[1] |
P. Mell, and T. Grance, .(2011, Sept.). The NIST definition of cloud computing [Online]. Available:
|
[2] |
Cisco. ( 2016. Cisco global cloud index: forecast and methodology, 2015-2020 [online]. Available:
|
[3] |
R. Ko, S. Lee, V. Rajan . ( 2013, Mar.). Cloud computing vulnerability incidents: a statistical overview [Online]. Available: . March
|
[4] |
Symantec. ( 2015). Internet security threat report [Online]. Available:
|
[5] |
W. Lin and D. Lee, “Traceback attacks in cloud—pebbletrace botnet,” in IEEE International Conference on Distributed Computing Systems Workshops, 2014, pp. 417-426.
|
[6] |
A. Web, S. Overview, S. P. May . ( 2009, Jun.). Amazon web services: overview of security processes [Online]. Available: . pdf
|
[7] |
N. Kaaniche, and M. Laurent, “A secure client side deduplication scheme in cloud storage environments,” in 6th International Conference on New Technologies, Mobility and Security , Dubai, United Arab Emirates, 2014, pp. 1-7. doi: 10.1109/NTMS.2014.6814002.
|
[8] |
R. Sanchez, F. Almenares, P. Arias , et al., “Enhancing privacy and dynamic federation in IdM for consumer cloud computing,” IEEE Transactions on Consumer Electronics, vol. 58, no. 58, pp. 95-103, 2012.
|
[9] |
J. Wei, X. Zhang, G. Ammons , et al., “Managing security of virtual machine images in a cloud environment,” in ACM Cloud Computing Security Workshop, 2009, pp. 91-96.
|
[10] |
Y. Zhang, A. Juels, M. K. Reiter , et al., “Cross-VM side channels and their use to extract private keys,” in ACM Conference on Computer and Communications Security, Chicago,USA, 2012, pp. 91-96. doi: 10.1145/1655008.1655021.
|
[11] |
F. Zhou, M. Goel, P. Desnoyers , et al., “Scheduler vulnerabilities and coordinated attacks in cloud computing,” in IEEE International Symposium on Network Computing and Applications, Cambridge,USA, 2011, pp. 123-130. doi: 10.1109/NCA.2011.24.
|
[12] |
Q. Wang, C. Wang, J. Li , et al., “Enabling public verifiability and data dynamics for storage security in cloud computing,” in 14th European Conference on Research in Computer Security, Saint-Malo,France, 2009, pp. 335-370.
|
[13] |
J. Sen , “Security and privacy issues in cloud computing,” in Architectures and Protocols for Secure Information Technology Infrastructures, Hershey, USA: IGI Global, 2013.
|
[14] |
Y. Zhang, A. Juels, M. K. Reiter , et al., “Cross-tenant side-channel attacks in PaaS clouds,” in ACM SIGSAC Conference on Computer and Communications Security, Scottsdale,USA, 2014, pp. 990-1003. doi: 10.1145/2660267.2660356.
|
[15] |
N. Gruschka and L . L. Iacono, “Vulnerable cloud: SOAP message security validation revisited,” in IEEE International Conference on Web Services, Los Angeles, USA, 2009, pp. 625-631. doi: 10.1109/ICWS.2009.70.
|
[16] |
R. Sailer, E. Valdez, T. Jaeger , “sHype: secure hypervisor approach to trusted virtualized systems, ” IBM, Yorktown Heights, USA, Research Report RC23511, 2005.
|
[17] |
J. Wei, X. Zhang, G. Ammons , et al., “Managing security of virtual machine images in a cloud environment,” in ACM Workshop on Cloud Computing Security, Chicago, USA, 2009, pp. 91-96. doi: 10.1145/1655008.1655021.
|
[18] |
K. Eguro and R. Venkatesan , “FPGAs for trusted cloud computing,” in IEEE International Conference on Field Programmable Logic and Applications (FPL), Oslo, Norway, 2012 , pp. 63-70.
|
[19] |
A. R. Sadeghi, T. Schneider, M. Winandy , “Token-based cloud computing: secure outsourcing of data and arbitrary computations with lower latency,” in International Conference on Trust and Trustworthy Computing, Berlin, Germany, 2010, pp. 417-429.
|
[20] |
J. Tang , “Ensuring security and privacy preservation for cloud data services,” ACM Computing Surveys (CSUR), vol. 49, no. 1, article 13, Jul. 2016. doi: 10.1145/2906153.
|
[21] |
C. Wang, K. Ren, W. Lou , et al., “Toward publicly auditable secure cloud data storage services,” IEEE Network , vol. 24, no. 4, pp.. 19-24, Jul./Aug. 2010.
|
[22] |
M. Jensen, S. Schäge, J. Schwenk , “Towards an anonymous access control and accountability scheme for cloud computing,” in IEEE International Conference on Cloud Computing, Miami,USA, 2010, pp. 540-541. doi: 10.1109/CLOUD.2010.61.
|
[23] |
K. D. Bowers, A. Juels, A. Oprea , “Proofs of retrievability: theory and implementation,” in ACM Workshop on Cloud Computing Security, Chicago,USA, 2009, pp. 43-54. doi: 10.1145/1655008.1655015.
|
[24] |
L. Yan, C. Rong, G. Zhao , “Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography,” in International Conference on Cloud Computing, Bangalore, India, 2009, pp. 167-177 .
|
[25] |
S. Yu, C. Wang, K. Ren , et al., “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in Proc. IEEE INFOCOM, San Diego,USA, 2010, pp. 534-542. doi: 10.1109/INFCOM.2010.5462174.
|
[26] |
H. Zhou, C. Wu, M. Jiang , et al., “Evolving defense mechanism for future network security,” IEEE Communications Magazine, vol. 53, no. 4, pp. 45-51, 2015. doi: 10.1109/MCOM.2015.7081074.
|
[27] |
S. Lins, P. Grochol, S. Schneider , et al., “Dynamic certification of cloud services: trust, but verify,” IEEE Security & Privacy Magazine, vol. 14, no. 2, pp. 66-71, 2016. doi: 10.1109/MSP.2016.26.
|
[28] |
Open Networking Foundation . ( 2012, Apr. 13). Software-defined networking: the new norm for networks [Online]. Available: . pdf
|