75 (2014)

    Article  Google Scholar 

  6. Sharma, D., Dhote, C., Potey, M.: Identity and access management as security-as-a-service from clouds. In: Proceedings of International Conference on Communication, Computing and Virtualization (2016)

    Google Scholar 

  7. Guenane, F.: Gestion de la sécurité des réseaux à l’aide d’un service innovant de Cloud Based Firewall (2015). https://tel.archives-ouvertes.fr/tel-01149112

  8. Yu, S., Doss, R., Zhou, W., Guo, S.: A general cloud firewall framework with dynamic resource allocation. In: IEEE Communication and Information Systems Security Symposium (2013)

    Google Scholar 

  9. Saadi, C., Chaoui, H.: Intrusion detection system based interaction on mobile agents and clust-density algorithm “IDS-AM-Clust”. In: Information Science and Technology (CiSt IEEE) (2016)

    Google Scholar 

  10. Saadi, C., Chaoui, H.: Cloud computing security using IDS-AM-Clust, Honeyd, Honeywall and Honeycomb. Procedia Comput. Sci. CMS 85, 2016 (2016)

    Google Scholar 

  11. Saadi, C., Chaoui, H.: Make the intrusion detection system by IDS-AM-Clust, Honeyd, Honeycomb and Honeynet. Advances in Computer Science, pp. 177–188. Wseas Press, November 2015. ISBN 978-1-61804-344-3

    Google Scholar 

  12. Zayed, A., Mostafa, H., Mamouni, A.: Cloud computing et sécurité: approches et solutions. Int. J. Res. Comput. Sci. 30(1), 11–14 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chaimae Saadi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Saadi, C., Chaoui, H. (2018). A Proposed Approach to Reduce the Vulnerability in a Cloud System. In: Tabii, Y., Lazaar, M., Al Achhab, M., Enneya, N. (eds) Big Data, Cloud and Applications. BDCA 2018. Communications in Computer and Information Science, vol 872. Springer, Cham. https://doi.org/10.1007/978-3-319-96292-4_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-96292-4_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-96291-7

  • Online ISBN: 978-3-319-96292-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics