{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T18:06:07Z","timestamp":1744826767463},"reference-count":24,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7,1]]},"abstract":"<p>Cloud computing is the emerging technology providing IT as a utility through internet. The benefits of cloud computing are but not limited to service based, scalable, elastic, shared pool of resources, metered by use. Due to mentioned benefits the concept of cloud computing fits very well with the concept of m-learning which differs from other forms of e-learning, covers a wide range of possibilities opened up by the convergence of new mobile technologies, wireless communication structure and distance learning development. The concept of cloud computing like any other concept has not only benefits but also introduces myriad of security issues, such as transparency between cloud user and provider, lack of standards, security concerns related to identity, Service Level Agreements (SLA) inadequacy etc. Providing secure, transparent, and reliable services in cloud computing environment is an important issue. This paper introduces a secured three layered architecture with an advance Intrusion Detection System (advIDS), which overcomes different vulnerabilities on cloud deployed applications. This proposed architecture can reduce the impact of different attacks by providing timely alerts, rejecting the unauthorized access over services, and recording the new threat profiles for future verification. The goal of this research is to provide more control over data and applications to the cloud user, which are now mainly controlled by Cloud Service Provider (CSP).<\/p>","DOI":"10.4018\/ijeei.2013070103","type":"journal-article","created":{"date-parts":[[2014,1,28]],"date-time":"2014-01-28T15:51:59Z","timestamp":1390924319000},"page":"38-52","source":"Crossref","is-referenced-by-count":1,"title":["Research on System Architecture to Provide Maximum Security, End User Device Independency and User Centric Control over Content in Cloud"],"prefix":"10.4018","volume":"4","author":[{"given":"Sai Manoj","family":"Marepalli","sequence":"first","affiliation":[{"name":"Offenberg University of Applied Sciences, Germany"}]},{"given":"Razia","family":"Sultana","sequence":"additional","affiliation":[{"name":"Offenberg University of Applied Sciences, Germany & Strasbourg University, France"}]},{"given":"Andreas","family":"Christ","sequence":"additional","affiliation":[{"name":"Offenberg University of Applied Sciences, Germany"}]}],"member":"2432","reference":[{"key":"ijeei.2013070103-0","doi-asserted-by":"crossref","unstructured":"Angin, P., Bhargava, B., Ranchal, R., Singh, N., Linderman, M., Othmane, L. B., & Lilien, L. (2010). An entity-centric approach for privacy and identity management in cloud computing. In Proceedings of the Reliable Distributed Systems, 2010 29th IEEE Symposium (pp. 177-183).","DOI":"10.1109\/SRDS.2010.28"},{"key":"ijeei.2013070103-1","unstructured":"ATM working group. (1993). Meeting report from the IP over ATM working group of the IETF. CH: Switch."},{"key":"ijeei.2013070103-2","author":"A.Christ","year":"2010","journal-title":"SW-architecture for device independent mobile learning. Architectures for Distributed and Complex M-Learning Systems"},{"key":"ijeei.2013070103-3","author":"A.Christ","year":"2013","journal-title":"Architecture of a device independent collaborative language learning game. Handbook of mobile learning"},{"key":"ijeei.2013070103-4","unstructured":"Cloud Security Alliance (CSA). (2011). Security guidance for critical areas of focus in cloud computing v3.0. Retrieved July 14, 2013, from https:\/\/cloudsecurityalliance.org\/guidance\/csaguide.v3.0.pdf"},{"key":"ijeei.2013070103-5","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5510914"},{"key":"ijeei.2013070103-6","doi-asserted-by":"crossref","unstructured":"Corbat\u00f3, F. J. (1962). An experimental time-sharing system. SJCC Proceedings. MIT. Retrieved July 6, 2012, from http:\/\/www.eecs.harvard.edu\/cs261\/papers\/corbato62.pdf","DOI":"10.1145\/1460833.1460871"},{"key":"ijeei.2013070103-7","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2009.103"},{"key":"ijeei.2013070103-8","unstructured":"EMC Solutions Group. (2013). Trusted work load migration with EMC, RSA, Intel, and HyTrust. Retrieved August 13, 2013, from http:\/\/www.emc.com\/collateral\/white-papers\/h11797-trusted-workload-migration-emc-rsa-intel-hytrust-wp.pdf"},{"key":"ijeei.2013070103-9","unstructured":"Fujitsu