Performance analysis of a two stage security approach in cloud computing

dc.contributor.authorMehdi Ezzarii
dc.contributor.authorHassan El Ghazi
dc.contributor.authorHamid Elghazi
dc.contributor.authorTayeb Sadiki
dc.date.accessioned2019-06-02T09:44:00Z
dc.date.available2019-06-02T09:44:00Z
dc.date.issued2015-06-02
dc.description.abstractCloud computing is emerging as a promising IT paradigm. Many challenges are still hanging ahead for the Cloud to jump into the maturity stage. Thus, security is deemed as a main challenge. In this paper, we develop the performance of intrusion detection solutions (IDS) by analyzing their performance in terms of recognition, security and capacity. The main aim of our work is to help engineers to implement adequate solution (IDS) depending on the security levels of cloud computing. Our proposed method is based on two-stage. The first stage consists on studying the needed requirements of IDS solution in cloud computing. The second stage classifies security attacks based on four levels. The classification identifies attacks that we should treated with the fitting solution.en_US
dc.identifier.urihttp://e-biblio.univ-mosta.dz/handle/123456789/10557
dc.publisher2015 International Conference on Cloud Technologies and Applications (CloudTech)en_US
dc.subjectCloud Computingen_US
dc.subjectSecurityen_US
dc.subjectIDSen_US
dc.subjectRequirements;Architecture levelsen_US
dc.titlePerformance analysis of a two stage security approach in cloud computingen_US
dc.typeArticleen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
5.pdf
Size:
201.67 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: