Preview

Doklady BGUIR

Advanced search

ORGANIZATION OF PROTECTION MECHANISMS FOR CLOUD STORAGE SERVICES

Abstract

Providing effective security mechanisms is an important requirement to any secure cloud solution. In this sense, it's proposed to use a hybrid approach to cloud security that includes both warning and detection mechanisms in order to minimize the possibility of a successful attack. According to that proposal, the customized attribute-based encryption (ABE) is a comprehensive access control solution for cloud storage services including user accountability and key revocation. The authors apply state-of-the-art signal processing techniques in order to detect the malicious activities and Man-in-the-Cloud (MITC) attacks in the cloud environment.

About the Authors

T. .. Galibus
Belarusian State University
Belarus


V. .. Krasnoproshin
Belarusian State University
Belarus


P. V. Thiago
University of Brasilia
Belarus


T. DE. Rafael
University of Brasilia
Belarus


P. C. João
University of Brasilia
Belarus


P. DE. Edison
Federal University of Rio Grande do Sul
Belarus


Z. Anton
Byelex Multimedia Products BV Argon 1
Belarus


H. E. Vissia
Byelex Multimedia Products BV Argon 1
Belarus


References

1. Galibus T., Vissia H. Cloud Storage Security // Proceedings of NSCE’2014. Hong Cong, 24-25 December 2014. P. 123-127.

2. Imperva: Hacker Intelligence Initiative Report - Man in the Cloud (MITC) Attacks. [Electronic source]. Access mode: https://www.imperva.com/docs/HII_Man_In_The_Cloud_Attacks.pdf. - Access date: 28.11.2015.

3. Lu W., Ghorbani A.A. Network anomaly detection based on wavelet analysis // EURASIP J. Adv. Signal Process. 2009, Vol. 4(1416 ). P. 1-17.

4. Tenorio D.F., da Costa J.P.C., de Sousa Jr R. // Proceedings of the International Conference on Forensic Computer Science (ICoFCS). Brasilia, 14-16 August 2013. P. 46-51.

5. Galibus T.V., Vissija H.E.R.M. // Informatizacija obrazovanija. 2014. № 4. P. 43-48.

6. Katz J., Ostrovsky R., Yung M. Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords // LNCS. 2001. Vol. 2045. P. 475-494.

7. Huang C.-T., Chang R.K.C., Huang P. Editorial: Signal processing applications in network intrusion detection systems // EURASIP J. Adv. Signal Process. 2009. Vol. 9 (192). P. 1-4.

8. Mudzingwa D., Agrawal R. A study of methodologies used in intrusion detection and prevention systems (idps) // Proceedings of IEEE Southeastcon, 2012. Orlando, 15-18 March 2012. P. 1-6.


Review

For citations:


Galibus T..., Krasnoproshin V..., Thiago P.V., Rafael T.D., João P.C., Edison P.D., Anton Z., Vissia H.E. ORGANIZATION OF PROTECTION MECHANISMS FOR CLOUD STORAGE SERVICES. Doklady BGUIR. 2016;(3):69-74. (In Russ.)

Views: 332


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1729-7648 (Print)
ISSN 2708-0382 (Online)