A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Emad El-Dein, R.
- Content Auditing in the Cloud Environment
Authors
1 Department Computer Science, Minia University, EG
2 Department Computer Science, Cairo University, EG
Source
Data Mining and Knowledge Engineering, Vol 8, No 10 (2016), Pagination: 311-317Abstract
Cloud computing is a new computing paradigm that enables organizations and users to store data in a highly available space of different shared applications and services, instead of storing and managing their data on the company's local server. There are some challenges that face cloud users when they use cloud storage services like inability of accessing their data physically, so if the user doesn't know the Cloud Service Provider (CSP), malicious activity on untrusted servers can alter or destroy their data and applications. As a conclusion content auditing, must be a requirement, a scheduled check for data is done as a correction purpose and this method is called data integrity. This paper proposed a model that provides content auditing of cloud user data which can be personal data or web pages by periodically checks data integrity by using keyed hashing algorithms and check trustiness of Cloud Service Provider, finally ensure the fast recovery of data.
Keywords
Auditing, Cloud Computing, Cloud Storage, Cloud Service Provider (CSP), Content Auditing, Data Integrity, Keyed Hashing Algorithms.- Cloud Malware and Malware Detection Survey
Authors
1 Department of Computer Science, Minia University, EG
2 Department of Computer Science, Cairo University, EG
Source
Data Mining and Knowledge Engineering, Vol 9, No 3 (2017), Pagination: 56-61Abstract
Malware affects computing systems like cloud systems through its malicious actions towards confidentiality, availability, and integrity of system resources and services. Because of the deployment of Cloud Computing environment is increasingly common, and we are implicitly reliant on them for many services as it offers cost-saving service for Cloud user. So, it is important to take care of Cloud Security.
In this paper, we investigate a survey on malware types that may exploit Cloud Computing systems; in the next sections, different aspects of malware detection techniques and types are discussed and how these malware detection systems fit into the cloud computing system architecture. Finally, a comparison between malware detection sensors is provided through many points like modeling techniques, main components, scalability, open source availability, and a risk analysis for those detection systems.