Mobile agent based multi-layer security framework for cloud data centers
Objective:This paper proposes a new mobile agent based cloud security framework comprising four different security and authentication layers to establish the trust relationship between two entities before using cloud services. Methods/Analysis:The proposed framework is divided into four layers with...
| Main Authors: | Uddin, Mueen, Memon, Jamshed, Alsaqour, Raed A., Shah, Asadullah, Abdul Rozan, Mohd Zaidi |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Informatics (India) Ltd.
2015
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/43720/ http://irep.iium.edu.my/43720/1/mueen-paper2.pdf |
Similar Items
Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
Measuring efficiency of tier level data centers to implement green energy efficient data centers
by: Uddin, Mueen, et al.
Published: (2013)
by: Uddin, Mueen, et al.
Published: (2013)
Power usage effectiveness metrics to measure efficiency and performance of data centers
by: Uddin, Mueen, et al.
Published: (2014)
by: Uddin, Mueen, et al.
Published: (2014)
Randomized text encryption: a new dimension in cryptography
by: Memon, Jamshed, et al.
Published: (2014)
by: Memon, Jamshed, et al.
Published: (2014)
Implementation of server virualization to build energy efficient data centers
by: Uddin, Mueen, et al.
Published: (2014)
by: Uddin, Mueen, et al.
Published: (2014)
Sharing of attacks information across clouds for improving security:a conceptual framework
by: Waqas, Ahmad, et al.
Published: (2014)
by: Waqas, Ahmad, et al.
Published: (2014)
A security-based survey and classification of cloud architectures, state of the art and future directions
by: Waqas, Ahmad, et al.
Published: (2013)
by: Waqas, Ahmad, et al.
Published: (2013)
Metrics for computing performance of data center for instigating Energy Efficient Data center
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Deployment of social nets in multi-layer model to identify Key individuals using majority voting
by: Shah, Asadullah
Published: (2019)
by: Shah, Asadullah
Published: (2019)
A customer methodology for developing green cellular phone: a case of University Malaysia Pahang Students
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
Pervasive learning using cloud computing
by: Shah, Asadullah
Published: (2015)
by: Shah, Asadullah
Published: (2015)
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Energy efficiency in virtualized data center
by: Karamat Khan, Tehmina, et al.
Published: (2018)
by: Karamat Khan, Tehmina, et al.
Published: (2018)
SmartCrowd: novel approach to big crowd management using mobile cloud computing
by: Ali, Mohammed Fazil, et al.
Published: (2015)
by: Ali, Mohammed Fazil, et al.
Published: (2015)
Forensic analysis of offline signature using multi-layer perception and random forest
by: Shah, Abdul Salam, et al.
Published: (2017)
by: Shah, Abdul Salam, et al.
Published: (2017)
Contribution of cloud computing in the reduction of carbon dioxide emission
by: Khan, Nusratullah, et al.
Published: (2014)
by: Khan, Nusratullah, et al.
Published: (2014)
Linear and nonlinear stochastic distribution for consensus problem in multi-agent systems
by: Abdulghafor, Rawad, et al.
Published: (2020)
by: Abdulghafor, Rawad, et al.
Published: (2020)
Encryption method for SCADA security enhancement
by: Shahzad, Aamir, et al.
Published: (2014)
by: Shahzad, Aamir, et al.
Published: (2014)
Application service delivery in the modern virtualized data center-improving reliability and scalability
by: Raza, A, et al.
Published: (2016)
by: Raza, A, et al.
Published: (2016)
Security and privacy for IoT and fog computing paradigm
by: Rauf, Abdul, et al.
Published: (2018)
by: Rauf, Abdul, et al.
Published: (2018)
Transaction Management techniques and practices in current cloud computing environment: a survey
by: Waqas, Ahmad, et al.
Published: (2015)
by: Waqas, Ahmad, et al.
Published: (2015)
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015)
by: Ibrahim, Mohamed, et al.
Published: (2015)
Mathematical modeling using coordination mechanisms for multi-agent systems in service oriented architecture
by: Muhamad Ibrahim, Najhan
Published: (2019)
by: Muhamad Ibrahim, Najhan
Published: (2019)
A model of factors influencing cloud computing adoption among faculty members and students of higher educational institutions of Bangladesh
by: Rahman, Mohammad Musudur, et al.
Published: (2018)
by: Rahman, Mohammad Musudur, et al.
Published: (2018)
Deployment of new dynamic cryptography buffer for SCADA security enhancement
by: Aamir, Shahzad, et al.
Published: (2014)
by: Aamir, Shahzad, et al.
Published: (2014)
A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
The future of data privacy and security concerns in
Internet of things
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)
by: Solangi, Zulfiqar Ali, et al.
Published: (2018)
Mobility based surveillance model to facilitate security of individuals’ properties
by: Hameed, Shihab A.
Published: (2013)
by: Hameed, Shihab A.
Published: (2013)
Factors affecting secure software development practices among developers- an investigation
by: Ahmed Maher, Zulfikar, et al.
Published: (2019)
by: Ahmed Maher, Zulfikar, et al.
Published: (2019)
Relation mining using cross correlation of multi domain social networks
by: Noor, Fozia, et al.
Published: (2015)
by: Noor, Fozia, et al.
Published: (2015)
Preliminary study for customer’s online shopping satisfaction from security perspective
by: Imtiaz Ali, Najma, et al.
Published: (2018)
by: Imtiaz Ali, Najma, et al.
Published: (2018)
Online shopping satisfaction in Malaysia: A framework for security, trust and cybercrime
by: Imtiaz Ali, Najma, et al.
Published: (2016)
by: Imtiaz Ali, Najma, et al.
Published: (2016)
State of the art intrusion detection system for cloud computing
by: Ahmad, Azuan, et al.
Published: (2018)
by: Ahmad, Azuan, et al.
Published: (2018)
Visualization: a tool to study nodes in multi-dimensional networks
by: Noor, Fozia, et al.
Published: (2019)
by: Noor, Fozia, et al.
Published: (2019)
Securing information system & computer security self-efficacy effect
by: Al-Shawabkeh, Mahmoud
Published: (2013)
by: Al-Shawabkeh, Mahmoud
Published: (2013)
Collaborative cloud IDS in detecting denial of service by dendritic cell mechanism
by: Ahmad, Azuan, et al.
Published: (2019)
by: Ahmad, Azuan, et al.
Published: (2019)
Challenges and limitations in secure
software development adoption - A
qualitative analysis in Malaysian software
industry prospect
by: Ahmed Maher, Zulfikar, et al.
Published: (2020)
by: Ahmed Maher, Zulfikar, et al.
Published: (2020)
Measuring antecedents of customer satisfaction: an empirical analysis of telecom services in Pakistan
by: Rind, M. M., et al.
Published: (2016)
by: Rind, M. M., et al.
Published: (2016)
Mobile online services and measuring user satisfaction: study of Kuwait
by: Shah, Asadullah, et al.
Published: (2015)
by: Shah, Asadullah, et al.
Published: (2015)
Gender and mobile payment system adoption among students of tertiary institutions in Nigeria
by: Hamza, Aminu, et al.
Published: (2014)
by: Hamza, Aminu, et al.
Published: (2014)
Similar Items
-
Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review
by: Uddin, Mueen, et al.
Published: (2015) -
Measuring efficiency of tier level data centers to implement green energy efficient data centers
by: Uddin, Mueen, et al.
Published: (2013) -
Power usage effectiveness metrics to measure efficiency and performance of data centers
by: Uddin, Mueen, et al.
Published: (2014) -
Randomized text encryption: a new dimension in cryptography
by: Memon, Jamshed, et al.
Published: (2014) -
Implementation of server virualization to build energy efficient data centers
by: Uddin, Mueen, et al.
Published: (2014)