Skip to main content

eCloudIDS – Design Roadmap for the Architecture of Next-Generation Hybrid Two-Tier Expert Engine-Based IDS for Cloud Computing Environment

  • Conference paper
Recent Trends in Computer Networks and Distributed Systems Security (SNDS 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 335))

Abstract

Cloud computing is a new hype and a buzz word in today’s business computing world due to its pay-as-you-use model. Organizations are at the edge of a computing revolution which can change the way traditional enterprise IT is run currently. Even with all its benefits, medium to large businesses fear migrating to this computing paradigm because of the security nightmares associated with it. Organizations fear loss of control over their own data and are apprehensive about the cloud vendors’ security measures for the same. This paper describes the design roadmap for the architecture of eCloudIDS, a next-generation security system with innovative hybrid two-tier expert engines, namely uX-Engine (tier-1) and sX-Engine (tier-2), approach for cloud computing environment. eCloudIDS architecture uses both supervised and unsupervised machine learning techniques from artificial intelligence cradle which can ease some of the contemporary urgent security threats present in today’s cloud computing environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Madhan, K.S., Sarukesi, K., Rodrigues, P., Saimanoj, M., Revathy, P.: State-of-the-art Cloud Computing Security Taxonomies – A classification of security challenges in the present cloud computing environment. In: ICACCI 2012, pp. 470–476. ACM, India (2012), doi:10.1145/2345396.2345474, ISBN: 978-1-4503-1196-0

    Google Scholar 

  2. Mell, P., Grance, T.: The NIST Definition of Cloud Computing. NIST Special Publication 800-145. Technical report, National Institute of Standards and Technology (2011)

    Google Scholar 

  3. Cloud Computing and Sustainability: The Environmental Benefits of moving to the Cloud. Technical report, Accenture (2010)

    Google Scholar 

  4. Reeve, R.: Building a 21st Century Communications Economy. Technical report, Carbon Disclosure Project in support with AT&T (2011)

    Google Scholar 

  5. Security Guidance for Critical Areas of Focus in Cloud Computing V2.1. Technical report, Cloud Security Alliance (2009)

    Google Scholar 

  6. Top Threats to Cloud Computing V1.0. Technical report, Cloud Security Alliance (2010)

    Google Scholar 

  7. Computer Security Threat Monitoring and Surveillance. Technical report, James P. Anderson Co. (1980)

    Google Scholar 

  8. Ghahramani, Z.: Unsupervised Learning. In: Bousquet, O., von Luxburg, U., Rätsch, G. (eds.) Machine Learning 2003. LNCS (LNAI), vol. 3176, pp. 72–112. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  9. Securing Multi-Tenancy and Cloud Computing. Technical report, Juniper Networks (2012)

    Google Scholar 

  10. Li, H., Sedayao, J., Hahn-Steichen, J., Jimison, E., Spence, C., Chahal, S.: Developing an Enterprise Cloud Computing Strategy. Technical report, Intel Corporation (2009)

    Google Scholar 

  11. Madhan Kumar, S., Rodrigues, P.: A Roadmap for the Comparison of Identity Management Solutions Based on State-of-the-Art IdM Taxonomies. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds.) CNSA 2010. CCIS, vol. 89, pp. 349–358. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  12. Madhan, K.S., Rodrigues, P.: Analysis on Identity Management Systems with Extended State-of-the-art IdM Taxonomy Factors. International Journal of Ad hoc, Sensor & Ubiquitous Computing 1(4), 62–70 (2010), doi:10.5121/ijasuc.2010.1406

    Article  Google Scholar 

  13. Anu, G.: Cloud Computing Identity Management. Technical report, SETLabs Briefings 7(7), 45–55, Infosys Limited (2009)

    Google Scholar 

  14. What’s Holding Back the Cloud? Technical report, Intel IT Center (2012)

    Google Scholar 

  15. Baker, W., Hutton, A.: 2010 Data Breach Investigations Report, A study conducted by the Verizon RISK Team with cooperation from the U.S. Secret Service and the Dutch High Tech Crime Unit. Technical report, Verizon, New Jersey (2010)

    Google Scholar 

  16. Shiels, M.: Malicious insider attacks to rise. Technical report, BBC News, Silicon Valley (2009)

    Google Scholar 

  17. Srinivasan, M.K., Sarukesi, K., Keshava, A., Revathy, P.: eCloudIDS Tier-1 uX-Engine Subsystem Design and Implementation using Self-Organizing Map (SOM) for Secure Cloud Computing Environment. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Calero, J.M.A., Thomas, T. (eds.) SNDS 2012. CCIS, vol. 335, pp. 432–443. Springer, Heidelberg (2012)

    Google Scholar 

  18. Keerthi, B., Madhan, K.S., Sarukesi, K., Rodrigues, P.: Implementation of Next-generation Traffic Sign Recognition System with Two-tier Classifier Architecture. In: ACM International Conference on Advances in Communications, Computing and Informatics, ICACCI 2012, pp. 481–487. ACM, India (2012), doi:10.1145/2345396.2345476, ISBN: 978-1-4503-1196-0

    Google Scholar 

  19. Balasundaram, K., Srinivasan, M.K., Sarukesi, K.: iReSign-Implementation of Next-Generation Two-Tier Identity Classifier-Based Traffic Sign Recognition System Architecture using Hybrid Region-Based Shape Representation Techniques. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Calero, J.M.A., Thomas, T. (eds.) SNDS 2012. CCIS, vol. 335, pp. 408–421. Springer, Heidelberg (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Srinivasan, M.K., Sarukesi, K., Keshava, A., Revathy, P. (2012). eCloudIDS – Design Roadmap for the Architecture of Next-Generation Hybrid Two-Tier Expert Engine-Based IDS for Cloud Computing Environment. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2012. Communications in Computer and Information Science, vol 335. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34135-9_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34135-9_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34134-2

  • Online ISBN: 978-3-642-34135-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics