{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:17:58Z","timestamp":1771467478024,"version":"3.50.1"},"reference-count":94,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T00:00:00Z","timestamp":1711324800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Deanship of Scientific Research at Prince Sattam bin Abdulaziz University","award":["PSAU\/2024\/R\/1445"],"award-info":[{"award-number":["PSAU\/2024\/R\/1445"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>This study provides a comprehensive review and comparative analysis of existing Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data leakage in complex cloud systems. Traditional methods impose significant overhead on Cloud Service Providers (CSPs) and management activities, prompting the exploration of alternatives such as IFT. By augmenting consumer data subsets with security tags and deploying a network of monitors, IFT facilitates the detection and prevention of data leaks among cloud tenants. The research here has focused on preventing misuse, such as the exfiltration and\/or extrusion of sensitive data in the cloud as well as the role of anonymization. The CloudMonitor framework was envisioned and developed to study and design mechanisms for transparent and efficient IFT (eIFT). The framework enables the experimentation, analysis, and validation of innovative methods for providing greater control to cloud service consumers (CSCs) over their data. Moreover, eIFT enables enhanced visibility to assess data conveyances by third-party services toward avoiding security risks (e.g., data exfiltration). Our implementation and validation of the framework uses both a centralized and dynamic IFT approach to achieve these goals. We measured the balance between dynamism and granularity of the data being tracked versus efficiency. To establish a security and performance baseline for better defense in depth, this work focuses primarily on unique Dynamic IFT tracking capabilities using e.g., Infrastructure as a Service (IaaS). Consumers and service providers can negotiate specific security enforcement standards using our framework. Thus, this study orchestrates and assesses, using a series of real-world experiments, how distinct monitoring capabilities combine to provide a comparatively higher level of security. Input\/output performance was evaluated for execution time and resource utilization using several experiments. The results show that the performance is unaffected by the magnitude of the input\/output data that is tracked. In other words, as the volume of data increases, we notice that the execution time grows linearly. However, this increase occurs at a rate that is notably slower than what would be anticipated in a strictly proportional relationship. The system achieves an average CPU and memory consumption overhead profile of 8% and 37% while completing less than one second for all of the validation test runs. The results establish a performance efficiency baseline for a better measure and understanding of the cost of preserving confidentiality, integrity, and availability (CIA) for cloud Consumers and Providers (C&amp;P). Consumers can scrutinize the benefits (i.e., security) and tradeoffs (memory usage, bandwidth, CPU usage, and throughput) and the cost of ensuring CIA can be established, monitored, and controlled. This work provides the primary use-cases, formula for enforcing the rules of data isolation, data tracking policy framework, and the basis for managing confidential data flow and data leak prevention using the CloudMonitor framework.<\/jats:p>","DOI":"10.3390\/fi16040110","type":"journal-article","created":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T12:28:06Z","timestamp":1711369686000},"page":"110","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Cloud Security Using Fine-Grained Efficient Information Flow Tracking"],"prefix":"10.3390","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-5725-9390","authenticated-orcid":false,"given":"Fahad","family":"Alqahtani","sequence":"first","affiliation":[{"name":"Department of Computer Science, Prince Sattam Bin Abdulaziz University, Al-Kharj 16278, Saudi Arabia"}]},{"given":"Mohammed","family":"Almutairi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Idaho, Moscow, ID 83843, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1241-2750","authenticated-orcid":false,"given":"Frederick T.","family":"Sheldon","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University of Idaho, Moscow, ID 83843, USA"}]}],"member":"1968","published-online":{"date-parts":[[2024,3,25]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1016\/j.ijinfomgt.2019.09.002","article-title":"An empirical study on business analytics affordances enhancing the management of cloud computing data security","volume":"50","author":"Wang","year":"2020","journal-title":"Int. J. Inf. Manag."