RESEARCH PAPERS

malware management in cloud computing




The management of security in cloud computing
free download

 Virtual machines must be protected against malicious attacks such as cloud malware.  specifically addresses, organisations' information security, senior professionals and management may look  privacy policies in formulating a comprehensive set of Cloud computing guidelines. 

A survey on security issues in service delivery models of cloud computing
free download

 itself can be helpful for a hacker to leverage the PaaS cloud infrastructure for malware command and  customer's internal LDAP/AD server, so that companies can retain control over the management of users.  The definitional borders of cloud computing are much debated today. 

On technical security issues in cloud computing
free download

 is unable to issue XML based security tokens by itself, and (b) Federated Identity Management sys- tems  Such kind of Cloud malware could serve any particular purpose the adversary is interested in, ranging  These restrictions tend to fall away in the Cloud Computing scenario. 

Cloud computing for education: A new dawn?
free download

 which will be revisited later when examining some of the limitations of cloud computing.  that caters for the needs of students, teaching staff and management, research staff  with software (eg, email accounts, operating systems, productivity applications, malware detectors and 

Guidelines on security and privacy in public cloud computing
free download

 Having a backdoor Trojan, keystroke logger, or other type of malware running on a client device undermines the security and privacy of public cloud services as  Organizations should employ appropriate security management practices and controls over cloud computing. 

Identity management and trust services: Foundations for cloud computing.
free download

 Record Details ,EJ864631. Title: Identity Management and Trust Services: Foundations for Cloud Computing. Full-Text Availability Options:  Click on any of the links below to perform a new search. Title: Identity Management and Trust Services: Foundations for Cloud Computing. 

Securing elastic applications on mobile devices for cloud computing
free download

 Furthermore, malware could bypass the elasticity manager and launch weblets on cloud platforms on behalf of  4. AUTHENTICATION AND SECURE SESSION MANAGEMENT  also specify where individual weblets can be installed and executed, (eg, migratable, cloud side only 

An analysis of the cloud computing security problem
free download

 systems and workloads from common security threats that affect traditional physical servers, such as malware and viruses  Each cloud consumer can use their own security controls based on their needs, expected risk level, and their own security management process. 

Research challenges for enterprise cloud computing
free download

 Erdogmus [18] lists other benefits of cloud computing as scalability, reliability, security, ease of deployment, and ease of management for customers, traded off against worries of trust, privacy, availability, performance, ownership, and supplier persistence. 

Assessing the security risks of cloud computing
free download

 that refuses to provide detailed information on its security and continuity management programs.  Are users provided with instructions on how to avoid phishing or malware attacks?  for both partners, and it is virtually never an effective assessment method for cloud computing.  <

Managing security of virtual machine images in a cloud environment
free download

Nonetheless it is still a useful service because it reduces the likelihood of having malware embedded in images.  Nonetheless, we believe that in general privacy and security management for VM images is useful for the Cloud. 

Trusted cloud computing with secure resources and data coloring
free download

 We can enhance some of these features with cloud reputation systems and more efficient identity management systems, which we dis- cuss in subsequent sections. Trusted Cloud Computing over Data Centers Malware-based attacks such as worms, viruses, and DoS exploit 

Can public-cloud security meet its unique challenges?
free download

 By deploying malware protection at the hypervisor level, cloud providers can maintain the Page 3.  3. JW Rittinghouse and JF Ran- some, Cloud Security Challenges, Cloud Computing:

Above-Campus Services: Shaping the Promise of Cloud Computing for Higher Education.
free download

 Title: Above-Campus Services: Shaping the Promise of Cloud Computing for Higher Education. Full-Text Availability Options:  Click on any of the links below to perform a new search. Title: Above-Campus Services: Shaping the Promise of Cloud Computing for Higher Education. 

A survey of mobile cloud computing: architecture, applications, and approaches
free download

 minimal management efforts or service provider's interac- tions. With the explosion of mobile applications and the support of CC for a variety of services for mobile users, mobile cloud computing (MCC) is introduced as an inte- gration of CC into the mobile environment. 

Collaboration-Based Cloud Computing Security Management Framework
free download

 cloud platform infrastructure, such as OS, does not support for multi-tenancy, so we cannot install multiple anti-viruses or anti-malware systems on  SUMMARY In this paper we introduced a collaboration-based security management framework for the cloud computing model. 

Ontological approach toward cybersecurity in cloud computing
free download

 Common Attack Pattern Enumeration and Classi- fication (CAPEC) [24] and Malware Attribute Enumeration and  With data provenance, version management/change tracking of electronic data in the cloud is  One of the biggest changes from the non-cloud computing to the cloud 

Emerging security challenges of cloud virtual infrastructure
free download

Stealthy malware detection through vmmbased =out-of-the-box' semantic  Security with Virtualized Defense and Reputation-Based Trust Management - Hwang, Kulkarni, et  2, Walloschek and Elmar Stcker, " Understanding Cloud-Computing Vulnerabilities ,Grobauer, Tobias  [HTML]

Cloud computing: challenges and future directions
free download

 Machines infected with bot malware are then turned into 'zombies' and can be used as remote attack tools or to form part of a botnet under the control of the botnet controller.  Virtual infrastructure management in private and hybrid clouds  Queenslanders debate cloud computing.  [HTML]

Securing elasticity in the cloud
free download

 of information and to limit the attack surface available to hackers or malware once the  and services) that can be rapidly provisioned and released with minimal management effort or  This cloud model promotes availability and is composed of five essential characteristics, three 

Cloud security is not (just) virtualization security: a short paper
free download

 computing holds significant promise to improve the de- ployment and management of services  Any malware that relocated security-sensitive data struc- tures would fool detectors built  virtual-machine introspection and the information gap spe- cific to cloud computing, where no 

Toward cloud-agnostic middlewares
free download

 Additional management concerns are the ability to perform op- erations for individual  challenged and targeted by malicious third parties and the malware they unleash  quality concerns are consequential when deploying applications to many different cloud computing platforms. 

