Abstract:
Cloud computing usage is growing, and soon the vast majority of organisations will rely on some form of cloud computing services. Cloud computing is being adopted in crit...Show MoreMetadata
Abstract:
Cloud computing usage is growing, and soon the vast majority of organisations will rely on some form of cloud computing services. Cloud computing is being adopted in critical sectors such as energy, transport and finance. This makes cloud computing services critical in themselves. When cyber-attacks and cyber disruptions happen, millions of users are affected. Infrastructure vendors will inevitably take advantage of the benefits offered by the cloud computing environment, but while this may offer improved performance and scalability, the associated security threats deter this progression. There needs to be an assurance that confidentiality, integrity and availability of the data and resources is maintained. This paper provides an overview to the cloud security conundrum, details existing intrusion detection methods, and presents our observation and proposed elastic scaling method for cloud security.
Published in: 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)
Date of Conference: 09-12 December 2013
Date Added to IEEE Xplore: 03 March 2014
Electronic ISBN:978-1-908320-20-9