Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- abstractDecember 2024
CCSW 2024 -- Cloud Computing Security Workshop
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPage 4900https://doi.org/10.1145/3658644.3691548The CCSW workshop aims to bring together researchers and practitioners to explore all aspects of security in cloud-centric and outsourced computing. In CCSW 2024, based on the papers that have been accepted, the workshop is focused on applied ...
- research-articleOctober 2024
Cloud Resource Protection via Automated Security Property Reasoning
ASE '24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software EngineeringPages 2170–2175https://doi.org/10.1145/3691620.3695279As cloud computing gains widespread adoption across various industries, securing cloud resources has become a top priority for cloud providers. However, ensuring configuration security among highly interconnected cloud resources is challenging due to the ...
- research-articleMay 2024
PRC6: Hybrid lightweight cipher for enhanced cloud data security in parallel environment
Security and Privacy (SPY2), Volume 7, Issue 5https://doi.org/10.1002/spy2.413AbstractModern technologies of computing cloud are showing great promise, but at the same time create new security challenges that hinder full acceptance. Given that most of these services often use cloud networks as channels for communication, securing ...
- research-articleMarch 2024
Malicious clouds coalition management for business processes deployment
Security and Privacy (SPY2), Volume 7, Issue 5https://doi.org/10.1002/spy2.395AbstractCloud computing has raised concerns about security, causing many companies to hesitate in adopting it. Despite these concerns, there are methods available to address the risks associated with implementing a business process (BP) in the cloud. ...
- articleJanuary 2024
Analysis of SQL injection attacks in the cloud and in WEB applications
Security and Privacy (SPY2), Volume 7, Issue 3https://doi.org/10.1002/spy2.370AbstractCloud computing has revolutionized the way IT industries work. Most modern‐day companies rely on cloud services to accomplish their day‐to‐day tasks. From hosting websites to developing platforms and storing resources, cloud computing has ...
-
- research-articleDecember 2024
Enhancing the data security of cloud computing critical systems using layered encryption technique
International Journal of Critical Computer-Based Systems (IJCCBS), Volume 11, Issue 3Pages 194–215https://doi.org/10.1504/ijccbs.2024.143209In the fast-growing sector of cloud computing, users can employ system resources as needed for data storage and computation. Protecting confidential data is the biggest cloud computing challenge. Security challenges in cloud computing are categorised as ...
- research-articleApril 2024
Cloud Computing Security and Deep Learning: An ANN approach
Procedia Computer Science (PROCS), Volume 231, Issue CPages 40–47https://doi.org/10.1016/j.procs.2023.12.155AbstractDeep learning techniques have shown significant impact in enhancing security across various domains by leveraging artificial neural networks models. When applied to cloud computing security, deep learning offers cost-effective solutions by ...
- research-articleApril 2024
Is Securing an Untrusted Cloud with Cryptography Still Economically Unviable?
UCC '23: Proceedings of the IEEE/ACM 16th International Conference on Utility and Cloud ComputingArticle No.: 59, Pages 1–6https://doi.org/10.1145/3603166.3632554This paper explores the economic implications of outsourcing data and computation to a cloud provider in comparison to maintaining an on-premise data center. Our investigation is twofold: contrasting a private data center with a trusted cloud, and the ...
- surveyNovember 2023
A Survey on Searchable Symmetric Encryption
ACM Computing Surveys (CSUR), Volume 56, Issue 5Article No.: 119, Pages 1–42https://doi.org/10.1145/3617991Outsourcing data to the cloud has become prevalent, so Searchable Symmetric Encryption (SSE), one of the methods for protecting outsourced data, has arisen widespread interest. Moreover, many novel technologies and theories have emerged, especially for ...
- surveyOctober 2023
Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture
ACM Computing Surveys (CSUR), Volume 56, Issue 3Article No.: 63, Pages 1–40https://doi.org/10.1145/3617824Secure keyword search is a prevailing search service offered in outsourced environments. However, with the increasingly severe security vulnerabilities of conventional centralized outsourcing, the architecture of secure keyword search, with searchable ...
- invited-talkAugust 2023
FlexSEE: a Flexible Secure Execution Environment for protecting data-in-use
- Jose Moreira,
- Jessica H. Tseng,
- Manoj Kumar,
- Eknath Ekanadham,
- Joefon Jann,
- Pratap C. Pattnaik,
- Gianfranco Bilardi,
- David Edelsohn,
- Henry Tufo
CF '23: Proceedings of the 20th ACM International Conference on Computing FrontiersPages 329–336https://doi.org/10.1145/3587135.3592170In this paper, we present a comprehensive security architecture, Flexible Secure Execution Environment (FlexSEE), for confidential computing in modern cloud environments. FlexSEE does not require the trust of system software on the compute server and ...