Security issues for cloud computing
free download

 In addition, resource allocation and memory management algorithms have to be secure. Finally, data mining techniques may be applicable to malware detection in clouds.  We have defined a layered framework for assured cloud computing consist- ing of the secure virtual 

New network security based on cloud computing
free download

 information threats on the Internet constantly, including the continuous attacks, botnet harvest , malware outbreaks and  and timed control ,the amalgamation of network and security, the standard network element management.  THE CLOUD COMPUTING IN CLOUD FIREWALL? 

Cloud Computing-A Primer Part 1: Models and Technologies
free download

 Management Management has several facets in a cloud-computing environment: billing, application-response monitoring, configuring network re- sources (virtual and physical), and workload migration. In a private cloud or 

MobiCloud: building secure cloud framework for mobile computing and communication
free download

 Running more applications will increase the threats of malware that can be installed in  In this paper, we presented a new mobile cloud framework for MANETs called  and provisioning domain construction, resource and information flow isolations, trust management (ie, identity 

All your clouds are belong to us: security analysis of cloud management interfaces
free download

Amazon EC2 and S3 Control Interfaces One of the most prominent cloud computing platforms is Amazon Web  graphic keys for the SSH login may be similarly generated via the EC2 cloud control.  The first one is a browser-based Web application (AWS Management Console 

Cloud computing security considerations
free download

 overcome this problem, there should be single management console to manage, monitor and  Intrusion detection and prevention, integrity monitoring, log inspection, and malware protection.  vol46-4/paper09.pdf [6] A Security Analysis of Cloud Computing

Transparent security for cloud
free download

to (ideally) avoid false-positives; that is, mistak- enly detecting malware attacks where  the compromised guest and/or notify remote middleware security-management components.  CLOUD PROTEC- TION SYSTEM (TCPS) The proposed Transparent Cloud Protection System 

Cloud computing through mobile-learning
free download

 Exchange Hosted Services offers online tools to help organizations protect themselves from spam and malware, satisfy retention requirements for e-discovery and compliance, encrypt data to  Storage Memory Management Process Layer  Cloud Computing Journal, August 2008. 

From cloud computing to mobile Internet, from user focus to culture and hedonism: the crucible of mobile health care and wellness applications
free download

 of mobile ICT acceptance need to be looked into to ensure predictable roll out of international cloud based health  Health Management Services, Survey health_management_se rvices/q/id/51908/t/2  (Eds.): Malware: Hardware Technology 

Challenges for cloud networking security
free download

 of code and data is one of the major causes of malware infection, as  challenges of cloud networking, ie, moving virtual components in space, and its management.  In addition to cloud computing, virtual networking introduces new security challenges by enabling communication 

Understanding the Cloud Computing Ecosystem: Results from a Quantitative Content Analysis
free download

 The second cluster consists of literature on resource management of Cloud Computing services in which slightly more negative than positive words are used. This cluster is strongly dominated by researchers like Pschel et al. (for example [30]). Topics regarding Grid vs. 

Secure virtual machine execution under an untrusted management OS
free download

 require physical access to the computers, which is quite challenging in the cloud computing scenario.  that using the proposed secure virtualization architecture, even under an untrusted management OS, a  [7] X. Jiang, X. Wang, and D. Xu, Stealthy malware detection through 

CyberGuarder: A virtualization security assurance architecture for green cloud computing
free download

 checks the integrity of the OS through TPM to prevent the OS kernel from corruption or tampering by malware.  As proof of the concept, CyberGuarder is also integrated into our iVIC cloud platform that has been constructed as a virtual machine resource management system. 

From users to choosers: The cloud and the changing shape of enterprise authority
free download

 the new Internet-based environment brought exotic new forms of malware, enhanced hacking  jobs had become more political and more concerned with risk management than ever  The Impact of Cloud Computing Cloud computing can help address some of the problems that 

What every CEO needs to know about the cloud
free download

 operational response and business performance in key areas such as vegetation management, disaster response,  firewalls can be breached; viruses, worms, and other forms of malware can invade.  Cloud computing vendors are better able to do this than all but the very largest 

Cloud computing: technologies and strategies of the ubiquitous data center
free download

paradigm in which information is permanently  That's a pretty thorough definition, but it may still be incomplete for our purposes, because it doesn't mention management, efficiency, delivery 

Towards a discipline of mission-aware cloud computing
free download

 are launched from previously trusted nodes that are compromised by malware, while DoS  VMs, although more pronounced within the context of a public cloud, represents a  Develop models, methodologies and architectures for decen- tralized dynamic management of security 

A Survey on Security Issues in Cloud Computing
free download

 Better access control and identity management: As cloud  With applications lying in a cloud, it is possible for the hackers to corrupt an application and gain access to  In order to avoid these, strong virus- scanning and malware protection software need to be installed to avoid any 

Intensification of educational cloud computing and crisis of data security in public clouds
free download

 It must help the institution to protect itself from spam and malware, encrypt data to  and S. Farrell, 1999, Internet X.509 Public Key Infrastructure: Certificate Management rotocols, RFC  M Paone

Heuristics-Based Query Processing for Large RDF Graphs Using Cloud Computing
free download

Page 1. Heuristics-Based Query Processing for Large RDF Graphs Using Cloud Computing  Index Terms-Hadoop, RDF, SPARQL, MapReduce. 1 INTRODUCTION CLOUD computing is an emerging paradigm in the IT and data processing communities. 


FREE ENGINEERING RESEARCH PAPERS