},{"key":"ref_2","first-page":"39","article-title":"The origin and construct of cloud computing","volume":"9","author":"Daylami","year":"2015","journal-title":"Int. J. Acad. Bus. World"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13677-017-0102-3","article-title":"CFaaS: Bilaterally agreed evidence collection","volume":"7","author":"Moussa","year":"2018","journal-title":"J. Cloud Comput. Adv. Syst. Appl."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/j.csi.2019.02.002","article-title":"Improved TOPSIS: A multi-criteria decision making for research productivity in cloud security","volume":"65","author":"Garg","year":"2019","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Moussa, A.N., Ithnin, N.B., and Miaikil, O.A. (2014, January 12\u201314). Conceptual forensic readiness framework for infrastructure-as-a-service consumers. Proceedings of the 2014 IEEE Conference on Systems, Process and Control (ICSPC 2014), Kuala Lumpur, Malaysia.","DOI":"10.1109\/SPC.2014.7086250"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.cosrev.2019.05.002","article-title":"On cloud security requirements, threats, vulnerabilities and countermeasures: A survey","volume":"33","author":"Kumar","year":"2019","journal-title":"Comput. Sci. Rev."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Moussa, A.N., Ithnin, N., Almolhis, N., and Zainal, A. (2019, January 2\u20133). A Consumer-Oriented Cloud Forensic Process Model. Proceedings of the IEEE 10th Control and System Graduate Research Colloquium (ICSGRC), Shah Alam, Malaysia.","DOI":"10.1109\/ICSGRC.2019.8837096"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"102071","DOI":"10.1016\/j.simpat.2020.102071","article-title":"Stackelberg game modeling of Cloud security defending strategy in the case of information leaks and corruption","volume":"103","year":"2020","journal-title":"Simul. Model. Pract. Theory"},{"key":"ref_9","unstructured":"Calzavara, S. (2020). Security II-Same Origin Policy, Universita Ca\u2019 Foscari Venezia."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Roth, S., Barron, T., Calzavara, S., Nikiforakis, N., and Stock, B. (2020, January 23\u201326). Complex Security Policy? A Longitudinal Analysis of Deployed Content Security Policies. Proceedings of the 27th Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA.","DOI":"10.14722\/ndss.2020.23046"},{"key":"ref_11","unstructured":"Dehoumon, N. (2020). Controlled-Environment Facility Resident Communications Employing Cross-Origin Resource Sharing (USPTO 10,581,871). (10,581,871), U.S. Patent."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Jadidi, M.S., Zaborski, M., Kidney, B., and Anderson, J. (2019). CapExec: Towards Transparently-Sandboxed Services (Extended Version). arXiv.","DOI":"10.23919\/CNSM46954.2019.9012736"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/j.vlsi.2019.08.001","article-title":"A high-level information flow tracking method for detecting information leakage","volume":"69","author":"Wang","year":"2019","journal-title":"Integration"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Almolhis, N., Alashjaee, A.M., Duraibi, S., Alqahtani, F., and Moussa, A.N. (2020, January 28\u201329). The Security Issues in IoT-Cloud: A Review. Proceedings of the 16th IEEE International Colloquium on Signal Processing & Its Applications (CSPA), Langkawi, Malaysia.","DOI":"10.1109\/CSPA48992.2020.9068693"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.jnca.2019.02.015","article-title":"Cloud storage auditing with deduplication supporting different security levels according to data popularity","volume":"134","author":"Hou","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_16","unstructured":"Walia, M.K., Halgamuge, M.N., Hettikankanamage, N.D., and Bellamy, C. (2019). Handbook of Research on the IoT, Cloud Computing, and Wireless Network Optimization, IGI Global."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1016\/j.clsr.2012.03.003","article-title":"Protecting the privacy and security of sensitive customer data in the cloud","volume":"28","author":"King","year":"2012","journal-title":"Comput. Law Secur. Rep."