Author :
Saad, E.N. ; Mahdi, K.E. ; Zbakh, Mostapha
Author_Institution :
Nat. Higher Sch. of Comput. Sci. & Syst., Univ. of Mohammed V, Rabat, Morocco
Abstract :
Today, cloud computing is an attractive and cost-saving service for buyers as it provides accessibility and reliability options for users and scalable sales for providers. Before implementing this method of computing, however, it is important to consider the security of the cloud. In this paper, we will present, a classification of specific and traditional attacks to the cloud computing according to their origin and their category, as a solution to protect the cloud from these attacks, the IDS integrated in the cloud remains among the best solution, therefore we will show some existing cloud computing architecture based Intrusion Detection System (IDS), their strengths and weaknesses. For the comparative study between the architectures, we have adopted transparency, alerts analysis, authentication, accountability, dynamic reaction, centralized management, interoperability, deployability and control from front office side as criterion for comparison, as a result of this comparative study, we propose a new architecture in one hand by correcting some weaknesses and in the other hand integrating certain concept.
Keywords :
cloud computing; open systems; security of data; IDS; accessibility; alert analysis; authentication; centralized management; cloud computing architectures; cloud security; cost-saving service; deployability; dynamic reaction; front office side; interoperability; intrusion detection system; reliability; Cloud computing; Computer architecture; Intrusion detection; Monitoring; Virtual machine monitors; Virtual machining; cloud computing; cloud security; computer attacks; intrusion detection; intrusion prevention; network attacks;