19 research outputs found

    XML Schema-based Minification for Communication of Security Information and Event Management (SIEM) Systems in Cloud Environments

    Get PDF
    XML-based communication governs most of today's systems communication, due to its capability of representing complex structural and hierarchical data. However, XML document structure is considered a huge and bulky data that can be reduced to minimize bandwidth usage, transmission time, and maximize performance. This contributes to a more efficient and utilized resource usage. In cloud environments, this affects the amount of money the consumer pays. Several techniques are used to achieve this goal. This paper discusses these techniques and proposes a new XML Schema-based Minification technique. The proposed technique works on XML Structure reduction using minification. The proposed technique provides a separation between the meaningful names and the underlying minified names, which enhances software/code readability. This technique is applied to Intrusion Detection Message Exchange Format (IDMEF) messages, as part of Security Information and Event Management (SIEM) system communication hosted on Microsoft Azure Cloud. Test results show message size reduction ranging from 8.15% to 50.34% in the raw message, without using time-consuming compression techniques. Adding GZip compression to the proposed technique produces 66.1% shorter message size compared to original XML messages.Comment: XML, JSON, Minification, XML Schema, Cloud, Log, Communication, Compression, XMill, GZip, Code Generation, Code Readability, 9 pages, 12 figures, 5 tables, Journal Articl

    Malware Detection in Cloud Environment (MDCE)

    No full text
    Since cloud computing technology is growing day by day, it comes with many security problems, especially from threats such as malware. As more services migrate to the cloud architecture, the cloud will become a more appealing target for cyber criminals. In this paper, we present the current threats to the cloud environment, and the proposed detection systems for malware in the cloud environment. We then present a multiple detection system that is aimed at combating the spread of malware by cloud environment

    Security Problems in Cloud Computing

    No full text
    Cloud is a pool of computing resources which are distributed among cloud users. Cloud computing has many benefits like scalability, flexibility, cost savings, reliability, maintenance and mobile accessibility. Since cloud-computing technology is growing day by day, it comes with many security problems. Securing the data in the cloud environment is most critical challenges which act as a barrier when implementing the cloud. There are many new concepts that cloud introduces, such as resource sharing, multi-tenancy, and outsourcing, create new challenges for the security community. In this work, we provide a comparable study of cloud computing privacy and security concerns. We identify and classify known security threats, cloud vulnerabilities, and attacks

    Security Problems in Cloud Computing

    No full text
    Cloud is a pool of computing resources which are distributed among cloud users. Cloud computing has many benefits like scalability, flexibility, cost savings, reliability, maintenance and mobile accessibility. Since cloud-computing technology is growing day by day, it comes with many security problems. Securing the data in the cloud environment is most critical challenges which act as a barrier when implementing the cloud. There are many new concepts that cloud introduces, such as resource sharing, multi-tenancy, and outsourcing, create new challenges for the security community. In this work, we provide a comparable study of cloud computing privacy and security concerns. We identify and classify known security threats, cloud vulnerabilities, and attacks

    Data Dictionary Support for Reusing Components in Automatic Software Design

    No full text
    Software reuse approach is proposed as a technique to increase productivity of program development. We propose the data dictionary support to help in retrieving the software components that a programmer wants to use from the components repository, definition and synonyms of each component had been taken into consideration. We classify the components to classes according to its functionality. We apply a new technique to find the required component. This technique can generalize the semi-matched component to its super class, and then check the most suitable component at that class according to its instant variables and the similar names, and it can use definition check to compare between the retrieved component with the programmer requirement. The advantage of this technique is that the exact match is not necessary to find a similar software component

    E-Learning and Students' Motivation: A Research Study on the Effect of E-Learning on Higher Education

    No full text
    The information technology educational programs at most universities in Egypt face many obstacles that can be overcome using technology enhanced learning. An open source Moodle e-learning platform has been implemented at many universities in Egypt, as an aid to deliver e-content and to provide the institution with various possibilities for implementing asynchronous e-learning web-based modules. This paper shows that the use of interactive features of e-learning increases the motivation of the undergraduate students for the learning process
    corecore