|
Twitter
|
Facebook
|
Google+
|
VKontakte
|
LinkedIn
|
Viadeo
|
English
|
Français
|
Español
|
العربية
|
 
International Journal of Innovation and Applied Studies
ISSN: 2028-9324     CODEN: IJIABO     OCLC Number: 828807274     ZDB-ID: 2703985-7
 
 
Thursday 28 March 2024

About IJIAS

News

Submission

Downloads

Archives

Custom Search

Contact

  • Contact us
  • Newsletter:

Connect with IJIAS

  Now IJIAS is indexed in EBSCO, ResearchGate, ProQuest, Chemical Abstracts Service, Index Copernicus, IET Inspec Direct, Ulrichs Web, Google Scholar, CAS Abstracts, J-Gate, UDL Library, CiteSeerX, WorldCat, Scirus, Research Bible and getCited, etc.  
 
 
 

Implementation a dynamic security in the Cloud computing environment


Volume 14, Issue 3, February 2016, Pages 795–800

 Implementation a dynamic security in the Cloud computing environment

Yassine EL MAHOTI1, Noura Aknin2, and Kamal Eddine El-Kadiri3

1 Information Technology and Modeling Systems Research Unit, Faculty of Sciences, Abdelmalek Essaadi University, Tetouan, Morocco
2 Information Technology and Modeling Systems Research Unit, Faculty of Sciences, Abdelmalek Essaadi University, Tetouan, Morocco
3 Computer Sciences, Operational Research and Applied Statistics Laboratory, Faculty of Sciences, Abdelmalek Essaadi University, Tetouan, Morocco

Original language: English

Copyright © 2016 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract


This recent years, the security of cloud computing has become a major challenge for all organizations because any attack can cause serious problems such as stealing customer and government information, control of systems by others entities (hackers) to perform any operation for their needs, etc. The last decade, the cyber-attacks have become increasingly complex, sophisticated, multiple and the majority of traditional security systems are unable to detect them.
The goal of this article is present a secure layer installed in the cloud providers that allows a high security performance in the cloud environment. This is achieved by controlling all the services executed by customers on their virtual machines and block or quarantine the unknown of them until the provider decision is made.


Author Keywords: Cloud Computing, Dynamic security, Cyber-attacks, Virtualization.


How to Cite this Article


Yassine EL MAHOTI, Noura Aknin, and Kamal Eddine El-Kadiri, “Implementation a dynamic security in the Cloud computing environment,” International Journal of Innovation and Applied Studies, vol. 14, no. 3, pp. 795–800, February 2016.