References
- Mell, P., & Grance, T. (2009). ‘The NIST Definition of Cloud Computing.’ NIST Information Technology Laboratory. Retrieved on May 2011 from http://www.nist.gov/itl/cloud/upload/cloud-def-v15.pdf.
- Ross A. Lumley (2010). ‘Cyber Security and Privacy in Cloud Computing: Multidisciplinary Research Problems in Business.’ The George Washington University, Report GW-CSPRI-2010-4, December, 1-10.
- Arockiam, L., Monikandan, S., Parthasarathy, G. (2011). ‘Cloud Computing: A Survey.’ International Journal of Internet Computing, ISSN No: 2231 – 6965, Volume-1, Issue-2, 26-33.
- Arockiam et al. (2014). ‘Security Framework to Ensure the Confidentiality of Outsourced Data in Public Cloud Storage.’ International Journal of Current Engineering and Technology, Vol.4, No.3 (June 2014), 1270.
- Modi, C., Acha, K. (2017). ‘Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review.’ J. Supercomput., 73(3), 1192–1234.
- National vulnerability database—search and statistics. (2017). [Online]. Available: https://nvd.nist.gov/vuln/data-feeds/.
- Li, S.-H., Yen, D.C., Chen, S.-C., Chen, P.S., Lu, W.-H., Cho, C.-C. (2015). ‘Effects of virtualization on information security.’ Comput. Stand. Interfaces, 42, 1–8.
- Malware statistics & trends report: AV-TEST. AV. (n.d.). [Online]. Available: https://www.av-test.org/en/statistics/malware/.
- Patil, R., Modi, C. (2018). ‘Designing an efficient framework for vulnerability assessment and patching (VAP) in virtual environment of cloud computing.’ J. Supercomput., 75(5), 2862–2889.
- Alyas, T., Alissa, K., Alqahtani, M., Faiz, T., Alsaif, S.A., Tabassum, N., Naqvi, H.H. (2022). ‘Multi-Cloud Integration Security Framework Using Honeypots.’ Mobile Information Systems, 2022, 2600712, 1-13. https://doi.org/10.1155/2022/2600712.
- Yunlong, F., & Jie, L. (2024). ‘Incentive approaches for cloud computing: challenges and solutions.’ Journal of Engineering and Applied Science (Online), 71(1), 51-. https://doi.org/10.1186/s44147-024-00389-8.
- Marnerides, A.K., Spachos, P., Chatzimisios, P., Mauthe, A.U. (2015). ‘Malware detection in the cloud under ensemble empirical mode decomposition.’ In 2015 International Conference on Computing, Networking and Communications (ICNC), 82–88.
- Fattori, A., Lanzi, A., Balzarotti, D., Kirda, E. (2015). ‘Hypervisor-based malware protection with accessminer.’ Comput. Secur., 52, 33–50.
- Watson, M.R., Marnerides, A.K., Mauthe, A., Hutchison, D., et al. (2016). ‘Malware detection in cloud computing infrastructures.’ IEEE Trans. DependableSecur. Comput., 13(2), 192–205.
- Mishra, P., Pilli, E.S., Varadharajan, V., Tupakula, U. (2016). ‘Securing virtual machines from anomalies using program-behavior analysis in cloud environment.’ In 18th International Conference on Data Science and Systems (DSS), 991–998, IEEE.
- Xie, X., Wang, W. (2016). ‘Lightweight examination of dll environments in virtual machines to detect malware.’ In: 4th ACM International Workshop on Security in Cloud Computing, 10–16, ACM.
- Kumara, M.A., Jaidhar, C. (2017). ‘Leveraging virtual machine introspection with memory forensics to detect and characterize unknown malware using machine learning techniques at hypervisor.’ Digit. Investig., 23, 99–123.
- Jia, X., Zhou, G., Huang, Q., Zhang, W., Tian, D. (2017). ‘Findevasion: an effective environment-sensitive malware detection system for the cloud.’ In: International Conference on Digital Forensics and Cyber Crime, 3–17, Springer.
- Mishra, P., Pilli, E.S., Varadharajan, V., Tupakula, U. (2017). ‘Vaed: Vmi assisted evasion detection approach for infrastructure as a service cloud.’ Concurr. Comput. Pract. Exp., 29(12), e4133.
- Xu, Z., Ray, S., Subramanyan, P., Malik, S. (2017). ‘Malware detection using machine learning based analysis of virtual memory access patterns.’ In: Proceedings of the conference on design, automation & test in Europe, 169–174, European Design and Automation Association.
- Joseph, L., Mukesh, R. (2018). ‘Detection of malware attacks on virtual machines for a self-heal approach in cloud computing using vm snapshots.’ J. Commun. Softw. Syst., 14(3), 249–257.
- Patil, R., Dudeja, H., & Modi, C. (2020). ‘Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing.’ Int. J. Inf. Secur., 19, 147–162.
- ‘Advanced Malware.’ WatchGuard Technologies, 29 Nov. 2016, www.watchguard.com/wgrd-solutions/security-threats/advanced-malware.
- Menéndez, Héctor D., et al. (2021). ‘Getting Ahead of the Arms Race: Hothousing the Coevolution of VirusTotal With a Packer.’ Entropy, 23(4), 395. https://doi.org/10.3390/e23040395.
