Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 2 SI
Page No. 6223 - 6226

Security Aware Vulnerability Avoidance in Cloud Computing using Nature Inspired Approach

Authors : Sachin Gupta, Sanjay Singla and S.N. Panda

References

Bassiliades, N., M. Symeonidis, G. Meditskos, E. Kontopoulos and P. Gouvas et al., 2017. A semantic recommendation algorithm for the paasport platform-as-a-service market place. Expert Syst. Appl., 67: 203-227.
Direct Link  |  

Bhardwaj, S., L. Jain and S. Jain, 2010. Cloud computing: A study of Infrastructure As A Service (IAAS). Int. J. Eng. Inform. Technol., 2: 60-63.

Buyya, R., 2009. Market-oriented cloud computing: Vision, hype and reality of delivering computing as the 5th utility. Proceedings of the 9th IEEE/ACM International Conference on Cluster Computing and the Grid CCGRID 2009, May 18-21, 2009, IEEE, Shanghai, China, ISBN:978-1-4244-3935-5, pp: 5-13.

Kandias, M., N. Virvilis and D. Gritzalis, 2012. The insider threat in cloud computing. Proceedings of the 6th International Workshop on Critical Information Infrastructure Security, September 8-9, 2011, Switzerland, pp: 99-103.

Margolin, N. and B. Levine, 2008. Quantifying resistance to the sybil attack. Financial Cryptography Data Secur., 1: 1-15.
CrossRef  |  Direct Link  |  

Popovic, K. and Z. Hocenski, 2010. Cloud computing security issues and challenges. Proceedings of the 33rd IEEE International Conference on MIPRO, May 24-28, 2010, IEEE, Opatija, Croatia, ISBN:978-1-4244-7763-0, pp: 344-349.

Rajput, A. and A. Gupta, 2014. A study of testing issues and difficulties in cloud based application and current practices. Intl. J. Technol. Eng. Sci., 2: 2562-2568.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved