2022
DOI: 10.1155/2022/2600712
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Cloud Integration Security Framework Using Honeypots

Abstract: This rapidly changing digital world is always sensitive to improving security and resilience to protect the inhabitants of this ecosystem in terms of data, processes, repositories, communication, and functions. The transformation of this digital ecosystem is heavily dependent on cloud computing, as it is becoming the global platform for individuals, corporates, and even governments. Therefore, the concerns related to security are now linked closely with cloud computing. In this paper, a multi-cloud security fr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 27 publications
0
11
0
Order By: Relevance
“…The following presents the calculation of the membership function in Eq. ( 2) [27,28] for migration performance of input variables Pages dirty rate, latency, and post-migration overhead time. Fig.…”
Section: Simulation and Resultsmentioning
confidence: 99%
“…The following presents the calculation of the membership function in Eq. ( 2) [27,28] for migration performance of input variables Pages dirty rate, latency, and post-migration overhead time. Fig.…”
Section: Simulation and Resultsmentioning
confidence: 99%
“…It is important to analyze that an optimized decentralized multi-cloud is a more suitable and enhanced platform for resource providers in terms of financial gains, sharing, and performance improvement [26]. The same experiment is simulated again with the inclusion of identified parameters and a proposed framework to analyze the impact of optimization on the cooperation of resource providers.…”
Section: Figure 12: Cooperation Impact Analysis With Optimizationmentioning
confidence: 99%
“…This enhances the algorithm's mathematical intricacy, as well as cryptanalysis. In the comparison we have selected the best and highest secure algorithms viz, Dubal et al, 33 Ren et al, 30 Kumar et al, 34 Zhu et al, 32 Subasree et al, 31 TCHA et al 35 and we are comparing our system with them in terms of various parameters. Different sorts of keys are utilized in our proposed system, such as secret keys, public keys, and private keys.…”
Section: Comparison With Existing Algorithmsmentioning
confidence: 99%
“…Alyas et al 30 In their paper they presented, a multi‐cloud security architecture that offers a perspective on the creation of security tools that can divert an attacker. The goal aims to prolong overall period of time available for analysis of the incident and compromise‐free mitigation of the intrusion.…”
Section: Literature Reviewmentioning
confidence: 99%