G. Shidaganti, A. Inamdar, Sindhuja V. Rai, Anagha M. Rajeev
{"title":"SCEF: A Model for Prevention of DDoS Attacks From the Cloud","authors":"G. Shidaganti, A. Inamdar, Sindhuja V. Rai, Anagha M. Rajeev","doi":"10.4018/ijcac.2020070104","DOIUrl":"https://doi.org/10.4018/ijcac.2020070104","url":null,"abstract":"Distributed denial of service (DDoS) attacks are some of the biggest threats to network performance and security today. With the advent of cloud computing, these attacks can be performed remotely on rented virtual machines (VMs), potentially increasing their capabilities and making them harder to trace and mitigate, and negatively affecting the cloud service provider as well. By analyzing packet transmission statistics, attacks can be detected on a virtual machine monitor (VMM) that controls the behavior of the VMs. This article proposes a solution to stop such detected attacks from the source, and analyses solutions proposed for a few different types of such attacks. The authors propose a model called selective cloud egress filter (SCEF) which implements specific modules to deal with detected attacks. If an attack is detected, the SCEF relays information to the VMM about which VMs are participating in the attack, allowing for specific corrective action.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133422443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Merkle Tree and Blockchain-Based Cloud Data Auditing","authors":"A. Mohan, R. MohamedAsfak, Angelin Gladston","doi":"10.4018/ijcac.2020070103","DOIUrl":"https://doi.org/10.4018/ijcac.2020070103","url":null,"abstract":"Cloud computing is the fastest growing and most promising field in the service provisioning segment. It has become a challenging task to provide security in the cloud. The purpose of this article is to suggest a better and efficient integrity verification technique for data referred to as cloud audit. The deployment of cloud storage services has significant benefits in the management of data for users. However, this raises many security concerns, and one of them is data integrity. Though public verification techniques serve the purpose they are vulnerable to procrastinating auditors who may not perform verifications on time. In this article, a cloud data auditing system is proposed. The proposed cloud data auditing system integrates Merkle Tree-based Cloud audit and the blockchain-based audit recording system, thus the core idea is to record each verification result into a blockchain as a transaction. Utilizing the time-sensitive nature of blockchain, the verifications are time-stamped after the corresponding transaction is recorded into the blockchain, which enables users to check whether auditors have performed the verifications at the prescribed time. The proposed cloud data auditing system is experimentally validated. The investigations with varied dataset size revealed less time taken, on an average of 0.25 milliseconds with the use of Merkle Tree. Further results reveal consistency of the data integrity checking.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115911619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Strategies of VMs Scheduling Based on Physicals Resources and Temperature Thresholds","authors":"Djouhra Dad, Ghalem Belalem","doi":"10.4018/ijcac.2020070105","DOIUrl":"https://doi.org/10.4018/ijcac.2020070105","url":null,"abstract":"Cloud computing offers a variety of services, including the dynamic availability of computing resources. Its infrastructure is designed to support the accessibility and availability of various consumer services via the Internet. The number of data centers allow the allocation of the applications, and the process of data in the cloud is increasing over time. This implies high energy consumption, thus contributing to large emissions of CO2 gas. For this reason, solutions are needed to minimize this power consumption, such as virtualization, migration, consolidation, and efficient traffic-aware virtual machine scheduling. In this article, the authors propose two efficient strategies for VM scheduling. SchedCT approach is based on dynamic CPU utilization and temperature thresholds. SchedCR approach takes into consideration dynamic CPU utilization, RAM capacity, and temperature thresholds. These approaches have efficiently decreased the energy consumption of the data centers, the number of VM migrations, and SLA violations, and this reduces, therefore, the emission of CO2 gas.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131594293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Rababah, Bilal Ali Yaseen Al-Nassar, Sana'a Nawaf Al-Nsour
