Facial reconstruction

Search LJMU Research Online

Browse Repository | Browse E-Theses

An elastic scaling method for cloud security

Mac Dermott, AM and Shi, Q and Kifayat, K (2014) An elastic scaling method for cloud security. The Journal of Internet Technology and Secured Transactions (JITST), 3 (2). pp. 254-262. ISSN 2046-3723

[img] Text
JITST Journal Aine MacDermott LJMU.pdf - Published Version

Download (305kB)

Abstract

Cloud computing is being adopted in critical sectors such as transport, energy and finance. This makes cloud computing services critical in themselves. When cyber attacks and cyber disruptions happen, millions of users are affected. A cyber disruption in this context means a temporary or permanent loss of service, with impact on users of the cloud service who rely on its continuity. Intrusion detection and prevention methods are being developed to protect this sensitive information being stored, and the services being deployed. There needs to be an assurance that the confidentiality, integrity and availability of the data and resources are maintained. This paper presents a background to the critical infrastructure and cloud computing progression, and an overview to the cloud security conundrum. Analysis of existing intrusion detection methods is provided, in addition to our observation and proposed elastic scaling method for cloud security.

Item Type: Article
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: Computer Science
Publisher: Infonomics Society
Date Deposited: 15 Aug 2017 09:01
Last Modified: 15 Aug 2017 09:01
DOI or Identification number: 10.20533/jitst.2046.3723.2014.0033
URI: http://researchonline.ljmu.ac.uk/id/eprint/6935

Actions (login required)

View Item View Item