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"996","DOI":"10.1016\/j.tele.2017.04.010","article-title":"A framework for critical security factors that influence the decision of cloud adoption by Saudi government agencies","volume":"34","author":"Alassafi","year":"2017","journal-title":"Telemat. Inform."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1016\/j.procs.2017.06.124","article-title":"A Comprehensive Survey on Security in Cloud Computing","volume":"110","author":"Ramachandra","year":"2017","journal-title":"Procedia Comput. Sci."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Bowers, K.D., Juels, A., and Oprea, A. (2009, January 9\u201313). HAIL: A high-availability and integrity layer for Cloud storage. Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, IL, USA.","DOI":"10.1145\/1653662.1653686"},{"key":"ref_21","unstructured":"PS, L.R. (2018). Google Cloud Platform Cookbook: Implement, Deploy, Maintain, and Migrate Applications on Google Cloud Platform, Packet Publishing Ltd."},{"key":"ref_22","unstructured":"Barsoum, A.F., and Hasan, M.A. (2010). Provable Possession and Replication of Data over Cloud Servers, Centre for Applied Cryptographic Research (CACR), University of Waterloo."},{"key":"ref_23","unstructured":"Juels, A., and Kaliski, B.S. (October, January 2). PORs: Proofs of retrievability for large files. Proceedings of the 14th ACM conference on Computer and Communications Security, New York, NY, USA."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"442","DOI":"10.1007\/s00145-012-9129-2","article-title":"Compact Proofs of Retrievability","volume":"26","author":"Shacham","year":"2013","journal-title":"J. Cryptol."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1216","DOI":"10.1093\/comjnl\/bxz151","article-title":"Improved Proofs of Retrievability and Replication for Data Availability in Cloud Storage","volume":"63","author":"Guo","year":"2020","journal-title":"Comput. J."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11432-020-2997-0","article-title":"Secure network coding from secure proof of retrievability","volume":"64","author":"Chang","year":"2021","journal-title":"Sci. China Inf. Sci."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Gritti, C. (2020, January 17\u201319). Publicly Verifiable Proofs of Data Replication and Retrievability for Cloud Storage. Proceedings of the International Computer Symposium (ICS), Tainan, Taiwan.","DOI":"10.1109\/ICS51289.2020.00091"},{"key":"ref_28","unstructured":"Kumar, R., and Goyal, R. (2021). Computer Networks and Inventive Communication Technologies, Springer."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1186\/s13677-020-00214-6","article-title":"A secure data deduplication system for integrated cloud-edge networks","volume":"9","author":"Shynu","year":"2020","journal-title":"J. Cloud Comput."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1340","DOI":"10.1016\/j.proeng.2017.01.286","article-title":"Research on data security technology based on Cloud storage","volume":"174","author":"Wang","year":"2017","journal-title":"Procedia Eng."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"1577","DOI":"10.1093\/comjnl\/bxy067","article-title":"Efficient Privacy-Preserving Data Sanitization over Cloud Using Optimal GSA Algorithm","volume":"61","author":"Renuga","year":"2018","journal-title":"Comput. J."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"68449","DOI":"10.1109\/ACCESS.2020.2985870","article-title":"CloudDLP: Transparent and Scalable Data Sanitization for Browser-Based Cloud Storage","volume":"8","author":"Han","year":"2020","journal-title":"IEEE Access"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"709","DOI":"10.21817\/indjcse\/2021\/v12i3\/211203229","article-title":"An Optimal Sanitization Algorithm Based Secure Migration of Virtual Machines in Cloud Datacenters","volume":"12","author":"John","year":"2021","journal-title":"Indian J. Comput. Sci. Eng."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Pasquier, T.F.M., and Powles, J.E. (2015, January 9\u201313). Expressing and enforcing location requirements in the cloud using information flow control. Proceedings of the 2015 IEEE International Conference on Cloud Engineering, Tempe, AZ, USA.","DOI":"10.1109\/IC2E.2015.71"},{"key":"ref_35","unstructured":"Dontov, D., and Klymenko, M. (2019). Decentralized Access Control for Cloud Services. (16\/183,575), U.S. Patent."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.ins.2019.01.074","article-title":"Fine-grained Information Flow Tracking using attributes","volume":"484","author":"Han","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Gollamudi, A., Chong, S., and Arden, O. (2019, January 25\u201328). Information Flow Tracking for distributed trusted execution environments. Proceedings of the IEEE 32nd Computer Security Foundations Symposium (CSF), Hoboken, NJ, USA.","DOI":"10.1109\/CSF.2019.00028"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1016\/j.jss.2004.03.017","article-title":"An agent-based inter-application information flow control model","volume":"75","author":"Chou","year":"2005","journal-title":"J. Syst. Softw."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/TNSM.2013.122313.130423","article-title":"Information Flow Control for Secure Cloud Computing","volume":"11","author":"Bacon","year":"2014","journal-title":"IEEE Etransactions Netw. Serv. Manag."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Niu, B., and Tan, G. (2013, January 8\u201310). Efficient user-space Information Flow Tracking. Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, New York, NY, USA.","DOI":"10.1145\/2484313.2484328"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1145\/3276488","article-title":"Secure serverless computing using dynamic information flow control","volume":"2","author":"Alpernas","year":"2018","journal-title":"Proc. ACM Program. Lang."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1433","DOI":"10.1007\/s11227-014-1235-5","article-title":"CloudTaint: An elastic taint tracking framework for malware detection in the cloud","volume":"70","author":"Yuan","year":"2014","journal-title":"J. Supercomput."},{"key":"ref_43","first-page":"292","article-title":"NIST Cloud Computing Reference Architecture","volume":"500","author":"Liu","year":"2011","journal-title":"NIST Spec. Publ."},{"key":"ref_44","first-page":"50","article-title":"The NIST Definition of Cloud Computing","volume":"53","author":"Mell","year":"2010","journal-title":"Commun. ACM"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.istr.2008.02.003","article-title":"Dynamic taint propagation: Finding vulnerabilities without attacking","volume":"13","author":"Chess","year":"2008","journal-title":"Inf. Secur. Tech. Rep."},{"key":"ref_46","first-page":"3","article-title":"Labels and event processes in the Asbestos operating system","volume":"25","author":"Efstathopoulos","year":"2007","journal-title":"ACM Trans. Comput. Syst."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Papagiannis, I., and Pietzuch, P. (2012, January 19). Cloudfilter: Practical control of sensitive data propagation to the cloud. Proceedings of the ACM Workshop on Cloud Computing Security Workshop, New York, NY, USA.","DOI":"10.1145\/2381913.2381931"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/2018396.2018419","article-title":"Making information flow explicit in HiStar","volume":"54","author":"Zeldovich","year":"2011","journal-title":"Commun. ACM"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1145\/1323293.1294293","article-title":"Information Flow Tracking for standard OS abstractions","volume":"41","author":"Krohn","year":"2007","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Wang, X., Ma, H., Yang, K., and Liang, H. (2015, January 3\u20135). An Uneven Distributed System for Dynamic Taint Analysis Framework. Proceedings of the 2nd International Conference on Cyber Security and Cloud Computing, New York, NY, USA.","DOI":"10.1109\/CSCloud.2015.20"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Pappas, V., Kemerlis, V.P., Zavou, A., Polychronakis, M., and Keromytis, A.D. (2013, January 23\u201325). CloudFence: Data Flow Tracking as a Cloud Service. Proceedings of the International Workshop on Recent Advances in Intrusion Detection, Gros Islet, Saint Lucia.","DOI":"10.1007\/978-3-642-41284-4_21"},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"e4729","DOI":"10.1002\/cpe.4729","article-title":"Secure-CamFlow: A device-oriented security model to assist information flow control systems in cloud environments for IoTs","volume":"31","author":"Khurshid","year":"2019","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"ref_53","first-page":"1408","article-title":"A Simplified Rule Based Distributed Information Flow Control for Cloud Computing","volume":"6","author":"Joshi","year":"2015","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1016\/j.giq.2016.01.012","article-title":"Beyond the Castle Model of cyber-risk and cyber-security","volume":"33","author":"Leuprecht","year":"2016","journal-title":"Gov. Inf. Q."