You are on page 1of 1

(IJACSA) International Journal of Advanced Computer Science and Applications,

Vol. 7, No. 9, 2016

decision making. It is expected that there will be several Pervasive Systems, Algorithms, and Networks, Kaohsiung, 2009; 763–
challenges related to operation and development of cloud 767. DOI: 10.1109/I-SPAN.2009.157
computing system. The use of data mining techniques in cloud [21] Dahbur K, et al. A survey of risks, threats and vulnerabilities in cloud
computing. In Proceedings of the 2011 International Conference on
computing will be an effective tool that will help in securing Intelligent Semantic Web-Services and Applications, ISWSA ’11, ACM,
the data. New York, USA, 2011; 12.
REFERENCE [22] Wang C, et al. Ensuring Data Storage Security in Cloud Computing.
Publisher IEEE, 17th International Workshop on Quality of Service,
[1] Schubert L, Jeffery K, et al. The future for cloud computing:
2009. IWQoS, Charleston, SC, 2009; 1–9.
opportunities for European cloud computing beyond 2010. Expert Group
report, public version 2010; 1. http://cordis. [23] Yan L, et al. Strengthen cloud computing security with federal identity
europa.eu/fp7/ict/ssai/docs/cloud-report-final.pdf management using hierarchical identity-based cryptography. Cloud
Computing 2009; 5931: 167–177. DOI: 10.1007/978-3-642-10665-1_15
[2] Khorshed MT, et al. Trust issues that create threats for cyber attacks in
cloud computing. In Proceedings of IEEE ICPADS, December 7–9, 2011, [24] Ristenpart T, et al. Hey, you, get off of my cloud: exploring information
Tainan, Taiwan, 2011. leakage in third-party compute clouds. In Proceedings of the 16th ACM
conference on Computer and communications security Chicago, Illinois,
[3] Armbrust M, et al. Above the clouds: a Berkeley view of cloud
USA, November 09–13, 2009; 199–212.
computing. EECS Department, University of California, Berkeley, Tech.
Rep. UCB/EECS-2009- 28, 2009. [25] Chonka A, et al. Cloud security defence to protect cloud computing
against HTTP-DoS and XML-DoS attacks. Journal of Network and
[4] Brunette G, Mogull R. Security Guidance for critical areas of focus in
Computer Applications 2010. DOI: 10.1016/j.jnca.2010.06.004
Cloud Computing V2. 1. CSA (CloudSecurity Alliance), USA.
Disponible en: https://cloud securityalliance.org/csaguide.pdf, vol. 1, [26] Danchev D. (2011, 31 May 2011). Dancho Danchev’s Blog—Mind
2009. Streams of Information Security Knowledge. Available:
http://ddanchev.blogspot.com/
[5] Catteddu D, Hogben G. Benefits, risks and recommendations for
information security. European Network and Information Security [27] Grossman J. (2011, 19 June 2011). Jeremiah Grossman. Available:
Agency (ENISA), 2009. http://jeremiahgrossman.blogspot.com/
[6] Mell P, Grance T. The NIST definition of cloud computing. National [28] Company H.-P. D. HP ProLiant DL380 G4 server - specifications, 2012.
Institute of Standards and Technology 2009; 53(6): 50. Available: http://h18000.www1.
http://csrc.nist.gov/publications/nistpubs/ 800-145/SP800-145.pdf hp.com/products/servers/proliantdl380/specifications-g4. html (Retrieved:
6th August 2012).
[7] Khorshed MT, et al.Monitoring insiders activities in cloud computing
using rule based learning. In Proceedings of IEEE TrustCom-11, Nov. [29] Knorr, E., & Gruman, G. (2009). What cloud computing really means.
16–18, Changsha, China, 2011. Retrieved from http://www.infoworld.com/d/cloud-computing/what-
cloud-computing-really-means-031
[8] Khorshed MT, et al. A survey on gaps, threat remediation challenges and
some thoughts for proactive attack detection in cloud computing. Future [30] Corporation M. Windows 7, 2012. Available: http://windows.
Generation Computer Systems 2012. microsoft.com/en-au/windows7/products/home (Retrieved: 6th August
2012).
[9] NIST. (2011, 21 May 2011). NIST Cloud Computing Program.
Available: http://www.nist.gov/itl/cloud/ [31] McDowell M. (2009, 21 June, 2011). Understanding Denial-of-Service
Attacks. Available: http://www.uscert. gov/cas/tips/ST04-015.html
[10] Ness G. (2009, 22 May 2011). 3 Major Barriers to Cloud Computing.
Available: http://www.infra20. com/post.cfm/3-major-barriers-to-cloud- [32] John GH, Langley P. Estimating continuous distributions in Bayesian
computing classifiers. In Eleventh Conference on Uncertainty in Artificial
Intelligence, San Mateo, 1995; 338–345.
[11] Vouk, M.A., "Engineering of Telecommunications Software", High-
Speed ... Journal of Computing and Information Technology, Vol 16 (4), [33] Lopez R, Onate E. A variational formulation for the multilayer
2008, pp 235-246. perceptron. Artificial Neural Networks–ICANN 2006 2006; 4131: 159–
168. DOI: 10.1007/11840817_17
[12] Brodkin J. Gartner: seven cloud-computing security risks, 2008.
Available: http://www.infoworld.com/d/ security-central/gartner-seven- [34] Platt JC. Fast training of support vector machines using sequential
cloud-computing-security risks- 853 (Retrieved: 6th August 2012). minimal optimization. 1999; 185–208.
[13] Archer J, Boehm A. Security guidance for critical areas of focus in cloud [35] Quinlan JR. C4. 5: Programs for Machine Learning. Morgan Kaufmann:
computing. Cloud Security Alliance 2009. Available: San Mateo, CA, 1993.
https://cloudsecurityalliance.org/ guidance/csaguide.v1.0.pdf [36] Frank E, Witten IH. Generating accurate rule sets without global
[14] Archer J, et al. (2010, 7 May 2011). Top Threats to Cloud optimization. In FifteenthInternational Conference on Machine Learning,
Computing,Version 1.0. Available:http://www.cloud 1998; 144–151.
securityalliance.org/topthreats/csathreats.v1.0.pdf [37] Witten IH, et al. Data Mining: Practical Machine Learning Tools and
[15] Monfared AT. Monitoring intrusions and security breaches in highly Techniques (3rd edn). Morgan Kaufmann: San Francisco, 2011.
distributed cloud environments. 2010. [38] Kohavi R, Provost F. Glossary of terms. Machine Learning 1998; 30:
[16] Grosse E, et al. Cloud computing roundtable. Security & Privacy, IEEE 271–274.
2010; 8: 17–23. [39] Ali ABMS, Wasimi SA. Data Mining: Methods and Techniques.
[17] Wrenn G. (2010, 25 May 2011). Unisys Secure Cloud Addressing the Thomson. 2007.
Top Threats of Cloud Computing. [40] Quinlan JR. Induction of decision trees. Machine Learning 1986; 1: 81–
Available:http://www.unisys.com/unisys/common/download.jsp?d_id=11 106.
20000970002010125&backurl=/unisys/ri/wp/detail.jsp&id=11200009700 [41] Ali ABMS, Smith KA. On learning algorithm selection for classification.
02010125 Journal on Applied Soft Computing, Elsevier 2006; 6: 119–138.
[18] Grobauer B, et al. Understanding cloud-computing vulnerabilities. IEEE [42] Shafiullah G, et al. Prospects of renewable energy—a feasibility study in
Security and Privacy 2010; 50–57. DOI: 10.1109/MSP.2010.115 the Australian context. Renewable Energy, ELSEVIER 2012; 39(1): 183–
[19] Thomas Sommer, et al. The Conundrum of Security in Modern Cloud 197.
Computing. (2012) Communications of the IIMA: Vol. 12: Iss. 4, Article [43] L.M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner. A break in
2. Available at: http://scholarworks.lib.csusb.edu/ciima/vol12/iss4/2 the clouds: towards a cloud definition, in: ACM SIGCOMM Computer
[20] Yildiz M, et al. A Layered Security Approach for Cloud Computing Communication Review, 2008.p.50-55.
Infrastructure. Publisher IEEE, 2009 10th International Symposium on

158 | P a g e
www.ijacsa.thesai.org

You might also like