{"title":"Factors Influencing the Adoption of Cloud Computing in Small and Medium Enterprises in Jordan","authors":"K. Rababah, Bilal Ali Yaseen Al-Nassar, Sana'a Nawaf Al-Nsour","doi":"10.4018/ijcac.2020070106","DOIUrl":"https://doi.org/10.4018/ijcac.2020070106","url":null,"abstract":"ThefactorsofCloudcomputing(CC)adoptionamongsmallandmediumenterprises(SMEs)have notbeenidentifiedintheJordaniancontext.Therefore,theaimofthisstudyistoexaminethefactors influencingtheadoptionofCCinSMEsinJordan.Throughanextensivereviewoftheliterature, theresearchmodelwasconstructedbasedontheTOEframework.Inordertovalidatetheresearch modelandtesttheproposedhypotheses,aquantitativeresearchmethodologyfollowedinwhicha surveyquestionnairewasutilizedtocollectthedata.Outofthe350distributedquestionnaires,92 questionnaireswerevalidfortheanalysis.ThePLS-SEMtechniquewasusedforthedataanalysis. TheresultsapprovedtheinfluenceofsixvariablesontheadoptionofCCbymanufacturingSMEs inJordan,namely;compatibility,security,topmanagementsupport,technologicalreadiness,prior ITexperience,andcompetitivepressure.Onlytheinfluenceoftheperceivedbenefitshasnotbeen supported.ThestudyhastheoreticalimplicationsandpracticalimplicationstoSMEsinJordan. KEywoRdS Compatibility, Competitive Pressure, Perceived Benefits, Prior IT Experience, Security, Technological Readiness, TOE Framework, Top Management Support","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132679480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain Based Sensitive Attribute Storage and Access Monitoring in Banking System","authors":"M. Sumathi, S. Sangeetha","doi":"10.4018/ijcac.2020040105","DOIUrl":"https://doi.org/10.4018/ijcac.2020040105","url":null,"abstract":"In earlier banking systems, the data owners were unable to access or update their financial information. Nowadays, user financial information is stored in Cloud storage instead of traditional storage, but security risks are high in financial sectors. Sometimes, Cloud services providers and public auditors modify the user sensitive attribute values. Hence, the decentralized storage system is required for providing better security and integrity of user sensitive attribute values. Blockchain is a decentralized technology for providing tamper-proof storage for sensitive attribute values. Hence, the account holder information is segregated as sensitive and non-sensitive attributes. Before storing into off-chain mode of blocks, the sensitive attributes are grouped into ‘n' number of groups and encrypted by separate group key. The non-encrypted, non-sensitive attributes are stored in cloud storage. The access information is stored in the on-chain mode of the block for easy monitoring. Hence, the security and integrity of sensitive information are preserved.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"751 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133701670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Herzfeldt, Sebastian Floerecke, Christoph Ertl, H. Krcmar
{"title":"Examining the Antecedents of Cloud Service Profitability","authors":"A. Herzfeldt, Sebastian Floerecke, Christoph Ertl, H. Krcmar","doi":"10.4018/IJCAC.2019100103","DOIUrl":"https://doi.org/10.4018/IJCAC.2019100103","url":null,"abstract":"In a fast growing but highly competitive market, some cloud service providers are significantly more profitable than others. In particular, numerous providers struggle to scale their cloud service delivery up from a one-time, project-based co-creation model to a platform delivery model, building on reusable resources. This study builds on the service (-dominant) logic and the resource-based view to develop a model of cloud service profitability. It is proposed that profitability results from the ability to manage costs of customer-specific value co-creation and efforts to build reusable resources, which facilitate future customer engagements. The results of a survey with 99 cloud providers show that value co-creation costs indeed mediate the effects of facilitation capability and complexity on cloud service profitability. However, facilitation capability has both direct and mediated effects on profitability. The results provide insights on which factors influence cloud service profitability and which resources should be established before offering a cloud service to future customers.","PeriodicalId":442336,"journal":{"name":"Int. J. Cloud Appl. Comput.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127148628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}