Preview

Доклады БГУИР

Расширенный поиск

ORGANIZATION OF PROTECTION MECHANISMS FOR CLOUD STORAGE SERVICES

Аннотация

Providing effective security mechanisms is an important requirement to any secure cloud solution. In this sense, it's proposed to use a hybrid approach to cloud security that includes both warning and detection mechanisms in order to minimize the possibility of a successful attack. According to that proposal, the customized attribute-based encryption (ABE) is a comprehensive access control solution for cloud storage services including user accountability and key revocation. The authors apply state-of-the-art signal processing techniques in order to detect the malicious activities and Man-in-the-Cloud (MITC) attacks in the cloud environment.

Об авторах

T. Galibus
Belarusian State University
Беларусь


V. Krasnoproshin
Belarusian State University
Беларусь


P. Thiago
University of Brasilia
Беларусь


T. Rafael
University of Brasilia
Беларусь


P. João
University of Brasilia
Беларусь


P. Edison
Federal University of Rio Grande do Sul
Беларусь


Z. Anton
Byelex Multimedia Products BV Argon 1
Беларусь


H. Vissia
Byelex Multimedia Products BV Argon 1
Беларусь


Список литературы

1. Galibus T., Vissia H. Cloud Storage Security // Proceedings of NSCE’2014. Hong Cong, 24-25 December 2014. P. 123-127.

2. Imperva: Hacker Intelligence Initiative Report - Man in the Cloud (MITC) Attacks. [Electronic source]. Access mode: https://www.imperva.com/docs/HII_Man_In_The_Cloud_Attacks.pdf. - Access date: 28.11.2015.

3. Lu W., Ghorbani A.A. Network anomaly detection based on wavelet analysis // EURASIP J. Adv. Signal Process. 2009, Vol. 4(1416 ). P. 1-17.

4. Tenorio D.F., da Costa J.P.C., de Sousa Jr R. // Proceedings of the International Conference on Forensic Computer Science (ICoFCS). Brasilia, 14-16 August 2013. P. 46-51.

5. Galibus T.V., Vissija H.E.R.M. // Informatizacija obrazovanija. 2014. № 4. P. 43-48.

6. Katz J., Ostrovsky R., Yung M. Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords // LNCS. 2001. Vol. 2045. P. 475-494.

7. Huang C.-T., Chang R.K.C., Huang P. Editorial: Signal processing applications in network intrusion detection systems // EURASIP J. Adv. Signal Process. 2009. Vol. 9 (192). P. 1-4.

8. Mudzingwa D., Agrawal R. A study of methodologies used in intrusion detection and prevention systems (idps) // Proceedings of IEEE Southeastcon, 2012. Orlando, 15-18 March 2012. P. 1-6.


Рецензия

Для цитирования:


, , , , , , , . Доклады БГУИР. 2016;(3):69-74.

For citation:


Galibus T..., Krasnoproshin V..., Thiago P.V., Rafael T.D., João P.C., Edison P.D., Anton Z., Vissia H.E. ORGANIZATION OF PROTECTION MECHANISMS FOR CLOUD STORAGE SERVICES. Doklady BGUIR. 2016;(3):69-74. (In Russ.)

Просмотров: 260


Creative Commons License
Контент доступен под лицензией Creative Commons Attribution 4.0 License.


ISSN 1729-7648 (Print)
ISSN 2708-0382 (Online)