Skip to main content

Recent Advancements in Cloud Security using Performance Technologies and Techniques

As cloud computing is used more widely throughout society, cloud service providers and cloud service consumers are obliged to ensure that privacy and security safety measure are in place using advance technologies and techniques. Cybersecurity, though, is not completely secure, so when an incident occurs, digital exploration will necessitate identifying, analyzing and archiving the digital evidence. The purpose of this special issue is to identify the latest techniques that allow Cloud-based security mechanisms to be engineered and applied. This will provide a unique opportunity to integrate theoretical fundamentals along with practical positioning of security approaches to increase the level of security in Cloud systems for both cloud consumers and providers, assisting the cloud consumers to increase their trust in Cloud providers and equally for service providers of Cloud to deliver greater assurances to cloud consumers about the security of their data and the services they offer. Cloud-based schemes have seen significant investment in performance engineering, with both practical tools and research-based that permit auto scaling, methods for backing up Service Level Agreement established on adaptation and resource provisioning and in recent times designed to support energy management in data centers of all sizes. This special issue will focus on discovering how similar engineering principles can be applied to security, and more prominently, regardless the knowledge from performance engineering group can be transferred into the security area. The authors are encouraged to explore novel applications of performance engineering tools that may be repurposed for security management in their papers.

Topics of interest include (not limited to):

  • Research and production honeypots in cloud
  • System for detecting and preventing intrusions in the cloud
  • Technologies and implementations relating to cloud forensics and anti-forensics
  • Enhanced security and privacy in cloud
  • Application of key management and cryptographic strategies in cloud
  • Analyzing log data in real-time to generate alerts
  • Confidentiality in cloud
  • Disseminated authentication and authorization
  • Security provisioning in Multi cloud environment
  • Collecting evidence remotely from cloud servers
  • Service Level Agreements focused security


Guest Editors: 

CELESTINE IWENDI is a visiting Professor with Coal City University Enugu, Nigeria and Associate Professor (Senior Lecturer) with the School of Creative Technologies, University of Bolton, United Kingdom. He is also a Fellow of the Higher Education Academy, United Kingdom and a Fellow of the Institute of Management Consultants. Other assignments include Adjunct Professor Delta State Polytechnic, Nigeria. His past assignments include Associate Professor, Bangor College China, Senior Researcher, WSN Consults Ltd United Kingdom, Electronics and Sensor Researcher, University of Aberdeen, United Kingdom, Lead Electronics Engineer, Inscentinel Ltd United Kingdom, Electronics Engineer, Nitel Nigeria and College Lecturer, Federal Girls Technical College, Uyo, Nigeria. He received his PhD in Electronics from University of Aberdeen, United Kingdom, MSc from Uppsala University, Sweden, MSc from Nnamdi Azikiwe Nigeria and BSc from Nnamdi Azikiwe University, Nigeria

He is supervising/co-supervising several graduate (MS and Ph.D.) students and a mentor to ACM student members at SAGE University Indore, Indian. His research interests include artificial intelligence, internet of things, wireless sensor networks, network/cybersecurity, machine learning, data networks, etc. He has authored over 60 peer-reviewed articles. He has served as a chair (program, publicity, and track) on top conferences and workshops. He has delivered over 25 invited and keynote talks in five countries. He is a Distinguished Speaker, ACM; Senior Member of IEEE; Member, ACM; Member, IEEE Computational Intelligence Society; Senior Member, Swedish Engineers; Member, Nigeria Society of Engineers; Member, Smart Cities Community, IEEE; Member. He is currently serving as the Newsletter Editor, and a Board Member IEEE Sweden section. He is student branch counselor and mentoring several PhD students in Ai, robotics, internet of things and blockchain. He has developed operational, maintenance, and testing procedures for electronic products, components, equipment, and systems; provided technical support and instruction to several organisations. He is a community developer, philanthropist and an International speaker in many top conferences and webinar.

Dr. Celestine Iwendi
Associate Professor (Senior Lecturer), 
University of Bolton, United Kingdom.
Email: c.iwendi@bolton.ac.uk, celestine.iwendi@ieee.org
Google Scholar


Prof., Dr. techn. Natalia Kryvinska is a Full Professor and a Head of Information Systems Department, at the Faculty of Management, Comenius University in Bratislava, Slovakia. Previously, she served as a University Lecturer and a Senior Researcher at the eBusiness Department, University of Vienna’s School of Business Economics and Statistics. She received her PhD in Electrical & IT Engineering from the Vienna University of Technology in Austria, and a Docent title (Habilitation) in Management Information Systems, from the Comenius University in Bratislava, Slovakia. She got her Professor title and was appointed for the professorship by the President of Slovak Republic. Her research interests include Complex Service Systems Engineering, Service Analytics, and Applied Mathematics. 

