|
References | Overviews | Advantages | Techniques | Years |
|
[49] | Two new models are proposed to stop the fake feedbacks by the malicious users called the FEBM; the previous feedback average is considered to indicate fake feedback | The variable delta decreases the positive and negative false error with high accuracy | The delta variable factor, the Bayesian game model, and the feedback evaluation | 2017 |
|
[50] | The attack-defense game-theoretic approach called Stackelberg game is proposed; the players in this game are called the defender and the attacker; the strategies of the defender are open and the attackers follow these strategies; the equilibrium point will be found by the active and passive structured | The Stackelberg model with active and passive structured is used | The attackers achieve the maximum gain of the defender | 2018 |
|
[51] | In the proposed approach, an integrated solution to cloud security based using the clear framework and the BPMN is discussed; three-layered models are analyzed for the strong security and blocking of threats | The multilayered CCAF security model has 20 percent better performance than the single-layered security models which can block 7348 viruses and trojans; a quick locking system is achieved which can block and quarantine the 9919 trojans and viruses in quick response | The CCAF, BPMN, 10,000 trojans, and 10 PB data in the data center | 2016 |
|
[52] | The security issues are analyzed on Security-as-a-Service (SecaaS) in this work; a new pattern called leveraging is applied to SaaS; it gives self-managing, automating, and scalable to SaaS | The simulation results show that it outperforms regarding security; the security of the SaaS improves by the cloud-native application | The CNA is used | 2017 |
|
[53] | The proposed work in this article provided security to a Pr system; the whole work is divided into three steps to provide security to big data; two types of scanning obtained called vulnerability scanning and log scanning which then are correlated to each other to find the attacks on big data | The experimental result shows the attacks count, host computer used, and security tips count to guarantee the speed of analysis | Nikto scanning tools with Nagious and conical correlation are used | 2016 |
|
[54] | The updated chain VM service proposes to handle the high traffic input to the chain; the halts and deadlock option provide security assurance; the repetition of the previous input data block in new updated chain VM | The technique achieves the increase in the percentage of the security and upgrading and optimizing the security; it configures and runs the desired security stack | Seamless flow, dispatcher VM, and SNAT docker container | 2018 |
|
[55] | In this model, co-resident attacks encounter instead of looking to the solutions of the attacker after co-locating with their targets; the probability of the attackers co-locating with the targets mitigates in this approach | The cloud Sim and open stack simulators are used which shows the attackers first need to co-locate their VM according to target VM and the attackers achieve hardly up to 40 percent | The virtual machine allocation policy, the PSSP policy, workload balance, and low power consumption | 2017 |
|
[56] | The approach presents different models to detect and track the already existing threats in the database and new incoming threats to a cloud system | The simulation results show the framework efficiently detects the anomaly security system up to 90% | The signature method, intellectual model, big data technology, and Weka application | 2017 |
|
[57] | The covert channel analysis performs to secure data at multilevel which enables to secure the data in the presence of unauthorized personnel; different steps follow the data to achieve security | The work protects the data in the presence of an unauthorized person who achieves the trust of users | Covert channel and prototype approach is developed | 2015 |
|
[58] | The assessment framework proposes to solve a security threat related to the specific client; in this model, different six threats are analyzed, find the concerned client for each threat, and give a secure environment | The model is not fixed to any specific network but can be fitted to any system; the model solves the problem of previously existing assessment framework problems and finds a threat for the concerned client | Spiral network and STRIDE categorizing model is used | 2018 |
|