- Erocarrera. (n.d.). ‘Pefile: Pefile Is a Python Module to Read and Work With PE (Portable Executable) Files.’ GitHub, github.com/erocarrera/pefile.git.
- ‘Ransomeware Affected File Extension.’ www.fileextensions.org/search/extensions/search/Ransomware/is_ true_search/1/sortBy/extension/order/asc/page/1.
- Miller, Michael (2010). Cloud Computing: Web-Based Applications That Change the Way You Work and Collaborate Online. QueKnowledge and Grids, 105-112.
- Zhou, Minqi et al. (2008). ‘Security and Privacy in Cloud Computing: A Survey.’ In Proceedings of Sixth International Conference on Semantics, Publications, First Printing, Augutst, 149-150.
- Kavin, B. P., Ganapathy, S., Kanimozhi, U., Kannan, A. (2020). ‘An Enhanced Security Framework for Secured Data Storage and Communications in Cloud Using ECC, Access Control and LDSA.’ Wireless Personal Communications, 115(2), pp.1107-1135.
- Tabrizchi, H., Rafsanjani, M. K. (2020). ‘A survey on security challenges in cloud computing: issues, threats, and solutions.’ The Journal of Supercomputing, 76(12), pp.9493-9532.
- Kumar, P. R., Raj, P. H., Jelciana, P. (2018). ‘Exploring data security issues and solutions in cloud computing.’ Proc Comput Sci, 125:691–697.
- Naik, N., Jenkins, P., Savage, N., Yang, L. (2019). ‘Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors using Fuzzy Hashing and Fuzzy C-Means Clustering.’ In: 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), New Orleans, LA, USA, pp. 1-6, doi: 10.1109/FUZZ-IEEE.2019.8858825.
- Wilson, R., Iftimie, I. (2021). ‘Emerging ransomeware threats: An anticipatory ethical analysis.’ In: 2021 IEEE International Symposium on Technology and Society (ISTAS), Waterloo, ON, Canada, pp. 1-1, doi: 10.1109/ISTAS52410.2021.9629211.
- Singh, J., Refaey, A., Koilpillai, J. (2020). ‘Adoption of the software-defined perimeter (sdp) architecture for infrastructure as a service.’ Canadian Journal of Electrical and Computer Engineering, 43(4), pp. 357-363.
- Sun, P. J. (2020). ‘Security and privacy protection in cloud computing: Discussions and challenges.’ Journal of Network and Computer Applications, 160, 102642.
- Kumar, R., Goyal, R. (2019). ‘On cloud security requirements, threats, vulnerabilities and countermeasures: A survey.’ Computer Science Review, 33, 1-48.
- Anamika, A., Satya, V. (2013). ‘Ransomware Anatomy, Impact, and Mitigation Strategies.’ The journal of Machine Intelligence Research Lab (MIR lab).
- Suyogita, S., Satya, V. (2013). ‘Federated Learning for GDPR.’ The journal of Machine Intelligence Research Lab (MIR lab).
- Damiani E., De Capitani di Vimercati S., Foresti S., Jajodia S., Paraboschi S., and Samarati P. (2005). ‘Metadata management in outsourced encrypted databases.’ Springer-Verlag, Lecture Notes in Computer Science, In Proceedings of the 2nd VLDB Workshop on Secure Data Management, Trondheim, Norway, September, 1-17.
- Neves, Fatima Trindade, Fernando Cruz Marta, Ana Maria Ramalho Correia, Miguel de Castro Neto (2011). ‘The Adoption of Cloud Computing by SMEs: Identifying and Coping with External Factors.’ 11a Conferência da Associação Portuguesa de Sistemas de Informação, October, 1-11.
- Rehman, A. u., Hussain, M. (2011). ‘Efficient Cloud Data Confidentiality for DaaS.’ International Journal of Advanced Science and Technology, Vol. 35, October, pp. 1-10.
- Chow, R., Golle, P., Jakobsson, M., Masuoka, R., Molina, J., Shi, E., Staddon, J. (2009). ‘Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control.’ In: Proceedings of the ACM workshop on Cloud computing security, November, pp. 85-90.
- Huang, J.-Y., Liao, I.-E. (2012). ‘A Searchable Encryption Scheme for Outsourcing Cloud Storage.’ COMNETSAT ’12, IEEE, pp. 142-146.
- Kamara, S., Papamanthou, P. (2006). ‘Parallel and Dynamic Searchable Symmetric Encryption.’ In: Proceedings of the 13th ACM conference on Computer and communications security, ACM, NY, USA, October, pp. 79–88.
- Huawei Technologies Co., Ltd. (2023). Cloud Computing Technology (1st ed. 2023.). Springer Nature Singapore. https://doi.org/10.1007/978-981-19-3026-3
- Qurashi, M. A. (2023). ‘Securing Hypervisors in Cloud Computing Environments against Malware Injection.’ Indian Journal of Science and Technology, 16(39), 3386-3393. https://doi.org/10.17485/IJST/v16i39.1913
- Ahmad, W., Rasool, A., Javed, A. R., Baker, T., Jalil, Z. (2022). ‘Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey.’ Electronics, 11(1), 16. https://doi.org/10.3390/electronics11010016