Доклады БГУИР

Расширенный поиск


Полный текст:


Providing effective security mechanisms is an important requirement to any secure cloud solution. In this sense, it's proposed to use a hybrid approach to cloud security that includes both warning and detection mechanisms in order to minimize the possibility of a successful attack. According to that proposal, the customized attribute-based encryption (ABE) is a comprehensive access control solution for cloud storage services including user accountability and key revocation. The authors apply state-of-the-art signal processing techniques in order to detect the malicious activities and Man-in-the-Cloud (MITC) attacks in the cloud environment.

Об авторах

T. Galibus
Belarusian State University

V. Krasnoproshin
Belarusian State University

P. Thiago
University of Brasilia

T. Rafael
University of Brasilia

P. João
University of Brasilia

P. Edison
Federal University of Rio Grande do Sul

Z. Anton
Byelex Multimedia Products BV Argon 1

H. Vissia
Byelex Multimedia Products BV Argon 1

Список литературы

1. Galibus T., Vissia H. Cloud Storage Security // Proceedings of NSCE’2014. Hong Cong, 24-25 December 2014. P. 123-127.

2. Imperva: Hacker Intelligence Initiative Report - Man in the Cloud (MITC) Attacks. [Electronic source]. Access mode: - Access date: 28.11.2015.

3. Lu W., Ghorbani A.A. Network anomaly detection based on wavelet analysis // EURASIP J. Adv. Signal Process. 2009, Vol. 4(1416 ). P. 1-17.

4. Tenorio D.F., da Costa J.P.C., de Sousa Jr R. // Proceedings of the International Conference on Forensic Computer Science (ICoFCS). Brasilia, 14-16 August 2013. P. 46-51.

5. Galibus T.V., Vissija H.E.R.M. // Informatizacija obrazovanija. 2014. № 4. P. 43-48.

6. Katz J., Ostrovsky R., Yung M. Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords // LNCS. 2001. Vol. 2045. P. 475-494.

7. Huang C.-T., Chang R.K.C., Huang P. Editorial: Signal processing applications in network intrusion detection systems // EURASIP J. Adv. Signal Process. 2009. Vol. 9 (192). P. 1-4.

8. Mudzingwa D., Agrawal R. A study of methodologies used in intrusion detection and prevention systems (idps) // Proceedings of IEEE Southeastcon, 2012. Orlando, 15-18 March 2012. P. 1-6.


Для цитирования:

., ., ., ., ., ., ., . . Доклады БГУИР. 2016;(3):69-74.

For citation:

Galibus T..., Krasnoproshin V..., Thiago P.V., Rafael T.D., João P.C., Edison P.D., Anton Z., Vissia H.E. ORGANIZATION OF PROTECTION MECHANISMS FOR CLOUD STORAGE SERVICES. Doklady BGUIR. 2016;(3):69-74. (In Russ.)

Просмотров: 173

Creative Commons License
Контент доступен под лицензией Creative Commons Attribution 4.0 License.

ISSN 1729-7648 (Print)
ISSN 2708-0382 (Online)