},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Sun, Y., Petracca, G., Ge, X., and Jaeger, T. (2016, January 5\u20138). Pileus: Protecting user resources from vulnerable cloud services. Proceedings of the 32nd Annual Conference on Computer Security Applications, New York, NY, USA.","DOI":"10.1145\/2991079.2991109"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Shyamasundar, R.K., Kumar, N.N., and Rajarajan, M. (2016, January 12\u201314). Information-Flow Control for Building Security and Privacy Preserving Hybrid Clouds. Proceedings of the 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS), Sydney, NSW, Australia.","DOI":"10.1109\/HPCC-SmartCity-DSS.2016.0201"},{"key":"ref_57","first-page":"22","article-title":"Software as a Service Placement in the Cloud Computing Using Genetic Algorithm","volume":"6","author":"Shahidinejad","year":"2020","journal-title":"Int. J. Ser. Eng. Sci."},{"key":"ref_58","unstructured":"Hazelwood, K., Kaeli, D., Connors, D., and Reddi, V.J. (2023, February 09). Using Pin for Compiler and Computer Architecture Research and Education. Available online: https:\/\/www.intel.com\/content\/dam\/develop\/external\/us\/en\/documents\/pldi2007-pintutorial-256675.pdf."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Armknecht, F., Bohli, J.M., Karame, G.O., and Youssef, F. (2015, January 12\u201316). Transparent Data Deduplication in the Cloud. Proceedings of the Conference on Computer and Communications Security, New York, NY, USA.","DOI":"10.1145\/2810103.2813630"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Min, S.L., Pettit, R., Puschner, P., and Ungerer, T. (2010). Software Technologies for Embedded and Ubiquitous Systems, Springer Science & Business Media.","DOI":"10.1007\/978-3-642-16256-5"},{"key":"ref_61","unstructured":"Vachharajani, N., Bridges, M.J., Chang, J., Rangan, R., Ottoni, G., Blome, J.A., Reis, G.A., Vachharajani, M., and August, D.I. (2004, January 4\u20138). RIFLE: An Architectural Framework for User-Centric Information-Flow Security. Proceedings of the International Symposium on Microarchitecture, Los Alamitos, CA, USA."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Suh, G.E., Lee, J.W., Zhang, D., and Devadas, S. (2004, January 9\u201313). Secure program execution via dynamic information flow tracking. Proceedings of the ASPLOS XI: Eleventh International Conference on Architectural Support for Programming Languages and Operating Systems, Boston, MA, USA.","DOI":"10.1145\/1024393.1024404"},{"key":"ref_63","unstructured":"Zeldovich, N., Boyd-Wickizer, S., and Mazieres, D. (2008, January 15). Securing Distributed Systems with Information Flow Tracking. Proceedings of the NSDI \u201908: 5th USENIX Symposium on Networked Systems Design USENIX, San Francisco, CA, USA."},{"key":"ref_64","unstructured":"Cheng, W., Ports, D.R., Schultz, D., Popic, V., Blankstein, A., Cowling, J., Curtis, D., Shrira, L., and Liskov, B. (2012, January 13\u201315). Abstractions for usable Information Flow Tracking in Aeolus. Proceedings of the 2012 USENI Annual Technical Conference (USENI ATC 12), Boston, MA, USA."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Hosek, P., Migliavacca, M., Papagiannis, I., Eyers, D.M., Evans, D., Shand, B., Bacon, J., and Pietzuck, P. (2011). SafeWeb: A Middleware for Securing Ruby-Based Web Applications, Springer.","DOI":"10.1007\/978-3-642-25821-3_25"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Waschke, M. (2015). How Clouds Hold IT Together: Integrating Architecture with Cloud Deployment, Apress L.P.. [1st ed.].","DOI":"10.1007\/978-1-4302-6167-4"},{"key":"ref_67","unstructured":"Geetha, P., and CR, R.R. (2019, January 18\u201319). SAMR: Optimal Workflow of VMs in Cloud Computing. Proceedings of the International Conference on Recent Trends in Computing, Communication and Networking Technologies (ICRTCCNT\u201919), Tamil Nadu, India."},{"key":"ref_68","unstructured":"Dick, R.S., Detmer, D.E., and Steen, E.B. (1997). The Computer-Based Patient Record, National Academies Press."},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Ye, K. (2022). Cloud Computing\u2014CLOUD 2021, Springer Nature.","DOI":"10.1007\/978-3-030-96326-2"},{"key":"ref_70","unstructured":"Site, B.W. (2023, February 09). TEMU: The BitBlaze Dynamic Analysis Component. Available online: https:\/\/bitblaze.cs.berkeley.edu\/temu.html."},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Stone, G.R., and Bollinger, L.C. (2021). National Security, Leaks and Freedom of the Press: The Pentagon Papers Fifty Years On, Oxford University Press.","DOI":"10.1093\/oso\/9780197519387.001.0001"},{"key":"ref_72","unstructured":"Ackerman, P. (2021). Section 2: Industrial Cybersecurity\u2014Security Monitoring, Packt Publishing, Limited."