Prof. Dr. Natalia Kryvinska
Head of Information Systems Department
Faculty of Management
Comenius University in Bratislava
Odbojárov 10, 82005 Bratislava 25, Slovakia
Email: natalia.kryvinska@uniba.sk 
Google Scholar
Orcid
Publons
Scopus


Prof. Irfan Awan is a Professor of Computer Science at the University of Bradford. He received his PhD degree in Performance Modelling of Communication Networks from the University of Bradford, UK in 1997. His research focuses on Network Security, Cyber Security, Performance Modeling of Cloud and Communication Networks. His research work won Best Paper Awards from 24th IEEE AINA 2010, Australia and 8th BWCCA 2013, France. His research work has been published in IEEE Transactions, IEE Proceedings, IEEE Computer Magazine, among others. He is a member of editorial board of the Elsevier journal of Simulation, Modeling and Practice and served as a guest editor for various special issues. Professor Awan organised and chaired several international conference and workshops and edited proceedings. He has successfully supervised 40 PhD students. Professor Awan is a fellow of HEA, fellow of BCS and member IEEE.

Professor Irfan-Ullah Awan
Professor of Computer Science
Department of Computer Science
Faculty of Engineering and Informatics
University of Bradford 
Bradford, West Yorkshire, BD7 1DP, UK
Email: I.U.Awan@bradford.ac.uk

Tentative Timeline for this Special Issue:

  • Submission Deadline: 15-09-2022
  • Notification to Author: 10-11-2022
  • Revised Version Submission: 05-12-2022
  • Final Acceptance: 28-12-2022
     


  1. Numerous users are experiencing unsafe communications due to the growth of big network mediums, where no node communication is detected in emergency scenarios. Many people find it difficult to communicate in e...

    Authors: Tao Hai, Jincheng Zhou, Ye Lu, Dayang N. A. Jawawi, Dan Wang, Shitharth Selvarajan, Hariprasath Manoharan and Ebuka Ibeke
    Citation: Journal of Cloud Computing 2023 12:73
  2. Cloud Mobile Ad-hoc Networks (Cloud-MANETs) is a framework that can access and deliver cloud services to MANET users through their smart devices. MANETs is a pool of self-organized mobile gadgets that can comm...

    Authors: Tao Hai, Jincheng Zhou, Ye Lu, Dayang Jawawi, Dan Wang, Edeh Michael Onyema and Cresantus Biamba
    Citation: Journal of Cloud Computing 2023 12:68
  3. Cloud computing is an extremely important infrastructure used to perform tasks over processing units. Despite its numerous benefits, a cloud platform has several challenges preventing it from carrying out an e...

    Authors: Tao Hai, Jincheng Zhou, Dayang Jawawi, Dan Wang, Uzoma Oduah, Cresantus Biamba and Sanjiv Kumar Jain
    Citation: Journal of Cloud Computing 2023 12:15
  4. There is an increase in cyberattacks directed at the network behind firewalls. An all-inclusive approach is proposed in this assessment to deal with the problem of identifying new, complicated threats and the ...

    Authors: Surjeet Dalal, Poongodi Manoharan, Umesh Kumar Lilhore, Bijeta Seth, Deema Mohammed alsekait, Sarita Simaiya, Mounir Hamdi and Kaamran Raahemifar
    Citation: Journal of Cloud Computing 2023 12:14

    The Correction to this article has been published in Journal of Cloud Computing 2023 12:166

  5. Big Data applications require extensive resources and environments to store, process and analyze this colossal collection of data in a distributed manner. Containerization with cloud computing provides a perti...

    Authors: Neelam Singh, Yasir Hamid, Sapna Juneja, Gautam Srivastava, Gaurav Dhiman, Thippa Reddy Gadekallu and Mohd Asif Shah
    Citation: Journal of Cloud Computing 2023 12:4
  6. Allocating resources is crucial in large-scale distributed computing, as networks of computers tackle difficult optimization problems. Within the scope of this discussion, the objective of resource allocation ...

    Authors: Moses Ashawa, Oyakhire Douglas, Jude Osamor and Riley Jackie
    Citation: Journal of Cloud Computing 2022 11:87
  7. Violence has remained a momentous problem since time immemorial. Various scientific studies are conducted in the recent past to identify the stimuli causing violent behavior among the masses and to achieve the...

    Authors: Mohammad Saif Wajid, Hugo Terashima-Marin, Peyman Najafirad Paul Rad and Mohd Anas Wajid
    Citation: Journal of Cloud Computing 2022 11:85

    The Correction to this article has been published in Journal of Cloud Computing 2022 11:100

  8. Because of the existence of Covid-19 and its variants, health monitoring systems have become mandatory, particularly for critical patients such as neonates. However, the massive volume of real-time data genera...

    Authors: Abeera Ilyas, Mohammed Naif Alatawi, Yasir Hamid, Saeed Mahfooz, Islam Zada, Neelam Gohar and Mohd Asif Shah
    Citation: Journal of Cloud Computing 2022 11:84
  9. At both clinical and diagnostic levels, machine learning technologies could help facilitate medical decision-making. Prediction of sports injuries, for instance, is a key component of avoiding and minimizing i...