- research-articleJune 2023
A Semantic Evidence-based Approach to Continuous Cloud Service Certification
SAC '23: Proceedings of the 38th ACM/SIGAPP Symposium on Applied ComputingPages 24–33https://doi.org/10.1145/3555776.3577600Continuous certification of cloud services requires a high degree of automation in collecting and evaluating evidences. Prior approaches to this topic are often specific to a cloud provider or a certain certification catalog. This makes it costly and ...
- research-articleFebruary 2024
Veil: A Protected Services Framework for Confidential Virtual Machines
ASPLOS '23: Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 4Pages 378–393https://doi.org/10.1145/3623278.3624763Confidential virtual machines (CVMs) enabled by AMD SEV provide a protected environment for sensitive computations on an untrusted cloud. Unfortunately, CVMs are typically deployed with huge and vulnerable operating system kernels, exposing the CVMs to ...
- research-articleMarch 2023
Automated Security Assessments of Amazon Web Services Environments
ACM Transactions on Privacy and Security (TOPS), Volume 26, Issue 2Article No.: 20, Pages 1–31https://doi.org/10.1145/3570903Migrating enterprises and business capabilities to cloud platforms like Amazon Web Services (AWS) has become increasingly common. However, securing cloud operations, especially at large scales, can quickly become intractable. Customer-side issues such as ...
- research-articleJanuary 2023
Towards Automated Assessment of Organizational Cybersecurity Posture in Cloud
- Roy Bar-Haim,
- Lilach Eden,
- Yoav Kantor,
- Vikas Agarwal,
- Mark Devereux,
- Nisha Gupta,
- Arun Kumar,
- Matan Orbach,
- Michael Zan
CODS-COMAD '23: Proceedings of the 6th Joint International Conference on Data Science & Management of Data (10th ACM IKDD CODS and 28th COMAD)Pages 167–175https://doi.org/10.1145/3570991.3571008In a world where reliance on digital services becomes more critical every year with billions of dollars in penalties being levied annually by regulators and the impacts from security control failures growing, the potential consequence of organizations ...
- research-articleJanuary 2023
Secure task scheduling in cloud computing with enhanced ordinal optimisation and integrated DNA, Morse code techniques
International Journal of Intelligent Engineering Informatics (IJIEI), Volume 11, Issue 2Pages 155–175https://doi.org/10.1504/ijiei.2023.132700This paper presents two innovative approaches to address the challenges of task scheduling, efficient resource utilisation, and security in cloud computing environments. The first approach proposes an optimal task-scheduling strategy for virtual machines ...
- research-articleJanuary 2023
HyperGuard: on designing out-VM malware analysis approach to detect intrusions from hypervisor in cloud environment
International Journal of Grid and Utility Computing (IJGUC), Volume 14, Issue 4Pages 356–367https://doi.org/10.1504/ijguc.2023.132617Cloud computing provides delivery of computing resources as a service on a pay-as-you-go basis. It represents a shift from products being purchased, to products being subscribed as a service, delivered to consumers over the internet from a large scale ...
- posterNovember 2022
Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 3415–3417https://doi.org/10.1145/3548606.3563514Moving Target Defense (MTD) can eliminate the asymmetric advantage that attackers have in terms of time to explore a static system by changing a system's configuration dynamically to reduce the efficacy of reconnaissance and increase uncertainty and ...
- keynoteApril 2022
SDP Based Zero-Trust Architectures
IWSPA '22: Proceedings of the 2022 ACM on International Workshop on Security and Privacy AnalyticsPage 1https://doi.org/10.1145/3510548.3519390In an increasingly de-centralized networked environment, the security controls provided by traditional perimeter security architectures are becoming ineffective. Software Defined Perimeter (SDP), as an implementation of a Zero Trust Network Architecture ...
- posterApril 2022
MK-RS-PKE: Multi-Keyword Ranked Searchable Public-Key Encryption for Cloud-Assisted Lightweight Platforms
CODASPY '22: Proceedings of the Twelfth ACM Conference on Data and Application Security and PrivacyPages 376–378https://doi.org/10.1145/3508398.3519362Since more and more data from lightweight platforms like IoT devices or mobile apps are being outsourced to the cloud, the need to ensure privacy while retaining data usability is essential. This paper designs a framework where lightweight platforms ...