Abstract
Cloud computing is a new hype and a buzz word in today’s business computing world due to its pay-as-you-use model. Organizations are at the edge of a computing revolution which can change the way traditional enterprise IT is run currently. Even with all its benefits, medium to large businesses fear migrating to this computing paradigm because of the security nightmares associated with it. Organizations fear loss of control over their own data and are apprehensive about the cloud vendors’ security measures for the same. This paper describes the design roadmap for the architecture of eCloudIDS, a next-generation security system with innovative hybrid two-tier expert engines, namely uX-Engine (tier-1) and sX-Engine (tier-2), approach for cloud computing environment. eCloudIDS architecture uses both supervised and unsupervised machine learning techniques from artificial intelligence cradle which can ease some of the contemporary urgent security threats present in today’s cloud computing environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Madhan, K.S., Sarukesi, K., Rodrigues, P., Saimanoj, M., Revathy, P.: State-of-the-art Cloud Computing Security Taxonomies – A classification of security challenges in the present cloud computing environment. In: ICACCI 2012, pp. 470–476. ACM, India (2012), doi:10.1145/2345396.2345474, ISBN: 978-1-4503-1196-0
Mell, P., Grance, T.: The NIST Definition of Cloud Computing. NIST Special Publication 800-145. Technical report, National Institute of Standards and Technology (2011)
Cloud Computing and Sustainability: The Environmental Benefits of moving to the Cloud. Technical report, Accenture (2010)
Reeve, R.: Building a 21st Century Communications Economy. Technical report, Carbon Disclosure Project in support with AT&T (2011)
Security Guidance for Critical Areas of Focus in Cloud Computing V2.1. Technical report, Cloud Security Alliance (2009)
Top Threats to Cloud Computing V1.0. Technical report, Cloud Security Alliance (2010)
Computer Security Threat Monitoring and Surveillance. Technical report, James P. Anderson Co. (1980)
Ghahramani, Z.: Unsupervised Learning. In: Bousquet, O., von Luxburg, U., Rätsch, G. (eds.) Machine Learning 2003. LNCS (LNAI), vol. 3176, pp. 72–112. Springer, Heidelberg (2004)
Securing Multi-Tenancy and Cloud Computing. Technical report, Juniper Networks (2012)
Li, H., Sedayao, J., Hahn-Steichen, J., Jimison, E., Spence, C., Chahal, S.: Developing an Enterprise Cloud Computing Strategy. Technical report, Intel Corporation (2009)
Madhan Kumar, S., Rodrigues, P.: A Roadmap for the Comparison of Identity Management Solutions Based on State-of-the-Art IdM Taxonomies. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds.) CNSA 2010. CCIS, vol. 89, pp. 349–358. Springer, Heidelberg (2010)
Madhan, K.S., Rodrigues, P.: Analysis on Identity Management Systems with Extended State-of-the-art IdM Taxonomy Factors. International Journal of Ad hoc, Sensor & Ubiquitous Computing 1(4), 62–70 (2010), doi:10.5121/ijasuc.2010.1406
Anu, G.: Cloud Computing Identity Management. Technical report, SETLabs Briefings 7(7), 45–55, Infosys Limited (2009)
What’s Holding Back the Cloud? Technical report, Intel IT Center (2012)
Baker, W., Hutton, A.: 2010 Data Breach Investigations Report, A study conducted by the Verizon RISK Team with cooperation from the U.S. Secret Service and the Dutch High Tech Crime Unit. Technical report, Verizon, New Jersey (2010)
Shiels, M.: Malicious insider attacks to rise. Technical report, BBC News, Silicon Valley (2009)
Srinivasan, M.K., Sarukesi, K., Keshava, A., Revathy, P.: eCloudIDS Tier-1 uX-Engine Subsystem Design and Implementation using Self-Organizing Map (SOM) for Secure Cloud Computing Environment. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Calero, J.M.A., Thomas, T. (eds.) SNDS 2012. CCIS, vol. 335, pp. 432–443. Springer, Heidelberg (2012)
Keerthi, B., Madhan, K.S., Sarukesi, K., Rodrigues, P.: Implementation of Next-generation Traffic Sign Recognition System with Two-tier Classifier Architecture. In: ACM International Conference on Advances in Communications, Computing and Informatics, ICACCI 2012, pp. 481–487. ACM, India (2012), doi:10.1145/2345396.2345476, ISBN: 978-1-4503-1196-0
Balasundaram, K., Srinivasan, M.K., Sarukesi, K.: iReSign-Implementation of Next-Generation Two-Tier Identity Classifier-Based Traffic Sign Recognition System Architecture using Hybrid Region-Based Shape Representation Techniques. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Calero, J.M.A., Thomas, T. (eds.) SNDS 2012. CCIS, vol. 335, pp. 408–421. Springer, Heidelberg (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Srinivasan, M.K., Sarukesi, K., Keshava, A., Revathy, P. (2012). eCloudIDS – Design Roadmap for the Architecture of Next-Generation Hybrid Two-Tier Expert Engine-Based IDS for Cloud Computing Environment. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2012. Communications in Computer and Information Science, vol 335. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34135-9_36
Download citation
DOI: https://doi.org/10.1007/978-3-642-34135-9_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34134-2
Online ISBN: 978-3-642-34135-9
eBook Packages: Computer ScienceComputer Science (R0)