Abstract
Today, cloud computing is becoming more and more popular as a Pay-as-You-Go model for providing on-demand services over the Internet. In this paper, we will propose new detection and prevention mechanisms for cloud systems to protect against different types of attacks and vulnerabilities by improving a new architecture that provides a security mechanism including a virtual firewall and IDS/IPS (Intrusion Detection and Prevention System) which aims to secure the virtual environment.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Cloud Security Alliance: Cloud Computing Top Threats in 2013, February 2013, unpublished
Mazhar, A., Khan, U., Vasilakos, V.: Security in cloud computing: Opportunities and challenges. Inf. Sci. 305, 357–383 (2015)
Memari, N.: Scalable Honeynet based on artificial intelligence utilizing cloud computing. Int. J. Res. Comput. Sci. 4, 27–34 (2014)
Raghavendra, S., Lakshmi, S., Venkateswarlu, S.: Security issues and trends in cloud computing. Int. J. Comput. Sci. Inf. Technol. 6(2), 1156–1159 (2015)
Varadharajan, V.: Security as a service model for cloud environment. IEEE Trans. Netw. Serv. Manag. 11(1), 60–75 (2014)
Sharma, D., Dhote, C., Potey, M.: Identity and access management as security-as-a-service from clouds. In: Proceedings of International Conference on Communication, Computing and Virtualization (2016)
Guenane, F.: Gestion de la sécurité des réseaux à l’aide d’un service innovant de Cloud Based Firewall (2015). https://tel.archives-ouvertes.fr/tel-01149112
Yu, S., Doss, R., Zhou, W., Guo, S.: A general cloud firewall framework with dynamic resource allocation. In: IEEE Communication and Information Systems Security Symposium (2013)
Saadi, C., Chaoui, H.: Intrusion detection system based interaction on mobile agents and clust-density algorithm “IDS-AM-Clust”. In: Information Science and Technology (CiSt IEEE) (2016)
Saadi, C., Chaoui, H.: Cloud computing security using IDS-AM-Clust, Honeyd, Honeywall and Honeycomb. Procedia Comput. Sci. CMS 85, 2016 (2016)
Saadi, C., Chaoui, H.: Make the intrusion detection system by IDS-AM-Clust, Honeyd, Honeycomb and Honeynet. Advances in Computer Science, pp. 177–188. Wseas Press, November 2015. ISBN 978-1-61804-344-3
Zayed, A., Mostafa, H., Mamouni, A.: Cloud computing et sécurité: approches et solutions. Int. J. Res. Comput. Sci. 30(1), 11–14 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Saadi, C., Chaoui, H. (2018). A Proposed Approach to Reduce the Vulnerability in a Cloud System. In: Tabii, Y., Lazaar, M., Al Achhab, M., Enneya, N. (eds) Big Data, Cloud and Applications. BDCA 2018. Communications in Computer and Information Science, vol 872. Springer, Cham. https://doi.org/10.1007/978-3-319-96292-4_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-96292-4_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-96291-7
Online ISBN: 978-3-319-96292-4
eBook Packages: Computer ScienceComputer Science (R0)