Published in

2013 IEEE Third International Conference on Information Science and Technology (ICIST)

DOI: 10.1109/icist.2013.6747530

8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)

DOI: 10.1109/icitst.2013.6750181

Links

Tools

Export citation

Search in Google Scholar

Considering an elastic scaling model for cloud Security

Proceedings article published in 2013 by Aine Macdermott, Qi Shi, Madjid Merabti, Kashif Kifayat, Kashif Kifiyat
This paper is available in a repository.
This paper is available in a repository.

Full text: Download

Green circle
Preprint: archiving allowed
Green circle
Postprint: archiving allowed
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO

Abstract

Cloud computing usage is growing, and soon the vast majority of organisations will rely on some form of cloud computing services. Cloud computing is being adopted in critical sectors such as energy, transport and finance. This makes cloud computing services critical in themselves. When cyber-attacks and cyber disruptions happen, millions of users are affected. Infrastructure vendors will inevitably take advantage of the benefits offered by the cloud computing environment, but while this may offer improved performance and scalability, the associated security threats deter this progression. There needs to be an assurance that confidentiality, integrity and availability of the data and resources is maintained. This paper provides an overview to the cloud security conundrum, details existing intrusion detection methods, and presents our observation and proposed elastic scaling method for cloud security