Research Institute. (2010). Personal data in the cloud: A global survey of consumer attitudes. Retrieved August 13, 2013, from http:\/\/www.fujitsu.com\/downloads\/SOL\/fai\/reports\/fujitsu_personal-data-in-the-cloud.pdf"},{"key":"ijeei.2013070103-10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.115"},{"key":"ijeei.2013070103-11","unstructured":"ISO. IEC 27005:2011. (2011). Information security risk management. Retrieved May 19, 2011, from http:\/\/www.iso.org\/iso\/catalogue_detail?csnumber=56742"},{"key":"ijeei.2013070103-12","unstructured":"Maltais., M. (2012). Who owns your stuff in the cloud? Los Angeles Times. Retrieved December 14, 2012, from http:\/\/articles.latimes.com\/2012\/apr\/26\/business\/la-fi-tech-savvy-cloud-services-20120426"},{"key":"ijeei.2013070103-13","unstructured":"Marepalli, S. M., Sultana, R., & Christ, A. (2013). The challenges of collaborative learning in cloud and a three layered architecture towards the solution. The Society of Digital Information and Wireless Communications (SDIWC), 134-139."},{"key":"ijeei.2013070103-14","doi-asserted-by":"crossref","unstructured":"Mell, P., & Grance, T. (2011). The NIST definition of cloud computing. National Institute of Standards and Technology. Retrieved June 23, 2012, from http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-145\/SP800-145.pdf","DOI":"10.6028\/NIST.SP.800-145"},{"key":"ijeei.2013070103-15","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"ijeei.2013070103-16","unstructured":"Nguyen, D. M., & Eui-Nam, H. (2011). A collaborative intrusion detection system framework for cloud computing. In Proceedings of the International Conference on IT Convergence and Security 2011. Springer Netherlands."},{"key":"ijeei.2013070103-17","unstructured":"Niels, S. (2010). The economics of cloud computing for the EU public sector. Microsoft Europe. Retrieved July 20, 2013, from http:\/\/www.microsoft.com\/global\/eu\/RichMedia\/eu_public_sector_cloud_economics_a4.pdf"},{"key":"ijeei.2013070103-18","doi-asserted-by":"crossref","unstructured":"Roschke, S., Feng, C., & Meinel, C. (2009). Intrusion detection in the cloud. In Proceedings of the Dependable, Autonomic and Secure Computing, Eighth IEEE International Conference (pp. 729-734)","DOI":"10.1109\/DASC.2009.94"},{"key":"ijeei.2013070103-19","doi-asserted-by":"crossref","unstructured":"Scarfone, K., & Mell, P. (2007). Guide to intrusion detection and prevention systems (IDPS). Recommendations of the National Institute of Standards and Technology. Retrieved March 15, 2013, from http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-94\/SP800-94.pdf","DOI":"10.6028\/NIST.SP.800-94"},{"key":"ijeei.2013070103-20","unstructured":"Strachey, C. (1959). Time sharing in large fast computers. In Proceedings of the International Conference on Information processing (UNESCO) (pp. 336\u2013341)."},{"key":"ijeei.2013070103-21","doi-asserted-by":"crossref","unstructured":"Sultana, R., Christ, A., Feisst, M., & Curticapean, D. (2013) Learning in the cloud: A new challenge for a global teaching system in optics and photonics. In Proceedings of the ETOP 2013. University of Porto, Portugal.","DOI":"10.1117\/12.2070558"},{"key":"ijeei.2013070103-22","doi-asserted-by":"crossref","unstructured":"Takabi, H., & Joshi, J. B. D. (2012). Policy management as a service: An approach to manage policy heterogeneity in cloud computing environment. In Proceedings of the Hawaii International Conference System Science (HICSS).","DOI":"10.1109\/HICSS.2012.475"},{"key":"ijeei.2013070103-23","unstructured":"Tsai, C., Lin, U., Chang, A. Y., & Chen, C. (2010). Information security issue of enterprises adopting the application of cloud computing. In Proceedings of the Sixth International Conference Networked Computing and Advanced Information Management (NCM)."}],"container-title":["International Journal of E-Entrepreneurship and Innovation"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=100360","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T04:16:11Z","timestamp":1654143371000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijeei.2013070103"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,7,1]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,7]]}},"URL":"https:\/\/doi.org\/10.4018\/ijeei.2013070103","relation":{},"ISSN":["1947-8585","1947-8593"],"issn-type":[{"value":"1947-8585","type":"print"},{"value":"1947-8593","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,1]]}}}