ITECH 2201 Cloud Computing - Week 9 - Tutorials
ITECH 2201 Cloud Computing - Week 9 - Tutorials
Week 9 Tutorials
In this tutorial you will search and find the following interesting research paper on cloud security from
IEEE Xplore digital library, and answer the questions that follow:
Waqas, A; Yusof, Z.M.; Shah, A, "A Security-Based Survey and Classification of Cloud
Architectures, State of Art and Future Directions," Advanced Computer Science
Applications and Technologies (ACSAT), 2013 International Conference on , vol., no.,
pp.284,289, 23-24 Dec. 2013.
Questions
2. Mention and briefly describe (1 or 2 lines) different types of data storage and data security
surveyed in this paper?
The greater part is distributed in computing is identified with the information storage and
information security and to recognize the substances who are in charge of information from the
cloud environment. Numerous exploration gatherings are as yet researching the proficient
component for capacity, security and protection to the trust of cloud clients. A case is a structure
proposed by called Cloud data tracker. The point of Cloud data tracker is to review the information
and following information that leaves cloud limit. They utilized the "Information Tracker"
application that contains an executable document called viewer.exe. This document gives the review
of Data-Tracker. At whatever point a document leaves the cloud limit, regardless of whatever the
reason is, this viewer.exe document will be joined to that information record. The motivation behind
viewer.exe is to log occasions on information record and send the temper-verification occasion logs
back to the server. This Overview of Data Tracker Administration is to Auditing Level Cloud
Between cloud Inspects the directors to screen the fact that it is to create the review trails. These
review trails can be observed for reviewing utilizing hidden guideline based observing frameworks,
3. What are the different measures, mentioned in the paper, to secure and audit malicious
acts in cloud data?
Security and Auditing of Malicious Acts
The substances are hazardous for processing particularly distributed computing as cloud contains
valuable and assets and elements can assets was traded off by the malignant clients and
Microsoft cloud clients lost their information because of lots of measures have been taken by
analysts and cloud suppliers to secure cloud from malicious acts arranged by the current
malicious insider, assaults to distributed computing. A malicious Insider is an Insider who
deliberately abused that influenced the classification, or accessibility of the association data or
data frameworks. They exhibited the nature and conduct of malicious insiders regarding cloud
community. These insiders can get to cloud resources for instance database, passwords or keys,
IPs and system foundation examined the regular thought of three particular points of view. The
cloud supplier manager who is a trusted individual designated. This can happen as a result of the
cloud or virtualization and so on.
4. Briefly explain the machine learning technique used to detect the malicious attack.
Machine learning technique
They further recommend system to secure cloud against these malignant insiders utilizes the
machine learning technique’s for pro-active the cloud registering intending to recognize the
assault advise cloud clients about assault when it is covered up by cloud supplier demonstrates
the configuration for utilizing machine learning procedure inside of single cloud environment
Information accumulation that is gathered in view of the way of information is the major process
to detect from them alicious attacks.
Complete the above questions and upload your work on Moodle. Please note your final exam will have
questions from the tutorials as well. You are encouraged to discuss your answer with your Tutor before
uploading your work.