62
Views
7
CrossRef citations to date
0
Altmetric
Articles

DDoS vulnerabilities analysis and mitigation model in cloud computing

&

References

  • Khan, Nabeel , and Adil Al-Yasiri . “Cloud security threats and techniques to strengthen cloud computing adoption framework.” In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, pp. 268-285. IGI Global, 2018.
  • Dsouza, Glynis , Gabriel Rodriguez , Youssif Al-Nashif , and Salim Hariri . “Building resilient cloud services using DDDAS and moving target defence.” International Journal of Cloud Computing 12, no. 2-3 (2013): 171-190. doi: 10.1504/IJCC.2013.055266
  • Zissis, Dimitrios , and DimitriosLekkas. “Addressing cloud computing security issues.” Future Generation computer systems 28, no. 3 (2012): 583-592. doi: 10.1016/j.future.2010.12.006
  • Balusamy, Balamurugan , and P. Venkata Krishna . “Collective advancements on access control scheme for multi-authority cloud storage system.” International Journal of Grid and Utility Computing 6, no. 3-4 (2015): 133-142. doi: 10.1504/IJGUC.2015.070675
  • Wang, Xiaowei. “Application of logo standardization design system based on cloud service.” Journal of Discrete Mathematical Sciences and Cryptography 21.2 (2018): 245-250. doi: 10.1080/09720529.2018.1449293
  • Hashizume, Keiko , David G. Rosado , Eduardo Fernández-Medina , and Eduardo B. Fernandez . “An analysis of security issues for cloud computing.” Journal of internet services and applications 4, no. 1 (2013): 5. doi: 10.1186/1869-0238-4-5
  • Tong, Jian-Fei. “User clustering based on Canopy+ K-means algorithm in cloud computing.” Journal of Interdisciplinary Mathematics 20.6-7 (2017): 1489-1492. doi: 10.1080/09720502.2017.1386476
  • Alsolami, Eesa. “Security threats and legal issues related to Cloud based solutions.” International Journal of Computer Sc and Network Security 18, 2018: 156-163.
  • National Vulnerability Database. NIST. 2019. U R L: http://nvd.nist.gov/.
  • Ahmed, Asimi , and Tbatou Zakariae . “IaaS Cloud Model Security Issues on Behalf Cloud Provider and User Security Behaviors.” Procedia computer science 134 (2018): 328-333. doi: 10.1016/j.procs.2018.07.180
  • Malik, Vinita , and Sukhdip Singh . “Security risk management in IoT environment.” Journal of Discrete Mathematical Sciences and Cryptography 22.4 (2019): 697-709. doi: 10.1080/09720529.2019.1642628
  • Ren, Kui , Cong Wang , and Qian Wang . “Security challenges for the public cloud.” IEEE Internet Computing 16, no. 1 (2012): 69-73. doi: 10.1109/MIC.2012.14
  • Tbatou, Zakariae , et al. “Kerberos V5: Vulnerabilities and perspectives.” 2015 Third World Conference on Complex Systems (WCCS). IEEE, 2015.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.