{"id":"https://openalex.org/W2785057828","doi":"https://doi.org/10.1145/3136825.3136905","title":"A framework for data security in cloud using collaborative intrusion detection scheme","display_name":"A framework for data security in cloud using collaborative intrusion detection scheme","publication_year":2017,"publication_date":"2017-10-13","ids":{"openalex":"https://openalex.org/W2785057828","doi":"https://doi.org/10.1145/3136825.3136905","mag":"2785057828"},"language":"en","primary_location":{"id":"doi:10.1145/3136825.3136905","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3136825.3136905","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th International Conference on Security of Information and Networks","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://researchrepository.napier.ac.uk/Output/1008123","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035588671","display_name":"Upasana T. Nagar","orcid":null},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Upasana Nagar","raw_affiliation_strings":["University of Technology Sydney"],"affiliations":[{"raw_affiliation_string":"University of Technology Sydney","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045431254","display_name":"Priyadarsi Nanda","orcid":"https://orcid.org/0000-0002-5748-155X"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Priyadarsi Nanda","raw_affiliation_strings":["University of Technology Sydney"],"affiliations":[{"raw_affiliation_string":"University of Technology Sydney","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006921134","display_name":"Xiangjian He","orcid":"https://orcid.org/0000-0001-8962-540X"},"institutions":[{"id":"https://openalex.org/I114017466","display_name":"University of Technology Sydney","ror":"https://ror.org/03f0f6041","country_code":"AU","type":"education","lineage":["https://openalex.org/I114017466"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Xiangjian He","raw_affiliation_strings":["University of Technology Sydney"],"affiliations":[{"raw_affiliation_string":"University of Technology Sydney","institution_ids":["https://openalex.org/I114017466"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044811454","display_name":"Zhiyuan Tan","orcid":"https://orcid.org/0000-0001-5420-2554"},"institutions":[{"id":"https://openalex.org/I251738","display_name":"Edinburgh Napier University","ror":"https://ror.org/03zjvnn91","country_code":"GB","type":"education","lineage":["https://openalex.org/I251738"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Zhiyuan(Thomas) Tan","raw_affiliation_strings":["Edinburgh Napier University"],"affiliations":[{"raw_affiliation_string":"Edinburgh Napier University","institution_ids":["https://openalex.org/I251738"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5035588671"],"corresponding_institution_ids":["https://openalex.org/I114017466"],"apc_list":null,"apc_paid":null,"fwci":1.517,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.88473923,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":"3","issue":null,"first_page":"188","last_page":"193"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.927880585193634},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7626216411590576},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.71875},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6722404956817627},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5631013512611389},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.48932474851608276},{"id":"https://openalex.org/keywords/distrust","display_name":"Distrust","score":0.4308684468269348},{"id":"https://openalex.org/keywords/cloud-testing","display_name":"Cloud testing","score":0.41723600029945374},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.20316234230995178}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.927880585193634},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7626216411590576},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.71875},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6722404956817627},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5631013512611389},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.48932474851608276},{"id":"https://openalex.org/C2778321746","wikidata":"https://www.wikidata.org/wiki/Q621922","display_name":"Distrust","level":2,"score":0.4308684468269348},{"id":"https://openalex.org/C120115606","wikidata":"https://www.wikidata.org/wiki/Q5135723","display_name":"Cloud testing","level":4,"score":0.41723600029945374},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.20316234230995178},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/3136825.3136905","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3136825.3136905","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 10th International Conference on Security of Information and Networks","raw_type":"proceedings-article"},{"id":"pmh:oai:napier-surface.worktribe.com:1008123","is_oa":true,"landing_page_url":"http://researchrepository.napier.ac.uk/Output/1008123","pdf_url":null,"source":{"id":"https://openalex.org/S4306400544","display_name":"Research