Search
Now showing items 1-10 of 21
A finite state hidden markov model for predicting multistage attacks in cloud systems
(
IEEE
, 2014 , Conference Paper)
Cloud computing significantly increased the security threats because intruders can exploit the large amount of cloud resources for their attacks. However, most of the current security technologies do not provide early ...
Energy-efficient cloud resource management
(
IEEE
, 2014 , Conference Paper)
We propose a resource management framework that reduces energy consumption in cloud data centers. The proposed framework predicts the number of virtual machine requests along with their amounts of CPU and memory resources, ...
Managing Client-Specific Customised Functions in Multi-Tenant Software-as-a-Service
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
Maintainability and easy-to-customisation are some quality properties that most application software in software-as-a-service (SaaS) should posses. These quality attributes are the pre requisite for most application software ...
CloudSafe: A tool for an automated security analysis for cloud computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Cloud computing has been adopted widely, providing on-demand computing resources to improve performance and reduce operational costs. However, these new functionalities also bring new ways to exploit the cloud computing ...
A secure client-side framework for protecting the privacy of health data stored on the cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
In the past decade, Cloud-Computing emerged as a new computing concept with a distributed nature using virtual network and systems. Many businesses rely on this technology to keep their systems running but concerns are ...
Learning predictive autoscaling policies for cloud-hosted microservices using trace-driven modeling
(
IEEE Computer Society
, 2019 , Conference Paper)
Autoscaling methods are important to ensure response time guarantees for cloud-hosted microservices. Most of the existing state-of-the-art autoscaling methods use rule-based reactive policies with static thresholds defined ...
ThreatRiskEvaluator: A Tool for Assessing Threat-Specific Security Risks in the Cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
In cloud computing, security risks posed to individual clients are different based on their specific security requirements. In current practice, cloud providers usually apply generic protection mechanisms that may not be ...
Using block cipher for confidentiality of images in cloud-based systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
This paper deals with outsourcing of computing to cloud servers where clients' images are computed and stored. It proposes a technique that obfuscates images before sending them to servers. Cloud servers can perform ...
A cost-aware model for risk mitigation in Cloud computing systems
(
IEEE Computer Society
, 2016 , Conference Paper)
Security is an important element in Cloud computing. Intruders may exploit clouds for their advantage. This paper presents a cost-aware model for risk mitigation in cloud computing systems. The proposed model is integrated ...
Joint resource scheduling and peak power shaving for cloud data centers with distributed Uninterruptible power Supply
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
The grid company enforces high penalties for the peak power demands of cloud data centers. These high penalties result in high electricity bill that can be avoided by relying on the servers' Uninterruptible Power Supply ...