Mehdi Ezzarii, Hassan El Ghazi, Hamid Elghazi, T. Sadiki
{"title":"Performance analysis of a two stage security approach in cloud computing","authors":"Mehdi Ezzarii, Hassan El Ghazi, Hamid Elghazi, T. Sadiki","doi":"10.1109/CLOUDTECH.2015.7336990","DOIUrl":null,"url":null,"abstract":"Cloud computing is emerging as a promising IT paradigm. Many challenges are still hanging ahead for the Cloud to jump into the maturity stage. Thus, security is deemed as a main challenge. In this paper, we develop the performance of intrusion detection solutions (IDS) by analyzing their performance in terms of recognition, security and capacity. The main aim of our work is to help engineers to implement adequate solution (IDS) depending on the security levels of cloud computing. Our proposed method is based on two-stage. The first stage consists on studying the needed requirements of IDS solution in cloud computing. The second stage classifies security attacks based on four levels. The classification identifies attacks that we should treated with the fitting solution.","PeriodicalId":293168,"journal":{"name":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","volume":"301 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Cloud Technologies and Applications (CloudTech)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CLOUDTECH.2015.7336990","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Cloud computing is emerging as a promising IT paradigm. Many challenges are still hanging ahead for the Cloud to jump into the maturity stage. Thus, security is deemed as a main challenge. In this paper, we develop the performance of intrusion detection solutions (IDS) by analyzing their performance in terms of recognition, security and capacity. The main aim of our work is to help engineers to implement adequate solution (IDS) depending on the security levels of cloud computing. Our proposed method is based on two-stage. The first stage consists on studying the needed requirements of IDS solution in cloud computing. The second stage classifies security attacks based on four levels. The classification identifies attacks that we should treated with the fitting solution.