2017
DOI: 10.3991/ijim.v11i4.6501
|View full text |Cite
|
Sign up to set email alerts
|

Node Verification to Join the Cloud Environment Using Third Party Verification Server

Abstract: <strong>Currently, cloud computing is facing different types of threats whether from inside or outside its environment.  This may cause cloud to be crashed or at least unable to provide services to the requests made by clients. In this paper, a new technique is proposed to make sure that the new node which asks to join the cloud is not composing a threat on the cloud environment. Our new technique checks the node before it will be guaranteed to join the cloud whether it runs malwares or software that cou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Deep learning was adopted in this system for securing sensitive data of IoT devices. Authors in [26] proposed a new technique for ensuring that a new node that requests to join the cloud does not constitute a threat to the cloud environment. The proposed scheme method checks if a node is running malware or software that could be used to launch an attack before allowing it to join the cloud.…”
Section: Related Workmentioning
confidence: 99%
“…Deep learning was adopted in this system for securing sensitive data of IoT devices. Authors in [26] proposed a new technique for ensuring that a new node that requests to join the cloud does not constitute a threat to the cloud environment. The proposed scheme method checks if a node is running malware or software that could be used to launch an attack before allowing it to join the cloud.…”
Section: Related Workmentioning
confidence: 99%
“…A common architecture is to employ a neutral TPV to accomplish the work [20][21][22][23] . To enhance universality, our system model is built on this TPV architecture, under which three types of entities are involved: Cloud Service Users (CSU), Cloud Service Providers (CSP), and TPVs.…”
Section: System Modelmentioning
confidence: 99%
“…Therefore, the success of phishing attacks rely on the weaknesses of the user [6]. Individual users as well as organizations are vulnerable to many types of attacks including phishing attacks [7,8]. According to Anti-Phishing Working Group (APWG) [9] report, the phishing attacks ratio is doubled since early 2020.…”
Section: Introductionmentioning
confidence: 99%