},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.cose.2016.02.003","article-title":"A network based document management model to prevent data extrusion","volume":"59","author":"Morovati","year":"2016","journal-title":"Comput. Secur."},{"key":"ref_74","unstructured":"Rajole, V. (2013). Causes of Data Breaches and Preventive Measures. Data Loss Prevention, GRIN Verlag."},{"key":"ref_75","unstructured":"Scribe, J., and Guan, J. (2023, February 09). Lecture 4: Dynamic Analysis and Fuzzing Presentation Logistics. Available online: https:\/\/www.cs.columbia.edu\/~suman\/dynamic_analysis_notes.pdf."},{"key":"ref_76","first-page":"53","article-title":"Dynamic Binary Instrumentation Tool for Data Locality Analysis. St. Petersburg State Polytechnical University Journal. Computer Science","volume":"236","author":"Levchenko","year":"2016","journal-title":"Telecommun. Control. Syst."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"797","DOI":"10.1002\/spe.981","article-title":"Communicating between the kernel and user-space in Linux using Netlink sockets","volume":"40","author":"Gasca","year":"2010","journal-title":"Softw. Pract. Exp."},{"key":"ref_78","unstructured":"Dwivedi, H. (2003). Implementing SSH, John Wiley & Sons."},{"key":"ref_79","unstructured":"Garfinkel, S., and Spafford, G. (2001). Web Security, Privacy & Commerce, O\u2019Reilly Media, Incorporated. [2nd ed.]."},{"key":"ref_80","unstructured":"Diogenes, Y., and Ozkaya, E. (2022). Cybersecurity\u2014Attack and Defense Strategies, Packt Publishing Ltd."},{"key":"ref_81","unstructured":"Handbook, L. (2023, February 09). How to Find Process ID (PID and PPID) in Linux. Available online: https:\/\/linuxhandbook.com\/find-process-id\/."},{"key":"ref_82","unstructured":"Manual, D.M.-C. (2023, February 09). Neo4j Graph Data Platform. Available online: https:\/\/neo4j.com\/docs\/operations-manual\/current\/database-administration\/."},{"key":"ref_83","unstructured":"IBM (2023, February 09). What Are NoSQL Databases?. Available online: www.ibm.com\/topics\/nosql-databases."},{"key":"ref_84","first-page":"29","article-title":"A Tour of the Computer Worm Detection Space","volume":"104","author":"Ochieng","year":"2014","journal-title":"Int. J. Comput. Appl."},{"key":"ref_85","unstructured":"GoLinuxCloud (2023, February 14). Automated SSH Brute Force Attack [4 Methods]. Available online: www.golinuxcloud.com\/ssh-brute-force-attack\/."},{"key":"ref_86","unstructured":"Apache, N. (2023, February 09). NiFi System Administrator\u2019s Guide. Available online: https:\/\/nifi.apache.org\/docs\/nifi-docs\/html\/administration-guide.html."},{"key":"ref_87","unstructured":"Grafana (2023, February 28). Data Analytics and Interactive Visualization. Available online: www.stackscale.com\/blog\/grafana\/."},{"key":"ref_88","unstructured":"IBM (2023, February 09). TeraSort Benchmark. Available online: www.ibm.com\/docs\/en\/spectrum-symphony\/7.2.1?topic=mapreduce-terasort-benchmark."},{"key":"ref_89","unstructured":"Monitor, A. (2023, February 09). guywi-ms. Collect Syslog Data Sources with the Log Analytics Agent in Azure Monitor\u2014Azure Monitor. Available online: https:\/\/learn.microsoft.com\/en-us\/azure\/azure-monitor\/agents\/data-sources-syslog."},{"key":"ref_90","unstructured":"Labs, G. (2023, February 09). Ambari Metrics Plugin for Grafana. Available online: https:\/\/grafana.com\/grafana\/plugins\/praj-ams-datasource\/."},{"key":"ref_91","unstructured":"Burgwinkel, D. (2017). Blockchains-wichtige Fragen aus IT-Sicht, De Gruyter."},{"key":"ref_92","unstructured":"Winston, P.H. (2019). Artificial Intelligence, Addison-Wesley."},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"106572","DOI":"10.1016\/j.infsof.2021.106572","article-title":"BCI-CFI: A context-sensitive control-flow integrity method based on branch correlation integrity","volume":"136","author":"Wang","year":"2021","journal-title":"Inf. Softw. Technol."},{"key":"ref_94","doi-asserted-by":"crossref","unstructured":"Petrosian, L.G., and Ambartsumian, V.A. (2020). Static and Dynamic Analysis of Engineering Structures, John Wiley & Sons.","DOI":"10.1002\/9781119592945"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/16\/4\/110\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T14:18:15Z","timestamp":1760105895000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/16\/4\/110"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,25]]},"references-count":94,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2024,4]]}},"alternative-id":["fi16040110"],"URL":"https:\/\/doi.org\/10.3390\/fi16040110","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,25]]}}}