Have a personal or library account? Click to login
Evaluating the efficacy of cloud workload protection platforms in hybrid and multicloud environments Cover

Evaluating the efficacy of cloud workload protection platforms in hybrid and multicloud environments

Open Access
|Feb 2026

References

  1. H. Thakkar and R. Lal, “An Analysis of Elliptic Curve Cryptography Secret Keys For Use In Cloud Workload Balancing And Security Provisioning,” 2023 International Conference on Applied Intelligence and Sustainable Computing (ICAISC), Dharwad, India, 2023, pp. 1–7
  2. R. R. Dornala, S. Ponnapalli, A. R. Lakshmi and K. T. Sai, “An Advanced Cloud Security and Load Balancing in Health Care Systems,” 2023 International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS), Erode, India, 2023, pp. 1–6
  3. M. A. Shibli, N. Ahmad, A. Kanwal and A. Ghafoor, “Secure virtual machine migration (SV2M) in cloud federation,” 2014 11th International Conference on Security and Cryptography (SECRYPT), Vienna, Austria, 2014
  4. S. Barjatiya and P. Saripalli, “BlueShield: A Layer 2 Appliance for Enhanced Isolation and Security Hardening among Multi-tenant Cloud Workloads,” 2012 IEEE Fifth International Conference on Utility and Cloud Computing, Chicago, IL, USA, 2012, pp. 195–198
  5. Sibi Chakkaravarthy Sethuraman, Devi Priya VS, Tarun Reddi, Mulka Sai Tharun Reddy, Muhammad Khurram Khan, “A Comprehensive Examination of Email Spoofing: Issues and Prospects for Email Security”, Computers & Security, Elsevier, vol. 135, 103490, 2023
  6. L. Wang, H. V. Ramasamy, R. Mahindru and R. Harper, “Activating Protection and Exercising Recovery Against Large-Scale Outages on the Cloud,” 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W), Toulouse, France, 2016, pp. 264–264
  7. S. Gopikrishnan, Sibi Chakkaravarthy Sethuraman, Gautam Srivastava, T Sudhakar, “CyTFS: Cyber-Twin Fog System for Delay Efficient Task Offloading in 6G Mobile Networks”, IEEE Internet of Things Journal, vol. 11, no. 14, pp. 24698–24714, 2024
  8. C. P. Smith, A. Jindal, M. Chadha, M. Gerndt and S. Benedict, “FaDO: FaaS Functions and Data Orchestrator for Multiple Serverless Edge-Cloud Clusters,” 2022 IEEE 6th International Conference on Fog and Edge Computing (ICFEC), Messina, Italy, 2022, pp. 17–25
  9. Aravinth T.M, Sibi Chakkaravarthy Sethuraman, Devi Priya VS, “mCaptcha: Replacing Captchas with Rate limiters to Improve Security and Accessibility”, Communications of the ACM, Volume 67, Issue 10, pp. 70 – 80, 2024
  10. C. Gritti, M. Önen and R. Molva, “CHARIOT: Cloud-Assisted Access Control for the Internet of Things,” 2018 16th Annual Conference on Privacy, Security and Trust (PST), Belfast, Ireland, 2018, pp. 1–6
  11. Sibi Chakkaravarthy Sethuraman, Devi Priya, Saraju P Mohanty, “Flow based containerized honeypot approach for network traffic analysis: An empirical study”, Computer Science Review, Elsevier, vol. 50, 100600, 2023
  12. G. Kornaros, D. Bakoyiannis, O. Tomoutzoglou and M. Coppola, “From Cloud to IoT Device Authenticity under Kubernetes Management,” 2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Malmö, Sweden, 2024, pp. 218–223
  13. Devi Priya, Sibi Chakkaravarthy Sethuraman, Muhammad Khurram Khan, “Container Security: Precaution levels, Mitigation Strategies, and Research Perspectives”, Computers & Security, Elsevier, vol. 135, 103490, 2023
  14. K. Gai, M. Qiu and S. A. Elnagdy, “Security-Aware Information Classifications Using Supervised Learning for Cloud-Based Cyber Risk Management in Financial Big Data,” 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), New York, NY, USA, 2016, pp. 197–202
  15. Devi Priya VS, Sibi Chakkaravarthy Sethuraman, “Containerized cloud-based honeypot deception for tracking attackers”, Scientific Reports, Nature, Vol. 13, Issue.1, 1437
  16. S. Berger et al., “Security intelligence for cloud management infrastructures,” in IBM Journal of Research and Development, vol. 60, no. 4, pp. 11:1–11:13, July–Aug. 2016
  17. M. Gopinath, Sibi Chakkaravarthy Sethuraman, “A comprehensive survey on deep learning-based malware detection techniques”, Computer Science Review, Vol. 47, 100529, Elsevier, February 2023
  18. B. D. Deebak and F. Al-Turjman, “Smart Mutual Authentication Protocol for Cloud Based Medical Healthcare Systems Using Internet of Medical Things,” in IEEE Journal on Selected Areas in Communications, vol. 39, no. 2, pp. 346–360, Feb. 2021
  19. Sibi Chakkaravarthy Sethuraman, Aditya Mitra, Kuan-Ching Li, Anisha Ghosh, M Gopinath, Nitin Sukhija, “Loki: A Physical Security Key Compatible IoT Based Lock for Protecting Physical Assets”, IEEE Access, Vol.10, 112721–112730, IEEE
  20. Q. Wang, Q. Wang, H. Zhu and X. Wang, “Enabling Collaborative Computing Sustainably Through Computational Latency-Based Pricing,” in IEEE Transactions on Sustainable Computing, vol. 5, no. 4, pp. 541–551, 1 Oct.–Dec. 2020
  21. Dedipyaman Das, Sibi Chakkaravarthy Sethuraman, Suresh Chandra Satapathy, “A Decentralized Open Web Cryptographic Standard”, Computers and Electrical Engineering, Elsevier, Volume 99, 107751, April, 2022
  22. S. Liu, L. Liu, J. Tang, B. Yu, Y. Wang and W. Shi, “Edge Computing for Autonomous Driving: Opportunities and Challenges,” in Proceedings of the IEEE, vol. 107, no. 8, pp. 1697–1716, Aug. 2019
  23. Pranav Kompally, Sibi Chakkaravarthy Sethuraman, Steven Walczak, Samuel Johnson, Meenaloshini Vimal Cruz, “MaLang: Decentralized Deep Learning Approach to Detect Abusive Textual Content”, Applied Sciences: Computing and Artificial Intelligence, 11, 8701, 2021
  24. M. Kucab, P. Boryło and P. Chołda, “Hardware-Assisted Static and Runtime Attestation for Cloud Deployments,” in IEEE Transactions on Cloud Computing, vol. 11, no. 4, pp. 3750–3765, Oct.–Dec. 2023
  25. Y. Cho, Y. Kim, K. Kim, J. Kim, H. -Y. Kim and Y. Kim, “Optimizing Multi-Level Checkpointing for Distributed Deep Learning Workloads on Cloud Spot VM Clusters,” in IEEE Access, vol. 12, pp. 116891–116904, 2024
Language: English
Submitted on: Feb 25, 2025
|
Published on: Feb 20, 2026
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2026 R. Prithviraj, R. Saminathan, R. Manishankar, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.