Output (Edinburgh Napier University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I251738","host_organization_name":"Edinburgh Napier University","host_organization_lineage":["https://openalex.org/I251738"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Proceeding"},{"id":"pmh:oai:opus.lib.uts.edu.au:10453/121936","is_oa":false,"landing_page_url":"http://hdl.handle.net/10453/121936","pdf_url":null,"source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Proceeding"}],"best_oa_location":{"id":"pmh:oai:napier-surface.worktribe.com:1008123","is_oa":true,"landing_page_url":"http://researchrepository.napier.ac.uk/Output/1008123","pdf_url":null,"source":{"id":"https://openalex.org/S4306400544","display_name":"Research Output (Edinburgh Napier University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I251738","host_organization_name":"Edinburgh Napier University","host_organization_lineage":["https://openalex.org/I251738"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference Proceeding"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6399999856948853,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1489073918","https://openalex.org/W1574164692","https://openalex.org/W1641762327","https://openalex.org/W1847647515","https://openalex.org/W1984922480","https://openalex.org/W2005182641","https://openalex.org/W2018671131","https://openalex.org/W2048794438","https://openalex.org/W2065042218","https://openalex.org/W2081612064","https://openalex.org/W2087056765","https://openalex.org/W2109026747","https://openalex.org/W2110890874","https://openalex.org/W2124563017","https://openalex.org/W2132539529","https://openalex.org/W2140396462","https://openalex.org/W2154158105","https://openalex.org/W2186252742","https://openalex.org/W2275530856","https://openalex.org/W2394932100","https://openalex.org/W2470845252","https://openalex.org/W2507351359","https://openalex.org/W2516477161","https://openalex.org/W2522010150","https://openalex.org/W2522110096","https://openalex.org/W2531967557","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W191275436","https://openalex.org/W4238737051","https://openalex.org/W2046722858","https://openalex.org/W3145857732","https://openalex.org/W2077430250","https://openalex.org/W2931996793","https://openalex.org/W3174931267","https://openalex.org/W78285473","https://openalex.org/W2949652405","https://openalex.org/W3194359722"],"abstract_inverted_index":{"Cloud":[0],"computing":[1,27,99],"offers":[2],"an":[3,191],"on":[4,20,117,244],"demand,":[5],"elastic,":[6],"global":[7],"network":[8],"access":[9,177],"to":[10,34,50,54,107,142,163,167,189,194,233],"a":[11,120,172,186,206,241],"shared":[12],"pool":[13],"of":[14,25,94,115,223,240],"resources":[15],"that":[16],"can":[17],"be":[18,159],"configured":[19],"user":[21,232],"demand.":[22],"The":[23,221],"advantages":[24],"cloud":[26,52,62,70,76,84,90,109,125,130,165,181,214,227],"are":[28,42,77,104,139,228],"lucrative":[29],"for":[30,68,123,132,209],"well-established":[31],"organizations":[32],"looking":[33],"reduce":[35],"infrastructure":[36],"cost":[37],"overheads.":[38],"However,":[39],"the":[40,51,61,69,75,83,89,92,108,129,164,199,213,230,238],"users":[41],"not":[43,105,158],"quite":[44],"confident":[45],"in":[46,60,74,79,88,127,161,175,198,212,226,237],"entrusting":[47],"their":[48,133],"data":[49,98,118,169,210],"due":[53,166],"security":[55,87,102,211],"threats":[56],"and":[57,71,101,113,153,171],"risks":[58],"perceived":[59],"domain.":[63],"Issues":[64],"involving":[65,151],"privacy":[66],"requirements":[67],"best":[72],"practices":[73],"suggested":[78],"this":[80,202],"paper.":[81],"Although":[82],"provider":[85],"ensures":[86],"yet":[91],"flow":[93],"data,":[95],"storage":[96,170],"location,":[97],"process":[100],"breaches":[103],"transparent":[106],"customer.":[110],"This":[111],"distrust":[112],"lack":[114],"control":[116],"is":[119,185],"major":[121,173],"hindrance":[122],"potential":[124],"customers":[126],"adopting":[128],"models":[131],"businesses.":[134],"Intrusion":[135,217],"Detection":[136,218],"Systems":[137],"(IDSs)":[138],"widely":[140],"used":[141],"detect":[143],"malicious":[144],"activities.":[145],"However":[146],"existing":[147],"solutions":[148],"with":[149],"IDSs":[150],"DDoS":[152,196],"other":[154],"non-detectable":[155],"events":[156],"may":[157],"suitable":[160],"applying":[162],"distributed":[168,242],"shift":[174],"Internet":[176],"mechanisms":[178],"offered":[179],"by":[180],"providers.":[182],"Hence":[183],"there":[184],"strong":[187],"need":[188],"analyze":[190],"appropriate":[192],"IDS":[193],"counter":[195],"attacks":[197],"cloud.":[200,245],"In":[201],"paper":[203],"we":[204],"propose":[205],"novel":[207],"framework":[208],"using":[215],"Collaborative":[216],"(CIDS)":[219],"scheme.":[220],"benefits":[222],"CIDS":[224],"scheme":[225],"enabling":[229],"end":[231],"get":[234],"comprehensive":[235],"information":[236],"event":[239],"attack":[243]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
