|
References | Overviews | Advantages | Techniques | Years |
|
[2] | The inside and outside security of the Pr network is analyzed here; three different scanners are used to make sure the security inside and outside the cloud; for inside security, Metasploit, Nessus, and open vas tools are used; the outside security of the cloud is performed by web app tenable IO | It secure the data for inside and outside the Pr from hijackers, etc. | The scanners Nessus, Metasploit, open VAS, and web app tenable IO tools are used | 2018 |
|
[59] | The presented model calculates the baseline values based on day, time, and log data frequency to show out the attacker’s name and traffic information; the correlation performs in the model which makes the threat identification easy | The proposed model analyzes and recognizes the cyber threat by obtained correlated information; the SIEM architecture provides the engine to store data and storing the ability to store data | The SOA, OpenSOE, and complemented DIM | 2017 |
|
[60] | The model presents the security of a cloud system; the quantitative evaluation provided security; the problems of evaluation and comparing the security level offered the presence of complex service supply chain | The presented model provides a well-defined set of security related to the acquired service | Reference evaluation model (REM), SecSLAs algorithms, and complex service supply chain techniques are presented to achieve security goals | 2016 |
|
[8] | The proposed work ensures the users in the security domain, while they deal in a cloud network; the work enables the users to check and control the data at any stage and level; different models are applied to analyze the security and accountability | It makes the cloud system according to the demand of the users who can check and control their data at any stage | The PM in the cloud, RSASS system, data security model, and CIA models are used | 2015 |
|
[61] | Various old policies of the cloud network security are compared with network security; besides, some additional new knowledge-based policies are added to cloud security, and then experimentally analyze and find the correctness and effectiveness of the proposed work | The experimental results proved the design policies stood well to old policies for cloud security | A multidimensional integer space conflict detection algorithm is proposed | 2016 |
|
[62] | According to the job of the user and computer security provided to the cloud system in this framework, through GA-based job security, two new concepts are achieved in this work called security on demand and improved trust level | By using the algorithms and techniques in this work, the simulation results show the high-level security with the minimum cost of time | The GA-based job security technique is used | 2015 |
|
[63] | Two security threats called timing attacks and DoS are analyzed and secure the cloud system from these threats; the security-aware and NDTMSI with the agent-based monitoring system is proposed | The proposed approach provides magnificence security without substantial modification and provides integrity and confidential and authentication monitoring to the cloud | The safe random number generator (BBS), secure generic scheduler, nondeterministic model, a secure hashing algorithm (SHA) scoring workers, security bias model, and leveraging genetic heuristic approach | 2017 |
|
[64] | The hybrid cryptographic system (HCS) is applied to the cloud system to secure the data; in this work, symmetric and asymmetric approaches are analyzed to encrypt and decrypt the data | In this work, the system from start to end is secure which achieves the trust of the users until the data stores on the cloud | In the hybrid cryptographic system, asymmetry data encryption RSA and symmetry data encryption AES are applied | 2017 |
|