Mac Dermott, AM, Shi, Q and Kifayat, K (2014) An elastic scaling method for cloud security. The Journal of Internet Technology and Secured Transactions (JITST), 3 (2). pp. 254-262. ISSN 2046-3723
|
Text
JITST Journal Aine MacDermott LJMU.pdf - Published Version Download (305kB) | Preview |
Abstract
Cloud computing is being adopted in critical sectors such as transport, energy and finance. This makes cloud computing services critical in themselves. When cyber attacks and cyber disruptions happen, millions of users are affected. A cyber disruption in this context means a temporary or permanent loss of service, with impact on users of the cloud service who rely on its continuity. Intrusion detection and prevention methods are being developed to protect this sensitive information being stored, and the services being deployed. There needs to be an assurance that the confidentiality, integrity and availability of the data and resources are maintained. This paper presents a background to the critical infrastructure and cloud computing progression, and an overview to the cloud security conundrum. Analysis of existing intrusion detection methods is provided, in addition to our observation and proposed elastic scaling method for cloud security.
Item Type: | Article |
---|---|
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | Computer Science & Mathematics |
Publisher: | Infonomics Society |
Date Deposited: | 15 Aug 2017 09:01 |
Last Modified: | 04 Sep 2021 11:18 |
DOI or ID number: | 10.20533/jitst.2046.3723.2014.0033 |
URI: | https://researchonline.ljmu.ac.uk/id/eprint/6935 |
View Item |