Skip to main content

Security in Cloud Computing

Mr Martin Gilje Jaatun, Costas Lambrinoudakis, Prof Chunming Rong

  1. Research

    Handling compromised components in an IaaS cloud installation

    This article presents an approach to handle compromised components in the OpenStack Infrastructure-as-a-Service cloud environment. We present two specific use cases; a compromised service process and the intro...

    Aryan TaheriMonfared and Martin Gilje Jaatun

    Journal of Cloud Computing: Advances, Systems and Applications 2012 1:16

    Published on: 16 August 2012

  2. Editorial

    Special issue on security in cloud computing

    This special issue presents extended and revised versions of distinguished papers presented at the security & privacy track of the 3rd IEEE International Conference on Cloud Computing Technology and Science (I...

    Martin Gilje Jaatun, Costas Lambrinoudakis and Chunming Rong

    Journal of Cloud Computing: Advances, Systems and Applications 2012 1:17

    Published on: 16 August 2012

  3. Research

    The design of a redundant array of independent net-storages for improved confidentiality in cloud computing

    This article describes how a Redundant Array of Independent Net-storages (RAIN) can be deployed for confidentiality control in Cloud Computing. The RAIN approach splits data into segments and distributes segme...

    Martin Gilje Jaatun, Gansen Zhao, Athanasios V Vasilakos, Åsmund Ahlmann Nyre, Stian Alapnes and Yong Tang

    Journal of Cloud Computing: Advances, Systems and Applications 2012 1:13

    Published on: 17 July 2012

  4. Research

    Increasing virtual machine security in cloud environments

    A common approach in Infrastructure-as-a-Service Clouds or virtualized Grid computing is to provide virtual machines to customers to execute their software on remote resources. Giving full superuser permission...

    Roland Schwarzkopf, Matthias Schmidt, Christian Strack, Simon Martin and Bernd Freisleben

    Journal of Cloud Computing: Advances, Systems and Applications 2012 1:12

    Published on: 17 July 2012

  5. Research

    An agent based business aware incident detection system for cloud environments

    Classic intrusion detection mechanisms are not flexible enough to cope with cloud specific characteristics such as frequent infrastructure changes. This makes them unable to address new cloud specific security...

    Frank Doelitzscher, Christoph Reich, Martin Knahl, Alexander Passfall and Nathan Clarke

    Journal of Cloud Computing: Advances, Systems and Applications 2012 1:9

    Published on: 12 July 2012

  6. Research

    A quantitative analysis of current security concerns and solutions for cloud computing

    The development of cloud computing services is speeding up the rate in which the organizations outsource their computational services or sell their idle computational resources. Even though migrating to the cl...

    Nelson Gonzalez, Charles Miers, Fernando Redígolo, Marcos Simplício, Tereza Carvalho, Mats Näslund and Makan Pourzandi

    Journal of Cloud Computing: Advances, Systems and Applications 2012 1:11

    Published on: 12 July 2012

  7. Research

    Privacy preserving collaborative filtering for SaaS enabling PaaS clouds

    Recommender systems use, amongst others, a mechanism called collaborative filtering (CF) to predict the rating that a user will give to an item given the ratings of other items provided by other users. While r...

    Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi, Theo Dimitrakos and Srijith K Nair

    Journal of Cloud Computing: Advances, Systems and Applications 2012 1:8

    Published on: 9 July 2012