    Authors: Xiaoe Wu, Jincheng Zhou, Maoxing Zheng, Shanwei Chen, Dan Wang, Joseph Anajemba, Guangnan Zhang, Maha Abdelhaq, Raed Alsaqour and Mueen Uddin
    Citation: Journal of Cloud Computing 2022 11:82
  10. The rapid advancement of computation techniques and cloud computing has led to substantial advancements in Cyber-Physical Systems (CPS), particularly in the field of health care. There are a variety of ways in...

    Authors: R. Priyadarshini, Abdul Quadir Md, N. Rajendran, V. Neelanarayanan and H. Sabireen
    Citation: Journal of Cloud Computing 2022 11:64
  11. With the help of big data, cloud computing, artificial intelligence and other technologies, the informatization and intelligence of the wisdom medical have been gradually realized. However, with the transmissi...

    Authors: Zilong Liu, Jingbing Li, Yang Ai, Yuancai Zheng and Jing Liu
    Citation: Journal of Cloud Computing 2022 11:60
  12. With the development of cloud computing, more and more security problems like “fuzzy boundary” are exposed. To solve such problems, unsupervised anomaly detection is increasingly used in cloud security, where ...

    Authors: Xiangyu Liu, Shibing Zhu, Fan Yang and Shengjun Liang
    Citation: Journal of Cloud Computing 2022 11:58
  13. The quality assurance of higher education in China is an issue of vital international interest. To improve the international reputation of the nation’s universities, steps must be taken to ensure a sustained f...

    Authors: Ruihua Zhang, Jincheng Zhou, Tao Hai, Shixue Zhang, Marvellous Iwendi, Cresantus Biamba and Noble Anumbe
    Citation: Journal of Cloud Computing 2022 11:56
  14. In our everyday lives, we communicate with each other using several means and channels of communication, as communication is crucial in the lives of humans. Listening and speaking are the primary forms of comm...

    Authors: Jincheng Zhou, Tao Hai, Dayang N. A. Jawawi, Dan Wang, Ebuka Ibeke and Cresantus Biamba
    Citation: Journal of Cloud Computing 2022 11:51
  15. Virtual machines (VMs) are preferred by the majority of organizations due to their high performance. VMs allow for reduced overhead with multiple systems running from the same console at the same time. A physi...

    Authors: Kumaresan Perumal, Senthilkumar Mohan, Jaroslav Frnda and Parameshachari Bidare Divakarachari
    Citation: Journal of Cloud Computing 2022 11:46
  16. The rapid growth and development of financial technological advancement (Fintech) services and innovations have attracted the attention of scholars who are now on a quest to analyse their impact on the banking...

    Authors: Fang Yin, Xiaomei Jiao, Jincheng Zhou, Xiong Yin, Ebuka Ibeke, Marvellous GodsPraise Iwendi and Cresantus Biamba
    Citation: Journal of Cloud Computing 2022 11:43
  17. This article is to analyze the bottleneck problems of NoC in many more applications like multi-processor communication, computer architectures, and network interface processors. This paper aims to research the...

    Authors: Suresh Ponnan, Tikkireddi Aditya Kumar, Hemakumar VS, Sakthieswaran Natarajan and Mohd Asif Shah
    Citation: Journal of Cloud Computing 2022 11:41
  18. This study investigates the possibility of supporting tourists in a foreign land intelligently by using the Tourism Cloud Management System (TCMS) to enhance and better their tourism experience. Some technolog...

    Authors: Fang Yin, Xiong Yin, Jincheng Zhou, Xinli Zhang, Ruihua Zhang, Ebuka Ibeke, Marvellous GodsPraise Iwendi and Mohammad Shah
    Citation: Journal of Cloud Computing 2022 11:37
  19. Cloud technology is not immune to bugs and issue tracking. A dedicated system is required that will extremely error prone and less cumbersome and must command a high degree of collaboration, flexibility of ope...

    Authors: Tao Hai, Jincheng Zhou, Ning Li, Sanjiv Kumar Jain, Shweta Agrawal and Imed Ben Dhaou
    Citation: Journal of Cloud Computing 2022 11:32
  20. The Internet of things (IoT) is an important technology that is highly beneficial in establishing smart items, connections and cities. However, there are worries regarding security and privacy vulnerabilities ...

    Authors: Edeh Michael Onyema, Surjeet Dalal, Carlos Andrés Tavera Romero, Bijeta Seth, Praise Young and Mohd Anas Wajid
    Citation: Journal of Cloud Computing 2022 11:26
  21. Blockchain is the latest boon in the world which handles mainly banking and finance. The blockchain is also used in the healthcare management system for effective maintenance of electronic health and medical r...

    Authors: Tao Hai, Jincheng Zhou, S. R. Srividhya, Sanjiv Kumar Jain, Praise Young and Shweta Agrawal
    Citation: Journal of Cloud Computing 2022 11:22
  22. In an Internet of Things (IoT) system based on an anything as a service (XaaS) architecture, data are uploaded from heterogeneous nodes in a nonstandardized format and aggregated on the server side. Within thi...

    Authors: Quan Chen, Liangshun Wu and Congshi Jiang
    Citation: Journal of Cloud Computing 2022 11:20